mirror of
https://github.com/anchore/syft.git
synced 2026-02-12 02:26:42 +01:00
add integration tests for validating CycloneDX output using cyclonedx-cli (#1000)
This commit is contained in:
parent
91e2fd8532
commit
03ee4fdf5e
@ -56,7 +56,7 @@ func encodeExternalReferences(p pkg.Package) *[]cyclonedx.ExternalReference {
|
|||||||
URL: "",
|
URL: "",
|
||||||
Type: cyclonedx.ERTypeBuildMeta,
|
Type: cyclonedx.ERTypeBuildMeta,
|
||||||
Hashes: &[]cyclonedx.Hash{{
|
Hashes: &[]cyclonedx.Hash{{
|
||||||
Algorithm: cyclonedx.HashAlgorithm(digest.Algorithm),
|
Algorithm: toCycloneDXAlgorithm(digest.Algorithm),
|
||||||
Value: digest.Value,
|
Value: digest.Value,
|
||||||
}},
|
}},
|
||||||
})
|
})
|
||||||
@ -81,6 +81,21 @@ func encodeExternalReferences(p pkg.Package) *[]cyclonedx.ExternalReference {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// supported algorithm in cycloneDX as of 1.4
|
||||||
|
// "MD5", "SHA-1", "SHA-256", "SHA-384", "SHA-512",
|
||||||
|
// "SHA3-256", "SHA3-384", "SHA3-512", "BLAKE2b-256", "BLAKE2b-384", "BLAKE2b-512", "BLAKE3"
|
||||||
|
// syft supported digests: cmd/syft/cli/eventloop/tasks.go
|
||||||
|
// MD5, SHA1, SHA256
|
||||||
|
func toCycloneDXAlgorithm(algorithm string) cyclonedx.HashAlgorithm {
|
||||||
|
validMap := map[string]cyclonedx.HashAlgorithm{
|
||||||
|
"sha1": cyclonedx.HashAlgorithm("SHA-1"),
|
||||||
|
"md5": cyclonedx.HashAlgorithm("MD5"),
|
||||||
|
"sha256": cyclonedx.HashAlgorithm("SHA-256"),
|
||||||
|
}
|
||||||
|
|
||||||
|
return validMap[algorithm]
|
||||||
|
}
|
||||||
|
|
||||||
func decodeExternalReferences(c *cyclonedx.Component, metadata interface{}) {
|
func decodeExternalReferences(c *cyclonedx.Component, metadata interface{}) {
|
||||||
if c.ExternalReferences == nil {
|
if c.ExternalReferences == nil {
|
||||||
return
|
return
|
||||||
@ -101,7 +116,7 @@ func decodeExternalReferences(c *cyclonedx.Component, metadata interface{}) {
|
|||||||
if ref.Hashes != nil {
|
if ref.Hashes != nil {
|
||||||
for _, hash := range *ref.Hashes {
|
for _, hash := range *ref.Hashes {
|
||||||
digests = append(digests, syftFile.Digest{
|
digests = append(digests, syftFile.Digest{
|
||||||
Algorithm: string(hash.Algorithm),
|
Algorithm: syftFile.CleanDigestAlgorithmName(string(hash.Algorithm)),
|
||||||
Value: hash.Value,
|
Value: hash.Value,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|||||||
142
test/cli/cyclonedx_valid_test.go
Normal file
142
test/cli/cyclonedx_valid_test.go
Normal file
@ -0,0 +1,142 @@
|
|||||||
|
package cli
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/anchore/stereoscope/pkg/imagetest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// We have schema validation mechanims in schema/cyclonedx/
|
||||||
|
// This test allows us to double check that validation against the cyclonedx-cli tool
|
||||||
|
func TestValidCycloneDX(t *testing.T) {
|
||||||
|
imageFixture := func(t *testing.T) string {
|
||||||
|
fixtureImageName := "image-pkg-coverage"
|
||||||
|
imagetest.GetFixtureImage(t, "docker-archive", fixtureImageName)
|
||||||
|
tarPath := imagetest.GetFixtureImageTarPath(t, fixtureImageName)
|
||||||
|
return "docker-archive:" + tarPath
|
||||||
|
}
|
||||||
|
|
||||||
|
// TODO update image to exercise entire cyclonedx schema
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
subcommand string
|
||||||
|
args []string
|
||||||
|
fixture func(*testing.T) string
|
||||||
|
assertions []traitAssertion
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "validate cyclonedx output",
|
||||||
|
subcommand: "packages",
|
||||||
|
args: []string{"-o", "cyclonedx-json"},
|
||||||
|
fixture: imageFixture,
|
||||||
|
assertions: []traitAssertion{
|
||||||
|
assertSuccessfulReturnCode,
|
||||||
|
assertValidCycloneDX,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range tests {
|
||||||
|
t.Run(test.name, func(t *testing.T) {
|
||||||
|
fixtureRef := test.fixture(t)
|
||||||
|
args := []string{
|
||||||
|
test.subcommand, fixtureRef, "-q",
|
||||||
|
}
|
||||||
|
for _, a := range test.args {
|
||||||
|
args = append(args, a)
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd, stdout, stderr := runSyft(t, nil, args...)
|
||||||
|
for _, traitFn := range test.assertions {
|
||||||
|
traitFn(t, stdout, stderr, cmd.ProcessState.ExitCode())
|
||||||
|
}
|
||||||
|
if t.Failed() {
|
||||||
|
t.Log("STDOUT:\n", stdout)
|
||||||
|
t.Log("STDERR:\n", stderr)
|
||||||
|
t.Log("COMMAND:", strings.Join(cmd.Args, " "))
|
||||||
|
}
|
||||||
|
|
||||||
|
validateCycloneDXJSON(t, stdout)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func assertValidCycloneDX(tb testing.TB, stdout, stderr string, rc int) {
|
||||||
|
tb.Helper()
|
||||||
|
f, err := os.CreateTemp("", "tmpfile-")
|
||||||
|
if err != nil {
|
||||||
|
tb.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// close and remove the temporary file at the end of the program
|
||||||
|
defer f.Close()
|
||||||
|
defer os.Remove(f.Name())
|
||||||
|
|
||||||
|
data := []byte(stdout)
|
||||||
|
|
||||||
|
if _, err := f.Write(data); err != nil {
|
||||||
|
tb.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
args := []string{
|
||||||
|
"validate",
|
||||||
|
"--input-format",
|
||||||
|
"json",
|
||||||
|
"--input-version",
|
||||||
|
"v1_4",
|
||||||
|
"--input-file",
|
||||||
|
"/sbom",
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd, stdout, stderr := runCycloneDXInDocker(tb, nil, "cyclonedx/cyclonedx-cli", f, args...)
|
||||||
|
if cmd.ProcessState.ExitCode() != 0 {
|
||||||
|
tb.Errorf("expected no validation failures for cyclonedx-cli but got rc=%d", rc)
|
||||||
|
}
|
||||||
|
|
||||||
|
if tb.Failed() {
|
||||||
|
tb.Log("STDOUT:\n", stdout)
|
||||||
|
tb.Log("STDERR:\n", stderr)
|
||||||
|
tb.Log("COMMAND:", strings.Join(cmd.Args, " "))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// validate --input-format json --input-version v1_4 --input-file bom.json
|
||||||
|
func validateCycloneDXJSON(t *testing.T, stdout string) {
|
||||||
|
f, err := os.CreateTemp("", "tmpfile-")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// close and remove the temporary file at the end of the program
|
||||||
|
defer f.Close()
|
||||||
|
defer os.Remove(f.Name())
|
||||||
|
|
||||||
|
data := []byte(stdout)
|
||||||
|
|
||||||
|
if _, err := f.Write(data); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
args := []string{
|
||||||
|
"validate",
|
||||||
|
"--input-format",
|
||||||
|
"json",
|
||||||
|
"--input-version",
|
||||||
|
"v1_4",
|
||||||
|
"--input-file",
|
||||||
|
"/sbom",
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd, stdout, stderr := runCycloneDXInDocker(t, nil, "cyclonedx/cyclonedx-cli", f, args...)
|
||||||
|
if strings.Contains(stdout, "BOM is not valid") {
|
||||||
|
t.Errorf("expected no validation failures for cyclonedx-cli but found invalid BOM")
|
||||||
|
}
|
||||||
|
|
||||||
|
if t.Failed() {
|
||||||
|
t.Log("STDOUT:\n", stdout)
|
||||||
|
t.Log("STDERR:\n", stderr)
|
||||||
|
t.Log("COMMAND:", strings.Join(cmd.Args, " "))
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -66,6 +66,23 @@ func pullDockerImage(t testing.TB, image string) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// docker run -v $(pwd)/sbom:/sbom cyclonedx/cyclonedx-cli:latest validate --input-format json --input-version v1_4 --input-file /sbom
|
||||||
|
func runCycloneDXInDocker(t testing.TB, env map[string]string, image string, f *os.File, args ...string) (*exec.Cmd, string, string) {
|
||||||
|
allArgs := append(
|
||||||
|
[]string{
|
||||||
|
"run",
|
||||||
|
"-t",
|
||||||
|
"-v",
|
||||||
|
fmt.Sprintf("%s:/sbom", f.Name()),
|
||||||
|
image,
|
||||||
|
},
|
||||||
|
args...,
|
||||||
|
)
|
||||||
|
cmd := exec.Command("docker", allArgs...)
|
||||||
|
stdout, stderr, _ := runCommand(cmd, env)
|
||||||
|
return cmd, stdout, stderr
|
||||||
|
}
|
||||||
|
|
||||||
func runSyftInDocker(t testing.TB, env map[string]string, image string, args ...string) (*exec.Cmd, string, string) {
|
func runSyftInDocker(t testing.TB, env map[string]string, image string, args ...string) (*exec.Cmd, string, string) {
|
||||||
allArgs := append(
|
allArgs := append(
|
||||||
[]string{
|
[]string{
|
||||||
@ -150,7 +167,7 @@ func runSyftCommand(t testing.TB, env map[string]string, expectError bool, args
|
|||||||
}
|
}
|
||||||
|
|
||||||
func runCosign(t testing.TB, env map[string]string, args ...string) (*exec.Cmd, string, string) {
|
func runCosign(t testing.TB, env map[string]string, args ...string) (*exec.Cmd, string, string) {
|
||||||
cmd := getCosignCommand(t, args...)
|
cmd := getCommand(t, ".tmp/cosign", args...)
|
||||||
if env == nil {
|
if env == nil {
|
||||||
env = make(map[string]string)
|
env = make(map[string]string)
|
||||||
}
|
}
|
||||||
@ -164,8 +181,8 @@ func runCosign(t testing.TB, env map[string]string, args ...string) (*exec.Cmd,
|
|||||||
return cmd, stdout, stderr
|
return cmd, stdout, stderr
|
||||||
}
|
}
|
||||||
|
|
||||||
func getCosignCommand(t testing.TB, args ...string) *exec.Cmd {
|
func getCommand(t testing.TB, location string, args ...string) *exec.Cmd {
|
||||||
return exec.Command(filepath.Join(repoRoot(t), ".tmp/cosign"), args...)
|
return exec.Command(filepath.Join(repoRoot(t), location), args...)
|
||||||
}
|
}
|
||||||
|
|
||||||
func runCommand(cmd *exec.Cmd, env map[string]string) (string, string, error) {
|
func runCommand(cmd *exec.Cmd, env map[string]string) (string, string, error) {
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user