Skip to content

Commit

Permalink
Merge pull request #316 from jzelinskie/fix-alpine
Browse files Browse the repository at this point in the history
Alpine v3.5 support
  • Loading branch information
jzelinskie committed Feb 7, 2017
2 parents eb5be92 + 8d10d93 commit 2c5f1d3
Show file tree
Hide file tree
Showing 6 changed files with 52 additions and 178 deletions.
2 changes: 1 addition & 1 deletion config.example.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ clair:
options:
# PostgreSQL Connection string
# https://www.postgresql.org/docs/current/static/libpq-connect.html#LIBPQ-CONNSTRING
source:
source: host=localhost port=5432 user=postgres sslmode=disable statement_timeout=60000

# Number of elements kept in the cache
# Values unlikely to change (e.g. namespaces) are cached in order to save prevent needless roundtrips to the database.
Expand Down
4 changes: 0 additions & 4 deletions ext/versionfmt/dpkg/parser.go
Original file line number Diff line number Diff line change
Expand Up @@ -96,10 +96,6 @@ func newVersion(str string) (version, error) {
return version{}, errors.New("No version")
}

if !unicode.IsDigit(rune(v.version[0])) {
return version{}, errors.New("version does not start with digit")
}

for i := 0; i < len(v.version); i = i + 1 {
r := rune(v.version[i])
if !unicode.IsDigit(r) && !unicode.IsLetter(r) && !containsRune(versionAllowedSymbols, r) {
Expand Down
6 changes: 4 additions & 2 deletions ext/versionfmt/dpkg/parser_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,10 @@ func TestParse(t *testing.T) {
// Test invalid characters in epoch
{"a:0-0", version{}, true},
{"A:0-0", version{}, true},
// Test version not starting with a digit
{"0:abc3-0", version{}, true},
// Test version not starting with a digit.
// While recommended by the specification, this is not strictly required and
// at least one vulnerable Alpine package deviates from this scheme.
{"0:abc3-0", version{epoch: 0, version: "abc3", revision: "0"}, false},
}
for _, c := range cases {
v, err := newVersion(c.str)
Expand Down
127 changes: 45 additions & 82 deletions ext/vulnsrc/alpine/alpine.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,11 +17,11 @@
package alpine

import (
"fmt"
"io"
"io/ioutil"
"os"
"os/exec"
"path/filepath"
"strings"

"gopkg.in/yaml.v2"
Expand Down Expand Up @@ -79,8 +79,13 @@ func (u *updater) Update(db database.Datastore) (resp vulnsrc.UpdateResponse, er
return
}

// Get the list of namespaces from the repository.
var namespaces []string
namespaces, err = detectNamespaces(u.repositoryLocalPath)
namespaces, err = ls(u.repositoryLocalPath, directoriesOnly)
if err != nil {
return
}

// Append any changed vulnerabilities to the response.
for _, namespace := range namespaces {
var vulns []database.Vulnerability
Expand All @@ -104,58 +109,70 @@ func (u *updater) Clean() {
}
}

func detectNamespaces(path string) ([]string, error) {
// Open the root directory.
type lsFilter int

const (
filesOnly lsFilter = iota
directoriesOnly
)

func ls(path string, filter lsFilter) ([]string, error) {
dir, err := os.Open(path)
if err != nil {
return nil, err
}
defer dir.Close()

// Get a list of the namspaces from the directory names.
finfos, err := dir.Readdir(0)
if err != nil {
return nil, err
}

var namespaces []string
var files []string
for _, info := range finfos {
if !info.IsDir() {
if filter == directoriesOnly && !info.IsDir() {
continue
}

if filter == filesOnly && info.IsDir() {
continue
}
// Filter out hidden directories like `.git`.

if strings.HasPrefix(info.Name(), ".") {
continue
}

namespaces = append(namespaces, info.Name())
files = append(files, info.Name())
}

return namespaces, nil
}

type parserFunc func(io.Reader) ([]database.Vulnerability, error)

var parsers = map[string]parserFunc{
"v3.3": parse33YAML,
"v3.4": parse34YAML,
return files, nil
}

func parseVulnsFromNamespace(repositoryPath, namespace string) (vulns []database.Vulnerability, note string, err error) {
var file io.ReadCloser
file, err = os.Open(repositoryPath + "/" + namespace + "/main.yaml")
nsDir := filepath.Join(repositoryPath, namespace)
var dbFilenames []string
dbFilenames, err = ls(nsDir, filesOnly)
if err != nil {
return
}
defer file.Close()

parseFunc, exists := parsers[namespace]
if !exists {
note = fmt.Sprintf("The file %s is not mapped to any Alpine version number", namespace)
return
for _, filename := range dbFilenames {
var file io.ReadCloser
file, err = os.Open(filepath.Join(nsDir, filename))
if err != nil {
return
}

var fileVulns []database.Vulnerability
fileVulns, err = parseYAML(file)
if err != nil {
return
}

vulns = append(vulns, fileVulns...)
file.Close()
}

vulns, err = parseFunc(file)
return
}

Expand Down Expand Up @@ -193,61 +210,7 @@ func (u *updater) pullRepository() (commit string, err error) {
return
}

type secdb33File struct {
Distro string `yaml:"distroversion"`
Packages []struct {
Pkg struct {
Name string `yaml:"name"`
Version string `yaml:"ver"`
Fixes []string `yaml:"fixes"`
} `yaml:"pkg"`
} `yaml:"packages"`
}

func parse33YAML(r io.Reader) (vulns []database.Vulnerability, err error) {
var rBytes []byte
rBytes, err = ioutil.ReadAll(r)
if err != nil {
return
}

var file secdb33File
err = yaml.Unmarshal(rBytes, &file)
if err != nil {
return
}
for _, pack := range file.Packages {
pkg := pack.Pkg
for _, fix := range pkg.Fixes {
err = versionfmt.Valid(dpkg.ParserName, pkg.Version)
if err != nil {
log.Warningf("could not parse package version '%s': %s. skipping", pkg.Version, err.Error())
continue
}

vulns = append(vulns, database.Vulnerability{
Name: fix,
Severity: database.UnknownSeverity,
Link: nvdURLPrefix + fix,
FixedIn: []database.FeatureVersion{
{
Feature: database.Feature{
Namespace: database.Namespace{
Name: "alpine:" + file.Distro,
VersionFormat: dpkg.ParserName,
},
Name: pkg.Name,
},
Version: pkg.Version,
},
},
})
}
}
return
}

type secdb34File struct {
type secDBFile struct {
Distro string `yaml:"distroversion"`
Packages []struct {
Pkg struct {
Expand All @@ -257,14 +220,14 @@ type secdb34File struct {
} `yaml:"packages"`
}

func parse34YAML(r io.Reader) (vulns []database.Vulnerability, err error) {
func parseYAML(r io.Reader) (vulns []database.Vulnerability, err error) {
var rBytes []byte
rBytes, err = ioutil.ReadAll(r)
if err != nil {
return
}

var file secdb34File
var file secDBFile
err = yaml.Unmarshal(rBytes, &file)
if err != nil {
return
Expand Down
22 changes: 2 additions & 20 deletions ext/vulnsrc/alpine/alpine_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,32 +23,14 @@ import (
"github.com/stretchr/testify/assert"
)

func TestAlpine33YAMLParsing(t *testing.T) {
_, filename, _, _ := runtime.Caller(0)
path := filepath.Join(filepath.Dir(filename))

testData, _ := os.Open(path + "/testdata/v33_main.yaml")
defer testData.Close()

vulns, err := parse33YAML(testData)
if err != nil {
assert.Nil(t, err)
}
assert.Equal(t, 15, len(vulns))
assert.Equal(t, "CVE-2016-2147", vulns[0].Name)
assert.Equal(t, "alpine:v3.3", vulns[0].FixedIn[0].Feature.Namespace.Name)
assert.Equal(t, "busybox", vulns[0].FixedIn[0].Feature.Name)
assert.Equal(t, "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147", vulns[0].Link)
}

func TestAlpine34YAMLParsing(t *testing.T) {
func TestYAMLParsing(t *testing.T) {
_, filename, _, _ := runtime.Caller(0)
path := filepath.Join(filepath.Dir(filename))

testData, _ := os.Open(path + "/testdata/v34_main.yaml")
defer testData.Close()

vulns, err := parse34YAML(testData)
vulns, err := parseYAML(testData)
if err != nil {
assert.Nil(t, err)
}
Expand Down
69 changes: 0 additions & 69 deletions ext/vulnsrc/alpine/testdata/v33_main.yaml

This file was deleted.

0 comments on commit 2c5f1d3

Please sign in to comment.