Skip to content

Commit

Permalink
api: implement post vulnerability
Browse files Browse the repository at this point in the history
  • Loading branch information
jzelinskie committed Feb 24, 2016
1 parent 38aeed4 commit 9a8d4aa
Show file tree
Hide file tree
Showing 2 changed files with 64 additions and 2 deletions.
6 changes: 6 additions & 0 deletions api/v1/models.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ type Vulnerability struct {
Name string `json:"Name,omitempty"`
Namespace string `json:"Namespace,omitempty"`
Description string `json:"Description,omitempty"`
Link string `json:"Link,omitempty"`
Severity string `json:"Severity,omitempty"`
FixedBy string `json:"FixedBy,omitempty"`
FixedIn []Feature `json:"FixedIn,omitempty"`
Expand Down Expand Up @@ -71,3 +72,8 @@ type NamespaceEnvelope struct {
Namespaces *[]string `json:"Namespaces,omitempty"`
Error *Error `json:"Error,omitempty"`
}

type VulnerabilityEnvelope struct {
Vulnerability *Vulnerability `json:"Vulnerability,omitempty"`
Error *Error `json:"Error,omitempty"`
}
60 changes: 58 additions & 2 deletions api/v1/routes.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ import (
"github.com/prometheus/client_golang/prometheus"

"github.com/coreos/clair/api/context"
"github.com/coreos/clair/database"
cerrors "github.com/coreos/clair/utils/errors"
"github.com/coreos/clair/utils/types"
"github.com/coreos/clair/worker"
Expand Down Expand Up @@ -56,6 +57,11 @@ func postLayer(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx
return writeHeader(w, http.StatusBadRequest)
}

if request.Layer == nil {
writeResponse(w, LayerEnvelope{Error: &Error{"failed to provide layer"}})
return writeHeader(w, http.StatusBadRequest)
}

err = worker.Process(ctx.Store, request.Layer.Name, request.Layer.ParentName, request.Layer.Path, request.Layer.Format)
if err != nil {
if _, ok := err.(*cerrors.ErrBadRequest); ok {
Expand Down Expand Up @@ -153,9 +159,59 @@ func getNamespaces(w http.ResponseWriter, r *http.Request, p httprouter.Params,
}

func postVulnerability(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) int {
// ez
return 0
request := VulnerabilityEnvelope{}
err := decodeJSON(r, &request)
if err != nil {
writeResponse(w, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return writeHeader(w, http.StatusBadRequest)
}

if request.Vulnerability == nil {
writeResponse(w, VulnerabilityEnvelope{Error: &Error{"failed to provide vulnerability"}})
return writeHeader(w, http.StatusBadRequest)
}

severity := types.Priority(request.Vulnerability.Severity)
if !severity.IsValid() {
writeResponse(w, VulnerabilityEnvelope{Error: &Error{"invalid severity"}})
return writeHeader(w, http.StatusBadRequest)
}

var dbFeatures []database.FeatureVersion
for _, feature := range request.Vulnerability.FixedIn {
version, err := types.NewVersion(feature.Version)
if err != nil {
writeResponse(w, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return writeHeader(w, http.StatusBadRequest)
}

dbFeatures = append(dbFeatures, database.FeatureVersion{
Feature: database.Feature{
Name: feature.Name,
Namespace: database.Namespace{Name: feature.Namespace},
},
Version: version,
})
}

vuln := database.Vulnerability{
Name: request.Vulnerability.Name,
Namespace: database.Namespace{Name: request.Vulnerability.Namespace},
Description: request.Vulnerability.Description,
Link: request.Vulnerability.Link,
Severity: severity,
FixedIn: dbFeatures,
}

err = ctx.Store.InsertVulnerabilities([]database.Vulnerability{vuln})
if err != nil {
writeResponse(w, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return writeHeader(w, http.StatusInternalServerError)
}

return writeHeader(w, http.StatusCreated)
}

func getVulnerability(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) int {
// ez
return 0
Expand Down

0 comments on commit 9a8d4aa

Please sign in to comment.