1
0
Fork 0
mirror of https://github.com/gocsaf/csaf.git synced 2025-12-22 11:55:40 +01:00

Add requirement checker test data

This commit is contained in:
koplas 2024-12-06 13:11:07 +01:00
parent 5b6af7a4ad
commit 68bd04676c
7 changed files with 1299 additions and 97 deletions

View file

@ -9,99 +9,54 @@
package main package main
import ( import (
"fmt" "bytes"
"encoding/json"
"net/http/httptest" "net/http/httptest"
"os"
"reflect" "reflect"
"testing" "testing"
"text/template"
"github.com/gocsaf/csaf/v3/internal/testutil" "github.com/gocsaf/csaf/v3/internal/testutil"
"github.com/gocsaf/csaf/v3/util" "github.com/gocsaf/csaf/v3/util"
) )
func getBaseRequirements(url string) []Requirement { func getRequirementTestData(t *testing.T, params testutil.ProviderParams, directoryProvider bool) []Requirement {
return []Requirement{ path := "../../testdata/processor-requirements/"
{ if params.EnableSha256 {
Num: 1, path += "sha256-"
Description: "Valid CSAF documents",
Messages: []Message{{Type: 1, Text: "No remote validator configured"}, {Type: 0, Text: "All advisories validated fine against the schema."}},
}, {
Num: 2,
Description: "Filename",
Messages: []Message{{Type: 0, Text: "All found filenames are conforming."}}},
{
Num: 3,
Description: "TLS",
Messages: []Message{{Type: 0, Text: "All tested URLs were HTTPS."}}},
{
Num: 4,
Description: "TLP:WHITE",
Messages: []Message{{Type: 0, Text: "All advisories labeled TLP:WHITE were freely accessible."}}},
{
Num: 5,
Description: "TLP:AMBER and TLP:RED",
Messages: []Message{
{Type: 0, Text: "No advisories labeled TLP:AMBER or TLP:RED tested for accessibility."}}},
{
Num: 6,
Description: "Redirects",
Messages: []Message{{Type: 0, Text: "No redirections found."}}},
{
Num: 7,
Description: "provider-metadata.json",
Messages: []Message{{Type: 0, Text: "Found good provider metadata."}}},
{
Num: 8,
Description: "security.txt",
Messages: []Message{{Type: 0, Text: "Performed no test of security.txt since the direct url of the provider-metadata.json was used."}}},
{
Num: 9,
Description: "/.well-known/csaf/provider-metadata.json",
Messages: []Message{{Type: 0, Text: "Performed no test on whether the provider-metadata.json is available under the .well-known path since the direct url of the provider-metadata.json was used."}}},
{
Num: 10,
Description: "DNS path",
Messages: []Message{{Type: 0, Text: "Performed no test on the contents of https://csaf.data.security.DOMAIN since the direct url of the provider-metadata.json was used."}}},
{
Num: 11,
Description: "One folder per year",
Messages: []Message{{Type: 2, Text: fmt.Sprintf("No year folder found in %s/white/avendor-advisory-0004.json", url)}}},
{
Num: 12,
Description: "index.txt",
Messages: []Message{{Type: 0, Text: fmt.Sprintf("Found %s/white/index.txt", url)}}},
{
Num: 13,
Description: "changes.csv",
Messages: []Message{{Type: 0, Text: fmt.Sprintf("Found %s/white/changes.csv", url)}}},
{
Num: 14,
Description: "Directory listings",
Messages: []Message{{Type: 0, Text: "All directory listings are valid."}}},
{
Num: 15,
Description: "ROLIE feed",
Messages: []Message{{Type: 2, Text: "ROLIE feed based distribution was not used."}}},
{
Num: 16,
Description: "ROLIE service document",
Messages: []Message{{Type: 1, Text: "No ROLIE service document found."}}},
{
Num: 17,
Description: "ROLIE category document",
Messages: []Message{{Type: 1, Text: "No ROLIE category document found."}}},
{
Num: 18,
Description: "Integrity",
Messages: []Message{{Type: 0, Text: "All checksums match."}}},
{
Num: 19,
Description: "Signatures",
Messages: []Message{{Type: 0, Text: "All signatures verified."}}},
{
Num: 20,
Description: "Public OpenPGP Key",
Messages: []Message{{Type: 0, Text: "1 public OpenPGP key(s) loaded."}}},
} }
if params.EnableSha512 {
path += "sha512-"
}
if directoryProvider {
path += "directory"
} else {
path += "rolie"
}
path += ".json"
content, err := os.ReadFile(path)
if err != nil {
t.Fatal(err)
}
tmplt, err := template.New("base").Parse(string(content))
if err != nil {
t.Fatal(err)
}
var output bytes.Buffer
err = tmplt.Execute(&output, params)
if err != nil {
t.Fatal(err)
}
var requirement []Requirement
err = json.Unmarshal(output.Bytes(), &requirement)
if err != nil {
t.Fatal(err)
}
return requirement
} }
func TestShaMarking(t *testing.T) { func TestShaMarking(t *testing.T) {
@ -110,49 +65,42 @@ func TestShaMarking(t *testing.T) {
directoryProvider bool directoryProvider bool
enableSha256 bool enableSha256 bool
enableSha512 bool enableSha512 bool
expected func(string) []Requirement
}{ }{
{ {
name: "deliver sha256 and sha512", name: "deliver sha256 and sha512",
directoryProvider: false, directoryProvider: false,
enableSha256: true, enableSha256: true,
enableSha512: true, enableSha512: true,
expected: getBaseRequirements,
}, },
{ {
name: "only deliver sha256", name: "only deliver sha256",
directoryProvider: false, directoryProvider: false,
enableSha256: true, enableSha256: true,
enableSha512: false, enableSha512: false,
expected: getBaseRequirements,
}, },
{ {
name: "only deliver sha512", name: "only deliver sha512",
directoryProvider: false, directoryProvider: false,
enableSha256: false, enableSha256: false,
enableSha512: true, enableSha512: true,
expected: getBaseRequirements,
}, },
{ {
name: "only deliver sha256 and sha512, directory provider", name: "deliver sha256 and sha512, directory provider",
directoryProvider: true, directoryProvider: true,
enableSha256: true, enableSha256: true,
enableSha512: true, enableSha512: true,
expected: getBaseRequirements,
}, },
{ {
name: "only deliver sha256, directory provider", name: "only deliver sha256, directory provider",
directoryProvider: true, directoryProvider: true,
enableSha256: true, enableSha256: true,
enableSha512: false, enableSha512: false,
expected: getBaseRequirements,
}, },
{ {
name: "only deliver sha512, directory provider", name: "only deliver sha512, directory provider",
directoryProvider: true, directoryProvider: true,
enableSha256: false, enableSha256: false,
enableSha512: true, enableSha512: true,
expected: getBaseRequirements,
}, },
} }
@ -191,11 +139,16 @@ func TestShaMarking(t *testing.T) {
if err != nil { if err != nil {
t.Errorf("SHA marking %v: Expected no error, got: %v", test.name, err) t.Errorf("SHA marking %v: Expected no error, got: %v", test.name, err)
} }
expected := test.expected(serverURL) expected := getRequirementTestData(t,
for i, got := range report.Domains[0].Requirements { testutil.ProviderParams{
want := expected[i] URL: serverURL,
if !reflect.DeepEqual(*got, want) { EnableSha256: test.enableSha256,
t.Errorf("SHA marking %v: Expected %v, got %v", test.name, want, *got) EnableSha512: test.enableSha512,
},
test.directoryProvider)
for i, want := range report.Domains[0].Requirements {
if !reflect.DeepEqual(expected[i], *want) {
t.Errorf("SHA marking %v: Expected %v, got %v", test.name, *want, expected[i])
} }
} }

View file

@ -0,0 +1,206 @@
[
{
"num": 1,
"description": "Valid CSAF documents",
"messages": [
{
"type": 1,
"text": "No remote validator configured"
},
{
"type": 0,
"text": "All advisories validated fine against the schema."
}
]
},
{
"num": 2,
"description": "Filename",
"messages": [
{
"type": 0,
"text": "All found filenames are conforming."
}
]
},
{
"num": 3,
"description": "TLS",
"messages": [
{
"type": 0,
"text": "All tested URLs were HTTPS."
}
]
},
{
"num": 4,
"description": "TLP:WHITE",
"messages": [
{
"type": 0,
"text": "All advisories labeled TLP:WHITE were freely accessible."
}
]
},
{
"num": 5,
"description": "TLP:AMBER and TLP:RED",
"messages": [
{
"type": 0,
"text": "No advisories labeled TLP:AMBER or TLP:RED tested for accessibility."
}
]
},
{
"num": 6,
"description": "Redirects",
"messages": [
{
"type": 0,
"text": "No redirections found."
}
]
},
{
"num": 7,
"description": "provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Found good provider metadata."
}
]
},
{
"num": 8,
"description": "security.txt",
"messages": [
{
"type": 0,
"text": "Performed no test of security.txt since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 9,
"description": "/.well-known/csaf/provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Performed no test on whether the provider-metadata.json is available under the .well-known path since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 10,
"description": "DNS path",
"messages": [
{
"type": 0,
"text": "Performed no test on the contents of https://csaf.data.security.DOMAIN since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 11,
"description": "One folder per year",
"messages": [
{
"type": 2,
"text": "No year folder found in {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 12,
"description": "index.txt",
"messages": [
{
"type": 0,
"text": "Found {{.URL}}/white/index.txt"
}
]
},
{
"num": 13,
"description": "changes.csv",
"messages": [
{
"type": 0,
"text": "Found {{.URL}}/white/changes.csv"
}
]
},
{
"num": 14,
"description": "Directory listings",
"messages": [
{
"type": 0,
"text": "All directory listings are valid."
}
]
},
{
"num": 15,
"description": "ROLIE feed",
"messages": [
{
"type": 2,
"text": "ROLIE feed based distribution was not used."
}
]
},
{
"num": 16,
"description": "ROLIE service document",
"messages": [
{
"type": 1,
"text": "No ROLIE service document found."
}
]
},
{
"num": 17,
"description": "ROLIE category document",
"messages": [
{
"type": 1,
"text": "No ROLIE category document found."
}
]
},
{
"num": 18,
"description": "Integrity",
"messages": [
{
"type": 2,
"text": "Fetching {{.URL}}/white/avendor-advisory-0004.json.sha512 failed: Status code 404 (404 Not Found)"
}
]
},
{
"num": 19,
"description": "Signatures",
"messages": [
{
"type": 0,
"text": "All signatures verified."
}
]
},
{
"num": 20,
"description": "Public OpenPGP Key",
"messages": [
{
"type": 0,
"text": "1 public OpenPGP key(s) loaded."
}
]
}
]

View file

@ -0,0 +1,210 @@
[
{
"num": 1,
"description": "Valid CSAF documents",
"messages": [
{
"type": 1,
"text": "No remote validator configured"
},
{
"type": 0,
"text": "All advisories validated fine against the schema."
}
]
},
{
"num": 2,
"description": "Filename",
"messages": [
{
"type": 0,
"text": "All found filenames are conforming."
}
]
},
{
"num": 3,
"description": "TLS",
"messages": [
{
"type": 0,
"text": "All tested URLs were HTTPS."
}
]
},
{
"num": 4,
"description": "TLP:WHITE",
"messages": [
{
"type": 0,
"text": "All advisories labeled TLP:WHITE were freely accessible."
}
]
},
{
"num": 5,
"description": "TLP:AMBER and TLP:RED",
"messages": [
{
"type": 0,
"text": "No advisories labeled TLP:AMBER or TLP:RED tested for accessibility."
}
]
},
{
"num": 6,
"description": "Redirects",
"messages": [
{
"type": 0,
"text": "No redirections found."
}
]
},
{
"num": 7,
"description": "provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Found good provider metadata."
}
]
},
{
"num": 8,
"description": "security.txt",
"messages": [
{
"type": 0,
"text": "Performed no test of security.txt since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 9,
"description": "/.well-known/csaf/provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Performed no test on whether the provider-metadata.json is available under the .well-known path since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 10,
"description": "DNS path",
"messages": [
{
"type": 0,
"text": "Performed no test on the contents of https://csaf.data.security.DOMAIN since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 11,
"description": "One folder per year",
"messages": [
{
"type": 2,
"text": "No year folder found in {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 12,
"description": "index.txt",
"messages": [
{
"type": 2,
"text": "Fetching index.txt failed: {{.URL}}/index.txt not found."
}
]
},
{
"num": 13,
"description": "changes.csv",
"messages": [
{
"type": 2,
"text": "Fetching changes.csv failed: {{.URL}}/changes.csv not found."
}
]
},
{
"num": 14,
"description": "Directory listings",
"messages": [
{
"type": 2,
"text": "Fetching {{.URL}}/white/ failed. Status code 404 (404 Not Found)"
},
{
"type": 2,
"text": "Not listed advisories: {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 15,
"description": "ROLIE feed",
"messages": [
{
"type": 0,
"text": "All checked ROLIE feeds validated fine."
}
]
},
{
"num": 16,
"description": "ROLIE service document",
"messages": [
{
"type": 0,
"text": "ROLIE service document validated fine."
}
]
},
{
"num": 17,
"description": "ROLIE category document",
"messages": [
{
"type": 1,
"text": "Fetching {{.URL}}/white/category-white.json failed. Status code 404 (404 Not Found)"
}
]
},
{
"num": 18,
"description": "Integrity",
"messages": [
{
"type": 0,
"text": "All checksums match."
}
]
},
{
"num": 19,
"description": "Signatures",
"messages": [
{
"type": 0,
"text": "All signatures verified."
}
]
},
{
"num": 20,
"description": "Public OpenPGP Key",
"messages": [
{
"type": 0,
"text": "1 public OpenPGP key(s) loaded."
}
]
}
]

View file

@ -0,0 +1,206 @@
[
{
"num": 1,
"description": "Valid CSAF documents",
"messages": [
{
"type": 1,
"text": "No remote validator configured"
},
{
"type": 0,
"text": "All advisories validated fine against the schema."
}
]
},
{
"num": 2,
"description": "Filename",
"messages": [
{
"type": 0,
"text": "All found filenames are conforming."
}
]
},
{
"num": 3,
"description": "TLS",
"messages": [
{
"type": 0,
"text": "All tested URLs were HTTPS."
}
]
},
{
"num": 4,
"description": "TLP:WHITE",
"messages": [
{
"type": 0,
"text": "All advisories labeled TLP:WHITE were freely accessible."
}
]
},
{
"num": 5,
"description": "TLP:AMBER and TLP:RED",
"messages": [
{
"type": 0,
"text": "No advisories labeled TLP:AMBER or TLP:RED tested for accessibility."
}
]
},
{
"num": 6,
"description": "Redirects",
"messages": [
{
"type": 0,
"text": "No redirections found."
}
]
},
{
"num": 7,
"description": "provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Found good provider metadata."
}
]
},
{
"num": 8,
"description": "security.txt",
"messages": [
{
"type": 0,
"text": "Performed no test of security.txt since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 9,
"description": "/.well-known/csaf/provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Performed no test on whether the provider-metadata.json is available under the .well-known path since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 10,
"description": "DNS path",
"messages": [
{
"type": 0,
"text": "Performed no test on the contents of https://csaf.data.security.DOMAIN since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 11,
"description": "One folder per year",
"messages": [
{
"type": 2,
"text": "No year folder found in {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 12,
"description": "index.txt",
"messages": [
{
"type": 0,
"text": "Found {{.URL}}/white/index.txt"
}
]
},
{
"num": 13,
"description": "changes.csv",
"messages": [
{
"type": 0,
"text": "Found {{.URL}}/white/changes.csv"
}
]
},
{
"num": 14,
"description": "Directory listings",
"messages": [
{
"type": 0,
"text": "All directory listings are valid."
}
]
},
{
"num": 15,
"description": "ROLIE feed",
"messages": [
{
"type": 2,
"text": "ROLIE feed based distribution was not used."
}
]
},
{
"num": 16,
"description": "ROLIE service document",
"messages": [
{
"type": 1,
"text": "No ROLIE service document found."
}
]
},
{
"num": 17,
"description": "ROLIE category document",
"messages": [
{
"type": 1,
"text": "No ROLIE category document found."
}
]
},
{
"num": 18,
"description": "Integrity",
"messages": [
{
"type": 0,
"text": "All checksums match."
}
]
},
{
"num": 19,
"description": "Signatures",
"messages": [
{
"type": 0,
"text": "All signatures verified."
}
]
},
{
"num": 20,
"description": "Public OpenPGP Key",
"messages": [
{
"type": 0,
"text": "1 public OpenPGP key(s) loaded."
}
]
}
]

View file

@ -0,0 +1,210 @@
[
{
"num": 1,
"description": "Valid CSAF documents",
"messages": [
{
"type": 1,
"text": "No remote validator configured"
},
{
"type": 0,
"text": "All advisories validated fine against the schema."
}
]
},
{
"num": 2,
"description": "Filename",
"messages": [
{
"type": 0,
"text": "All found filenames are conforming."
}
]
},
{
"num": 3,
"description": "TLS",
"messages": [
{
"type": 0,
"text": "All tested URLs were HTTPS."
}
]
},
{
"num": 4,
"description": "TLP:WHITE",
"messages": [
{
"type": 0,
"text": "All advisories labeled TLP:WHITE were freely accessible."
}
]
},
{
"num": 5,
"description": "TLP:AMBER and TLP:RED",
"messages": [
{
"type": 0,
"text": "No advisories labeled TLP:AMBER or TLP:RED tested for accessibility."
}
]
},
{
"num": 6,
"description": "Redirects",
"messages": [
{
"type": 0,
"text": "No redirections found."
}
]
},
{
"num": 7,
"description": "provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Found good provider metadata."
}
]
},
{
"num": 8,
"description": "security.txt",
"messages": [
{
"type": 0,
"text": "Performed no test of security.txt since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 9,
"description": "/.well-known/csaf/provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Performed no test on whether the provider-metadata.json is available under the .well-known path since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 10,
"description": "DNS path",
"messages": [
{
"type": 0,
"text": "Performed no test on the contents of https://csaf.data.security.DOMAIN since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 11,
"description": "One folder per year",
"messages": [
{
"type": 2,
"text": "No year folder found in {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 12,
"description": "index.txt",
"messages": [
{
"type": 2,
"text": "Fetching index.txt failed: {{.URL}}/index.txt not found."
}
]
},
{
"num": 13,
"description": "changes.csv",
"messages": [
{
"type": 2,
"text": "Fetching changes.csv failed: {{.URL}}/changes.csv not found."
}
]
},
{
"num": 14,
"description": "Directory listings",
"messages": [
{
"type": 2,
"text": "Fetching {{.URL}}/white/ failed. Status code 404 (404 Not Found)"
},
{
"type": 2,
"text": "Not listed advisories: {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 15,
"description": "ROLIE feed",
"messages": [
{
"type": 0,
"text": "All checked ROLIE feeds validated fine."
}
]
},
{
"num": 16,
"description": "ROLIE service document",
"messages": [
{
"type": 0,
"text": "ROLIE service document validated fine."
}
]
},
{
"num": 17,
"description": "ROLIE category document",
"messages": [
{
"type": 1,
"text": "Fetching {{.URL}}/white/category-white.json failed. Status code 404 (404 Not Found)"
}
]
},
{
"num": 18,
"description": "Integrity",
"messages": [
{
"type": 0,
"text": "All checksums match."
}
]
},
{
"num": 19,
"description": "Signatures",
"messages": [
{
"type": 0,
"text": "All signatures verified."
}
]
},
{
"num": 20,
"description": "Public OpenPGP Key",
"messages": [
{
"type": 0,
"text": "1 public OpenPGP key(s) loaded."
}
]
}
]

View file

@ -0,0 +1,207 @@
[
{
"num": 1,
"description": "Valid CSAF documents",
"messages": [
{
"type": 1,
"text": "No remote validator configured"
},
{
"type": 0,
"text": "All advisories validated fine against the schema."
}
]
},
{
"num": 2,
"description": "Filename",
"messages": [
{
"type": 0,
"text": "All found filenames are conforming."
}
]
},
{
"num": 3,
"description": "TLS",
"messages": [
{
"type": 0,
"text": "All tested URLs were HTTPS."
}
]
},
{
"num": 4,
"description": "TLP:WHITE",
"messages": [
{
"type": 0,
"text": "All advisories labeled TLP:WHITE were freely accessible."
}
]
},
{
"num": 5,
"description": "TLP:AMBER and TLP:RED",
"messages": [
{
"type": 0,
"text": "No advisories labeled TLP:AMBER or TLP:RED tested for accessibility."
}
]
},
{
"num": 6,
"description": "Redirects",
"messages": [
{
"type": 0,
"text": "No redirections found."
}
]
},
{
"num": 7,
"description": "provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Found good provider metadata."
}
]
},
{
"num": 8,
"description": "security.txt",
"messages": [
{
"type": 0,
"text": "Performed no test of security.txt since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 9,
"description": "/.well-known/csaf/provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Performed no test on whether the provider-metadata.json is available under the .well-known path since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 10,
"description": "DNS path",
"messages": [
{
"type": 0,
"text": "Performed no test on the contents of https://csaf.data.security.DOMAIN since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 11,
"description": "One folder per year",
"messages": [
{
"type": 2,
"text": "No year folder found in {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 12,
"description": "index.txt",
"messages": [
{
"type": 0,
"text": "Found {{.URL}}/white/index.txt"
}
]
},
{
"num": 13,
"description": "changes.csv",
"messages": [
{
"type": 0,
"text": "Found {{.URL}}/white/changes.csv"
}
]
},
{
"num": 14,
"description": "Directory listings",
"messages": [
{
"type": 0,
"text": "All directory listings are valid."
}
]
},
{
"num": 15,
"description": "ROLIE feed",
"messages": [
{
"type": 2,
"text": "ROLIE feed based distribution was not used."
}
]
},
{
"num": 16,
"description": "ROLIE service document",
"messages": [
{
"type": 1,
"text": "No ROLIE service document found."
}
]
},
{
"num": 17,
"description": "ROLIE category document",
"messages": [
{
"type": 1,
"text": "No ROLIE category document found."
}
]
},
{
"num": 18,
"description": "Integrity",
"messages": [
{
"type": 2,
"text": "Fetching {{.URL}}/white/avendor-advisory-0004.json.sha256 failed: Status code 404 (404 Not Found)"
}
]
},
{
"num": 19,
"description": "Signatures",
"messages": [
{
"type": 0,
"text": "All signatures verified."
}
]
},
{
"num": 20,
"description": "Public OpenPGP Key",
"messages": [
{
"type": 0,
"text": "1 public OpenPGP key(s) loaded."
}
]
}
]

View file

@ -0,0 +1,210 @@
[
{
"num": 1,
"description": "Valid CSAF documents",
"messages": [
{
"type": 1,
"text": "No remote validator configured"
},
{
"type": 0,
"text": "All advisories validated fine against the schema."
}
]
},
{
"num": 2,
"description": "Filename",
"messages": [
{
"type": 0,
"text": "All found filenames are conforming."
}
]
},
{
"num": 3,
"description": "TLS",
"messages": [
{
"type": 0,
"text": "All tested URLs were HTTPS."
}
]
},
{
"num": 4,
"description": "TLP:WHITE",
"messages": [
{
"type": 0,
"text": "All advisories labeled TLP:WHITE were freely accessible."
}
]
},
{
"num": 5,
"description": "TLP:AMBER and TLP:RED",
"messages": [
{
"type": 0,
"text": "No advisories labeled TLP:AMBER or TLP:RED tested for accessibility."
}
]
},
{
"num": 6,
"description": "Redirects",
"messages": [
{
"type": 0,
"text": "No redirections found."
}
]
},
{
"num": 7,
"description": "provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Found good provider metadata."
}
]
},
{
"num": 8,
"description": "security.txt",
"messages": [
{
"type": 0,
"text": "Performed no test of security.txt since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 9,
"description": "/.well-known/csaf/provider-metadata.json",
"messages": [
{
"type": 0,
"text": "Performed no test on whether the provider-metadata.json is available under the .well-known path since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 10,
"description": "DNS path",
"messages": [
{
"type": 0,
"text": "Performed no test on the contents of https://csaf.data.security.DOMAIN since the direct url of the provider-metadata.json was used."
}
]
},
{
"num": 11,
"description": "One folder per year",
"messages": [
{
"type": 2,
"text": "No year folder found in {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 12,
"description": "index.txt",
"messages": [
{
"type": 2,
"text": "Fetching index.txt failed: {{.URL}}/index.txt not found."
}
]
},
{
"num": 13,
"description": "changes.csv",
"messages": [
{
"type": 2,
"text": "Fetching changes.csv failed: {{.URL}}/changes.csv not found."
}
]
},
{
"num": 14,
"description": "Directory listings",
"messages": [
{
"type": 2,
"text": "Fetching {{.URL}}/white/ failed. Status code 404 (404 Not Found)"
},
{
"type": 2,
"text": "Not listed advisories: {{.URL}}/white/avendor-advisory-0004.json"
}
]
},
{
"num": 15,
"description": "ROLIE feed",
"messages": [
{
"type": 0,
"text": "All checked ROLIE feeds validated fine."
}
]
},
{
"num": 16,
"description": "ROLIE service document",
"messages": [
{
"type": 0,
"text": "ROLIE service document validated fine."
}
]
},
{
"num": 17,
"description": "ROLIE category document",
"messages": [
{
"type": 1,
"text": "Fetching {{.URL}}/white/category-white.json failed. Status code 404 (404 Not Found)"
}
]
},
{
"num": 18,
"description": "Integrity",
"messages": [
{
"type": 0,
"text": "All checksums match."
}
]
},
{
"num": 19,
"description": "Signatures",
"messages": [
{
"type": 0,
"text": "All signatures verified."
}
]
},
{
"num": 20,
"description": "Public OpenPGP Key",
"messages": [
{
"type": 0,
"text": "1 public OpenPGP key(s) loaded."
}
]
}
]