mirror of
https://github.com/gocsaf/csaf.git
synced 2025-12-22 18:15:42 +01:00
Add csaf_validator
This commit is contained in:
parent
acb3d96c70
commit
adf98736cc
3 changed files with 151 additions and 0 deletions
|
|
@ -18,6 +18,9 @@ is a tool for testing a CSAF Trusted Provider according to [Section 7 of the CSA
|
|||
## [csaf_downloader](docs/csaf_downloader.md)
|
||||
is a tool for downloading advisories from a provider.
|
||||
|
||||
## [csaf_validator](docs/csaf_validator.md)
|
||||
is a tool to validate local advisories files against the JSON Schema and an optional remote validator.
|
||||
|
||||
## Setup
|
||||
Note that binaries for the server side are only available and tested
|
||||
for GNU/Linux-Systems, e.g. Ubuntu LTS.
|
||||
|
|
|
|||
130
cmd/csaf_validator/main.go
Normal file
130
cmd/csaf_validator/main.go
Normal file
|
|
@ -0,0 +1,130 @@
|
|||
// This file is Free Software under the MIT License
|
||||
// without warranty, see README.md and LICENSES/MIT.txt for details.
|
||||
//
|
||||
// SPDX-License-Identifier: MIT
|
||||
//
|
||||
// SPDX-FileCopyrightText: 2023 German Federal Office for Information Security (BSI) <https://www.bsi.bund.de>
|
||||
// Software-Engineering: 2023 Intevation GmbH <https://intevation.de>
|
||||
|
||||
// Package main implements the csaf_validator tool.
|
||||
package main
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"log"
|
||||
"os"
|
||||
|
||||
"github.com/csaf-poc/csaf_distribution/csaf"
|
||||
"github.com/csaf-poc/csaf_distribution/util"
|
||||
"github.com/jessevdk/go-flags"
|
||||
)
|
||||
|
||||
type options struct {
|
||||
Version bool `long:"version" description:"Display version of the binary"`
|
||||
RemoteValidator string `long:"validator" description:"URL to validate documents remotely" value-name:"URL"`
|
||||
RemoteValidatorCache string `long:"validatorcache" description:"FILE to cache remote validations" value-name:"FILE"`
|
||||
RemoteValidatorPresets []string `long:"validatorpreset" description:"One or more presets to validate remotely" default:"mandatory"`
|
||||
}
|
||||
|
||||
func main() {
|
||||
opts := new(options)
|
||||
|
||||
parser := flags.NewParser(opts, flags.Default)
|
||||
parser.Usage = "[OPTIONS] files..."
|
||||
files, err := parser.Parse()
|
||||
errCheck(err)
|
||||
|
||||
if opts.Version {
|
||||
fmt.Println(util.SemVersion)
|
||||
return
|
||||
}
|
||||
|
||||
if len(files) == 0 {
|
||||
log.Println("No domains given.")
|
||||
return
|
||||
}
|
||||
|
||||
errCheck(run(opts, files))
|
||||
}
|
||||
|
||||
// run validates the given files.
|
||||
func run(opts *options, files []string) error {
|
||||
|
||||
var validator csaf.RemoteValidator
|
||||
|
||||
if opts.RemoteValidator != "" {
|
||||
validatorOptions := csaf.RemoteValidatorOptions{
|
||||
URL: opts.RemoteValidator,
|
||||
Presets: opts.RemoteValidatorPresets,
|
||||
Cache: opts.RemoteValidatorCache,
|
||||
}
|
||||
var err error
|
||||
if validator, err = validatorOptions.Open(); err != nil {
|
||||
return fmt.Errorf(
|
||||
"preparing remote validator failed: %w", err)
|
||||
}
|
||||
defer validator.Close()
|
||||
}
|
||||
|
||||
for _, file := range files {
|
||||
doc, err := loadJSONFromFile(file)
|
||||
if err != nil {
|
||||
log.Printf("error: loading %q as JSON failed: %v\n", file, err)
|
||||
continue
|
||||
}
|
||||
// Validate agsinst Schema.
|
||||
validationErrs, err := csaf.ValidateCSAF(doc)
|
||||
if err != nil {
|
||||
log.Printf("error: validating %q against schema failed: %v\n",
|
||||
file, err)
|
||||
|
||||
}
|
||||
if len(validationErrs) > 0 {
|
||||
fmt.Printf("schema validation errors of %q\n", file)
|
||||
for _, vErr := range validationErrs {
|
||||
fmt.Printf(" * %s\n", vErr)
|
||||
}
|
||||
} else {
|
||||
fmt.Printf("%s passes the schema validation.\n", file)
|
||||
}
|
||||
// Validate against remote validator.
|
||||
validate, err := validator.Validate(doc)
|
||||
if err != nil {
|
||||
return fmt.Errorf("remote validation of %q failed: %w",
|
||||
file, err)
|
||||
}
|
||||
var passes string
|
||||
if validate {
|
||||
passes = "passes"
|
||||
} else {
|
||||
passes = "does not pass"
|
||||
}
|
||||
fmt.Printf("%q %s remote validation.\n", file, passes)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func errCheck(err error) {
|
||||
if err != nil {
|
||||
if flags.WroteHelp(err) {
|
||||
os.Exit(0)
|
||||
}
|
||||
log.Fatalf("error: %v\n", err)
|
||||
}
|
||||
}
|
||||
|
||||
// loadJSONFromFile loads a JSON document from a file.
|
||||
func loadJSONFromFile(fname string) (any, error) {
|
||||
f, err := os.Open(fname)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
defer f.Close()
|
||||
var doc any
|
||||
if err = json.NewDecoder(f).Decode(&doc); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return doc, err
|
||||
}
|
||||
18
docs/csaf_validator.md
Normal file
18
docs/csaf_validator.md
Normal file
|
|
@ -0,0 +1,18 @@
|
|||
## csaf_validator
|
||||
|
||||
is a tool to validate local advisories files against the JSON Schema and an optional remote validator.
|
||||
|
||||
### Usage
|
||||
|
||||
```
|
||||
csaf_validator [OPTIONS] files...
|
||||
|
||||
Application Options:
|
||||
--version Display version of the binary
|
||||
--validator=URL URL to validate documents remotely
|
||||
--validatorcache=FILE FILE to cache remote validations
|
||||
--validatorpreset= One or more presets to validate remotely (default: mandatory)
|
||||
|
||||
Help Options:
|
||||
-h, --help Show this help message
|
||||
```
|
||||
Loading…
Add table
Add a link
Reference in a new issue