Skip to content
This repository was archived by the owner on Jul 23, 2023. It is now read-only.

Commit 2504062

Browse files
authored
Merge pull request #16 from armosec/hot-fix
fix loop
2 parents 2f91f25 + 2b8d526 commit 2504062

File tree

2 files changed

+55
-2
lines changed

2 files changed

+55
-2
lines changed

containerscan/v1/scanResultReportMethods.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,8 @@ func (r *ScanResultReport) GetSummary() containerscan.ContainerScanSummaryResult
4545

4646
func (r *ScanResultReport) GetVulnerabilities() []containerscan.ContainerScanVulnerabilityResult {
4747
var vulnerabilities []containerscan.ContainerScanVulnerabilityResult
48-
for _, vul := range r.Vulnerabilities {
49-
vulnerabilities = append(vulnerabilities, &vul)
48+
for i := range r.Vulnerabilities {
49+
vulnerabilities = append(vulnerabilities, &r.Vulnerabilities[i])
5050
}
5151
return vulnerabilities
5252
}

containerscan/v1/scanResultReportMethods_test.go

+53
Original file line numberDiff line numberDiff line change
@@ -137,3 +137,56 @@ func TestSetTimestamp(t *testing.T) {
137137
t.Errorf("Expected SetTimestamp() to set the timestamp of a ScanResultReportV1 to 12345, but it was set to %d", report.GetTimestamp())
138138
}
139139
}
140+
141+
func TestGetVulnerabilities(t *testing.T) {
142+
report := ScanResultReport{Vulnerabilities: []containerscan.CommonContainerVulnerabilityResult{
143+
{
144+
Vulnerability: containerscan.Vulnerability{
145+
Name: "CVE-1",
146+
ImageID: "sha256:1",
147+
},
148+
ContainerScanID: "12345",
149+
},
150+
{
151+
Vulnerability: containerscan.Vulnerability{
152+
Name: "CVE-2",
153+
ImageID: "sha256:2",
154+
},
155+
ContainerScanID: "12345",
156+
},
157+
{
158+
Vulnerability: containerscan.Vulnerability{
159+
Name: "CVE-3",
160+
ImageID: "sha256:3",
161+
},
162+
ContainerScanID: "12345",
163+
},
164+
{
165+
Vulnerability: containerscan.Vulnerability{
166+
Name: "CVE-4",
167+
ImageID: "sha256:4",
168+
},
169+
ContainerScanID: "3333",
170+
},
171+
}}
172+
173+
vulns := report.GetVulnerabilities()
174+
175+
assert.Equal(t, 4, len(vulns))
176+
177+
assert.Equal(t, "CVE-1", vulns[0].GetVulnerability().GetName())
178+
assert.Equal(t, "CVE-2", vulns[1].GetVulnerability().GetName())
179+
assert.Equal(t, "CVE-3", vulns[2].GetVulnerability().GetName())
180+
assert.Equal(t, "CVE-4", vulns[3].GetVulnerability().GetName())
181+
182+
assert.Equal(t, "sha256:1", vulns[0].GetVulnerability().GetImageID())
183+
assert.Equal(t, "sha256:2", vulns[1].GetVulnerability().GetImageID())
184+
assert.Equal(t, "sha256:3", vulns[2].GetVulnerability().GetImageID())
185+
assert.Equal(t, "sha256:4", vulns[3].GetVulnerability().GetImageID())
186+
187+
assert.Equal(t, "12345", vulns[0].GetContainerScanID())
188+
assert.Equal(t, "12345", vulns[1].GetContainerScanID())
189+
assert.Equal(t, "12345", vulns[2].GetContainerScanID())
190+
assert.Equal(t, "3333", vulns[3].GetContainerScanID())
191+
192+
}

0 commit comments

Comments
 (0)