Sha256: 568b4ae4e84dd898f047d8623d4d5701bd652f0ca260ce77f727f819194b6c0d
Contents?: true
Size: 1.67 KB
Versions: 1
Compression:
Stored size: 1.67 KB
Contents
require 'spec_helper' describe "CLI" do include Helpers let(:command) do File.expand_path(File.join(File.dirname(__FILE__),'..','bin','bundle-audit')) end context "when auditing a vulnerable bundle" do let(:bundle) { 'vuln' } let(:directory) { File.join('spec','bundle',bundle) } subject do Dir.chdir(directory) { sh(command, :fail => true) } end it "should print a warning" do subject.should include("Unpatched versions found!") end it "should print advisory information for the vulnerable gems" do subject.should include(%{ Name: actionpack Version: 3.2.10 CVE: 2013-0156 Criticality: High URL: http://osvdb.org/show/osvdb/89026 Title: Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing Remote Code Execution Solution: upgrade to ~> 2.3.15, ~> 3.0.19, ~> 3.1.10, >= 3.2.11 Name: activerecord Version: 3.2.10 CVE: 2013-0276 Criticality: Medium URL: http://direct.osvdb.org/show/osvdb/90072 Title: Ruby on Rails Active Record attr_protected Method Bypass Solution: upgrade to ~> 2.3.17, ~> 3.1.11, >= 3.2.12 Name: activerecord Version: 3.2.10 CVE: 2013-0155 Criticality: High URL: http://osvdb.org/show/osvdb/89025 Title: Ruby on Rails Active Record JSON Parameter Parsing Query Bypass Solution: upgrade to ~> 2.3.16, ~> 3.0.19, ~> 3.1.10, >= 3.2.11 }.strip) end end context "when auditing a secure bundle" do let(:bundle) { 'secure' } let(:directory) { File.join('spec','bundle',bundle) } subject do Dir.chdir(directory) { sh(command) } end it "should print nothing when everything is fine" do subject.strip.should == "No unpatched versions found" end end end
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.1.2 | spec/integration_spec.rb |