Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2221315/?format=api
{ "id": 2221315, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2221315/?format=api", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/1.0/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260409081401.2060709-2-martin@strongswan.org>", "date": "2026-04-09T08:13:56", "name": "[v4,1/6] support/testing/utils: add basic tests for utils/generate-cyclonedx", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "4203760941f7b1b32f5c9f8a93b157bfeaa0060c", "submitter": { "id": 736, "url": "http://patchwork.ozlabs.org/api/1.0/people/736/?format=api", "name": "Martin Willi", "email": "martin@strongswan.org" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260409081401.2060709-2-martin@strongswan.org/mbox/", "series": [ { "id": 499252, "url": "http://patchwork.ozlabs.org/api/1.0/series/499252/?format=api", "date": "2026-04-09T08:13:57", "name": "Extend CycloneDX metadata", "version": 4, "mbox": "http://patchwork.ozlabs.org/series/499252/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2221315/checks/", "tags": {}, "headers": { "Return-Path": "<buildroot-bounces@buildroot.org>", "X-Original-To": [ "incoming-buildroot@patchwork.ozlabs.org", "buildroot@buildroot.org" ], "Delivered-To": [ "patchwork-incoming-buildroot@legolas.ozlabs.org", "buildroot@buildroot.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=I0SRYsYg;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)" ], "Received": [ "from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4frt5J3XPMz1yD3\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Thu, 09 Apr 2026 18:14:44 +1000 (AEST)", "from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id F028D41059;\n\tThu, 9 Apr 2026 08:14:33 +0000 (UTC)", "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id kMW0enYNCa65; Thu, 9 Apr 2026 08:14:32 +0000 (UTC)", "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 58B8741032;\n\tThu, 9 Apr 2026 08:14:32 +0000 (UTC)", "from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133])\n by lists1.osuosl.org (Postfix) with ESMTP id 0D97C1D6\n for <buildroot@buildroot.org>; Thu, 9 Apr 2026 08:14:26 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id F25E140264\n for <buildroot@buildroot.org>; Thu, 9 Apr 2026 08:14:24 +0000 (UTC)", "from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id Y2xbFRvKGopi for <buildroot@buildroot.org>;\n Thu, 9 Apr 2026 08:14:23 +0000 (UTC)", "from mail.codelabs.ch (mail.codelabs.ch [109.202.192.35])\n by smtp2.osuosl.org (Postfix) with ESMTPS id 9E450400BA\n for <buildroot@buildroot.org>; Thu, 9 Apr 2026 08:14:21 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n by mail.codelabs.ch (Postfix) with ESMTP id 4FED35A000D;\n Thu, 09 Apr 2026 10:14:19 +0200 (CEST)", "from mail.codelabs.ch ([127.0.0.1])\n by localhost (fenrir.codelabs.ch [127.0.0.1]) (amavis, port 10024) with ESMTP\n id f8-BcOVBbORj; Thu, 9 Apr 2026 10:14:17 +0200 (CEST)", "from zbook.wlp.is (unknown [185.12.128.225])\n by mail.codelabs.ch (Postfix) with ESMTPSA id E6D1C5A0005;\n Thu, 09 Apr 2026 10:14:17 +0200 (CEST)" ], "X-Virus-Scanned": [ "amavis at osuosl.org", "amavis at osuosl.org" ], "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ", "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 smtp4.osuosl.org 58B8741032", "OpenDKIM Filter v2.11.0 smtp2.osuosl.org 9E450400BA" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1775722472;\n\tbh=cZdRlMBA268O9FJgHXtWGtZqc2/tRdA5prLjG5YSghI=;\n\th=From:To:Cc:Date:In-Reply-To:References:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t From;\n\tb=I0SRYsYgk6yO5SUnB41uxlVMZpqQu/q3AsWihXGk3T/4CKBlaPztHwr/tP9/WfYbJ\n\t 38WHtSuQSnMiOJr2DV/B6E83XIMjNDGwDf6f+tKAa9whwdLMlVtvDz039Zw3CzeQqR\n\t weLg2OJvufaBgziRi2RCDxF010EAgFVZ6ZxhjakUI5bfRGEb9wLlQtW/ccVpe6M0xX\n\t AUNtGVO5PztENanWo+iYakf+5ldBCuRFNgksX/8v8NwwOA/Ac8CPq5CAzzfZumNn7R\n\t raCorrbm9HaOmghLr0LtFZhDbhz73KCQZKsngaQh0iN7BnH7re0RfsG5WoXrOZd+jk\n\t nb7NA+VKR2IJg==", "Received-SPF": "Pass (mailfrom) identity=mailfrom; client-ip=109.202.192.35;\n helo=mail.codelabs.ch; envelope-from=martin@strongswan.org;\n receiver=<UNKNOWN>", "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp2.osuosl.org 9E450400BA", "From": "Martin Willi <martin@strongswan.org>", "To": "buildroot@buildroot.org", "Cc": "Thomas Perale <thomas.perale@mind.be>", "Date": "Thu, 9 Apr 2026 10:13:56 +0200", "Message-ID": "<20260409081401.2060709-2-martin@strongswan.org>", "In-Reply-To": "<20260409081401.2060709-1-martin@strongswan.org>", "References": "<20260409081401.2060709-1-martin@strongswan.org>", "MIME-Version": "1.0", "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=strongswan.org; s=default; t=1775722457;\n bh=U0KugYfpvJVcj6Pu8sMi0B07fVYTWcyLYEYcRmKv1r0=;\n h=From:To:Cc:Subject:Date:In-Reply-To:References:From;\n b=hxoWCsuV9JKZBIx83idU2ilN2R0bS5b8KNyWgXCrcAE/sJL1xghNO3XZGnuGlpLmn\n ji1wiqw6lPyjUyZ0Siyi/usjWs50xBIn1OLtN8Es9FTGg7QjVxsdqjgJ+oZDouDwrc\n +v385eHP602yTaoJnTmNBdgjVKFjVdc3Bw01zjUPMKQGv5k4cu+gAiJ+2mB2eUTQWf\n t3v7Fj6UGR5Iu99B7sRPJZHLw5ZedRtrI747WZt65Mh+23rMHK8nA1FTfUFsSY3jmz\n uIPQNLayNvg1BdPXzGP7P0FFbQcwner9OtVpoE3uzA/RXcPdNkBOt+xBKJyl/1T0+2\n BkVlYZP3jNNfg==", "X-Mailman-Original-Authentication-Results": [ "smtp2.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=strongswan.org", "smtp2.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=strongswan.org header.i=@strongswan.org\n header.a=rsa-sha256 header.s=default header.b=hxoWCsuV" ], "Subject": "[Buildroot] [PATCH v4 1/6] support/testing/utils: add basic tests\n for utils/generate-cyclonedx", "X-BeenThere": "buildroot@buildroot.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>", "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>", "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@buildroot.org>", "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>", "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Errors-To": "buildroot-bounces@buildroot.org", "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>" }, "content": "Introduce unit-tests for the generate-cyclonedx script, covering basic\nscript invocation, patch CVE extraction and virtual packages.\n\nSigned-off-by: Martin Willi <martin@strongswan.org>\n---\n .../tests/utils/test_generate_cyclonedx.py | 139 ++++++++++++++++++\n .../cve_upstream.patch | 11 ++\n 2 files changed, 150 insertions(+)\n create mode 100644 support/testing/tests/utils/test_generate_cyclonedx.py\n create mode 100644 support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch", "diff": "diff --git a/support/testing/tests/utils/test_generate_cyclonedx.py b/support/testing/tests/utils/test_generate_cyclonedx.py\nnew file mode 100644\nindex 000000000000..bfe5eaf054cf\n--- /dev/null\n+++ b/support/testing/tests/utils/test_generate_cyclonedx.py\n@@ -0,0 +1,139 @@\n+\"\"\"Unit tests for utils/generate-cyclonedx.\"\"\"\n+\n+import json\n+import os\n+import subprocess\n+import tempfile\n+import unittest\n+from pathlib import Path\n+\n+import infra\n+\n+PATCH = \"support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch\"\n+SCHEMA_LICENSES = [\"MIT\", \"Apache-2.0\", \"GPL-3.0-only\"]\n+\n+\n+class TestGenerateCycloneDX(unittest.TestCase):\n+ def setUp(self):\n+ # Provide a fake SPDX schema so the script never hits the network.\n+ self.schema_dir = tempfile.TemporaryDirectory()\n+ self.addCleanup(self.schema_dir.cleanup)\n+\n+ cyclonedx_dir = Path(self.schema_dir.name) / \"cyclonedx\"\n+ cyclonedx_dir.mkdir(parents=True)\n+ schema_path = cyclonedx_dir / \"spdx-1.6.schema.json\"\n+ schema_path.write_text(json.dumps({\"enum\": SCHEMA_LICENSES}))\n+\n+ self.env = os.environ.copy()\n+ self.env[\"BR2_DL_DIR\"] = self.schema_dir.name\n+ self.script = infra.basepath(\"utils/generate-cyclonedx\")\n+ self.cwd = infra.basepath()\n+\n+ def _make_show_info(self) -> dict:\n+ return {\n+ \"package-foo\": {\n+ \"name\": \"foo\",\n+ \"version\": \"1.2\",\n+ \"type\": \"target\",\n+ \"virtual\": False,\n+ \"licenses\": \"MIT\",\n+ \"cpe-id\": \"cpe:2.3:a:example:foo:1.2:*:*:*:*:*:*:*\",\n+ \"patches\": [PATCH],\n+ \"provides\": [\"package-virtual\"],\n+ \"dependencies\": [\"skeleton-baz\", \"package-bar\"],\n+ \"ignore_cves\": [\"CVE-2025-0001\"],\n+ \"package_dir\": \"package/package-foo\",\n+ },\n+ \"skeleton-baz\": {\n+ \"name\": \"skeleton-baz\",\n+ \"version\": \"0.1\",\n+ \"type\": \"target\",\n+ \"virtual\": False,\n+ \"licenses\": \"Apache-2.0\",\n+ \"dependencies\": [],\n+ \"package_dir\": \"package/skeleton-baz\",\n+ },\n+ \"package-bar\": {\n+ \"name\": \"bar\",\n+ \"version\": \"0.2\",\n+ \"type\": \"target\",\n+ \"virtual\": False,\n+ \"licenses\": \"MIT\",\n+ \"ignore_cves\": [\"CVE-2025-0002\"],\n+ \"dependencies\": [\"package-virtual\"],\n+ \"package_dir\": \"package/package-bar\",\n+ },\n+ \"host-tool\": {\n+ \"name\": \"host-tool\",\n+ \"version\": \"0.3\",\n+ \"type\": \"host\",\n+ \"virtual\": False,\n+ \"licenses\": \"GPL-3.0-only\",\n+ \"dependencies\": [],\n+ \"package_dir\": \"package/host-tool\",\n+ },\n+ \"package-virtual\": {\n+ \"name\": \"virtual-provider\",\n+ \"virtual\": True,\n+ \"type\": \"target\",\n+ \"dependencies\": [\"package-foo\"],\n+ \"package_dir\": \"package/package-virtual\",\n+ },\n+ }\n+\n+ def _run_script(self, extra_args=(), show_info=None):\n+ data = show_info if show_info is not None else self._make_show_info()\n+ completed = subprocess.run(\n+ [self.script, *extra_args],\n+ cwd=self.cwd,\n+ env=self.env,\n+ input=json.dumps(data),\n+ text=True,\n+ capture_output=True,\n+ check=True,\n+ )\n+ return json.loads(completed.stdout)\n+\n+ def _find_component(self, result: dict, name: str) -> dict:\n+ for component in result[\"components\"]:\n+ if component[\"bom-ref\"] == name:\n+ return component\n+ self.fail(f\"component {name} missing\")\n+\n+ def test_default(self):\n+ result = self._run_script()\n+\n+ self.assertEqual(len(result[\"components\"]), 4)\n+ self.assertIn(\"vulnerabilities\", result)\n+ vulnerabilities = {v[\"id\"]: v for v in result[\"vulnerabilities\"]}\n+ self.assertEqual(len(vulnerabilities), 2)\n+ self.assertEqual(vulnerabilities[\"CVE-2025-0001\"][\"analysis\"][\"state\"], \"resolved_with_pedigree\")\n+ self.assertEqual(vulnerabilities[\"CVE-2025-0002\"][\"analysis\"][\"state\"], \"in_triage\")\n+\n+ foo = self._find_component(result, \"package-foo\")\n+ patch = foo[\"pedigree\"][\"patches\"][0]\n+ self.assertIn(\"text\", patch[\"diff\"])\n+ self.assertIn(\"content\", patch[\"diff\"][\"text\"])\n+\n+ host = self._find_component(result, \"host-tool\")\n+ self.assertEqual(host[\"properties\"][0][\"value\"], \"host\")\n+\n+ names = {c[\"bom-ref\"] for c in result[\"components\"]}\n+ self.assertIn(\"skeleton-baz\", names)\n+ self.assertIn(\"package-bar\", names)\n+ self.assertNotIn(\"package-virtual\", names)\n+\n+ foo_deps = next(d for d in result[\"dependencies\"] if d[\"ref\"] == \"package-foo\")\n+ self.assertEqual(foo_deps[\"dependsOn\"], [\"package-bar\", \"skeleton-baz\"])\n+\n+ bar_deps = next(d for d in result[\"dependencies\"] if d[\"ref\"] == \"package-bar\")\n+ self.assertEqual(bar_deps[\"dependsOn\"], [\"package-foo\"])\n+\n+ def test_virtual(self):\n+ result = self._run_script([\"--virtual\"])\n+\n+ names = {c[\"bom-ref\"] for c in result[\"components\"]}\n+ self.assertEqual(names, {\"package-foo\", \"skeleton-baz\", \"host-tool\", \"package-virtual\", \"package-bar\"})\n+\n+ foo_deps = next(d for d in result[\"dependencies\"] if d[\"ref\"] == \"package-foo\")\n+ self.assertEqual(foo_deps[\"dependsOn\"], [\"package-bar\", \"skeleton-baz\"])\ndiff --git a/support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch b/support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch\nnew file mode 100644\nindex 000000000000..f18e51ebb9ec\n--- /dev/null\n+++ b/support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch\n@@ -0,0 +1,11 @@\n+From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001\n+CVE: CVE-2025-0001\n+Upstream: https://patches.example/foo.patch\n+\n+diff --git a/foo.txt b/foo.txt\n+index 0000001..0000002 100644\n+--- a/foo.txt\n++++ b/foo.txt\n+@@\n+-foo\n++bar\n", "prefixes": [ "v4", "1/6" ] }