{"id":2221315,"url":"http://patchwork.ozlabs.org/api/1.0/patches/2221315/?format=json","project":{"id":27,"url":"http://patchwork.ozlabs.org/api/1.0/projects/27/?format=json","name":"Buildroot development","link_name":"buildroot","list_id":"buildroot.buildroot.org","list_email":"buildroot@buildroot.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<20260409081401.2060709-2-martin@strongswan.org>","date":"2026-04-09T08:13:56","name":"[v4,1/6] support/testing/utils: add basic tests for utils/generate-cyclonedx","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"4203760941f7b1b32f5c9f8a93b157bfeaa0060c","submitter":{"id":736,"url":"http://patchwork.ozlabs.org/api/1.0/people/736/?format=json","name":"Martin Willi","email":"martin@strongswan.org"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/buildroot/patch/20260409081401.2060709-2-martin@strongswan.org/mbox/","series":[{"id":499252,"url":"http://patchwork.ozlabs.org/api/1.0/series/499252/?format=json","date":"2026-04-09T08:13:57","name":"Extend CycloneDX metadata","version":4,"mbox":"http://patchwork.ozlabs.org/series/499252/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2221315/checks/","tags":{},"headers":{"Return-Path":"<buildroot-bounces@buildroot.org>","X-Original-To":["incoming-buildroot@patchwork.ozlabs.org","buildroot@buildroot.org"],"Delivered-To":["patchwork-incoming-buildroot@legolas.ozlabs.org","buildroot@buildroot.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=I0SRYsYg;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"],"Received":["from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4frt5J3XPMz1yD3\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Thu, 09 Apr 2026 18:14:44 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id F028D41059;\n\tThu,  9 Apr 2026 08:14:33 +0000 (UTC)","from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id kMW0enYNCa65; Thu,  9 Apr 2026 08:14:32 +0000 (UTC)","from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 58B8741032;\n\tThu,  9 Apr 2026 08:14:32 +0000 (UTC)","from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133])\n by lists1.osuosl.org (Postfix) with ESMTP id 0D97C1D6\n for <buildroot@buildroot.org>; Thu,  9 Apr 2026 08:14:26 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id F25E140264\n for <buildroot@buildroot.org>; Thu,  9 Apr 2026 08:14:24 +0000 (UTC)","from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id Y2xbFRvKGopi for <buildroot@buildroot.org>;\n Thu,  9 Apr 2026 08:14:23 +0000 (UTC)","from mail.codelabs.ch (mail.codelabs.ch [109.202.192.35])\n by smtp2.osuosl.org (Postfix) with ESMTPS id 9E450400BA\n for <buildroot@buildroot.org>; Thu,  9 Apr 2026 08:14:21 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by mail.codelabs.ch (Postfix) with ESMTP id 4FED35A000D;\n Thu, 09 Apr 2026 10:14:19 +0200 (CEST)","from mail.codelabs.ch ([127.0.0.1])\n by localhost (fenrir.codelabs.ch [127.0.0.1]) (amavis, port 10024) with ESMTP\n id f8-BcOVBbORj; Thu,  9 Apr 2026 10:14:17 +0200 (CEST)","from zbook.wlp.is (unknown [185.12.128.225])\n by mail.codelabs.ch (Postfix) with ESMTPSA id E6D1C5A0005;\n Thu, 09 Apr 2026 10:14:17 +0200 (CEST)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp4.osuosl.org 58B8741032","OpenDKIM Filter v2.11.0 smtp2.osuosl.org 9E450400BA"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1775722472;\n\tbh=cZdRlMBA268O9FJgHXtWGtZqc2/tRdA5prLjG5YSghI=;\n\th=From:To:Cc:Date:In-Reply-To:References:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t From;\n\tb=I0SRYsYgk6yO5SUnB41uxlVMZpqQu/q3AsWihXGk3T/4CKBlaPztHwr/tP9/WfYbJ\n\t 38WHtSuQSnMiOJr2DV/B6E83XIMjNDGwDf6f+tKAa9whwdLMlVtvDz039Zw3CzeQqR\n\t weLg2OJvufaBgziRi2RCDxF010EAgFVZ6ZxhjakUI5bfRGEb9wLlQtW/ccVpe6M0xX\n\t AUNtGVO5PztENanWo+iYakf+5ldBCuRFNgksX/8v8NwwOA/Ac8CPq5CAzzfZumNn7R\n\t raCorrbm9HaOmghLr0LtFZhDbhz73KCQZKsngaQh0iN7BnH7re0RfsG5WoXrOZd+jk\n\t nb7NA+VKR2IJg==","Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=109.202.192.35;\n helo=mail.codelabs.ch; envelope-from=martin@strongswan.org;\n receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp2.osuosl.org 9E450400BA","From":"Martin Willi <martin@strongswan.org>","To":"buildroot@buildroot.org","Cc":"Thomas Perale <thomas.perale@mind.be>","Date":"Thu,  9 Apr 2026 10:13:56 +0200","Message-ID":"<20260409081401.2060709-2-martin@strongswan.org>","In-Reply-To":"<20260409081401.2060709-1-martin@strongswan.org>","References":"<20260409081401.2060709-1-martin@strongswan.org>","MIME-Version":"1.0","X-Mailman-Original-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple;\n d=strongswan.org; s=default; t=1775722457;\n bh=U0KugYfpvJVcj6Pu8sMi0B07fVYTWcyLYEYcRmKv1r0=;\n h=From:To:Cc:Subject:Date:In-Reply-To:References:From;\n b=hxoWCsuV9JKZBIx83idU2ilN2R0bS5b8KNyWgXCrcAE/sJL1xghNO3XZGnuGlpLmn\n ji1wiqw6lPyjUyZ0Siyi/usjWs50xBIn1OLtN8Es9FTGg7QjVxsdqjgJ+oZDouDwrc\n +v385eHP602yTaoJnTmNBdgjVKFjVdc3Bw01zjUPMKQGv5k4cu+gAiJ+2mB2eUTQWf\n t3v7Fj6UGR5Iu99B7sRPJZHLw5ZedRtrI747WZt65Mh+23rMHK8nA1FTfUFsSY3jmz\n uIPQNLayNvg1BdPXzGP7P0FFbQcwner9OtVpoE3uzA/RXcPdNkBOt+xBKJyl/1T0+2\n BkVlYZP3jNNfg==","X-Mailman-Original-Authentication-Results":["smtp2.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=strongswan.org","smtp2.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=strongswan.org header.i=@strongswan.org\n header.a=rsa-sha256 header.s=default header.b=hxoWCsuV"],"Subject":"[Buildroot] [PATCH v4 1/6] support/testing/utils: add basic tests\n for utils/generate-cyclonedx","X-BeenThere":"buildroot@buildroot.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.buildroot.org>","List-Unsubscribe":"<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>","List-Archive":"<http://lists.buildroot.org/pipermail/buildroot/>","List-Post":"<mailto:buildroot@buildroot.org>","List-Help":"<mailto:buildroot-request@buildroot.org?subject=help>","List-Subscribe":"<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"buildroot-bounces@buildroot.org","Sender":"\"buildroot\" <buildroot-bounces@buildroot.org>"},"content":"Introduce unit-tests for the generate-cyclonedx script, covering basic\nscript invocation, patch CVE extraction and virtual packages.\n\nSigned-off-by: Martin Willi <martin@strongswan.org>\n---\n .../tests/utils/test_generate_cyclonedx.py    | 139 ++++++++++++++++++\n .../cve_upstream.patch                        |  11 ++\n 2 files changed, 150 insertions(+)\n create mode 100644 support/testing/tests/utils/test_generate_cyclonedx.py\n create mode 100644 support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch","diff":"diff --git a/support/testing/tests/utils/test_generate_cyclonedx.py b/support/testing/tests/utils/test_generate_cyclonedx.py\nnew file mode 100644\nindex 000000000000..bfe5eaf054cf\n--- /dev/null\n+++ b/support/testing/tests/utils/test_generate_cyclonedx.py\n@@ -0,0 +1,139 @@\n+\"\"\"Unit tests for utils/generate-cyclonedx.\"\"\"\n+\n+import json\n+import os\n+import subprocess\n+import tempfile\n+import unittest\n+from pathlib import Path\n+\n+import infra\n+\n+PATCH = \"support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch\"\n+SCHEMA_LICENSES = [\"MIT\", \"Apache-2.0\", \"GPL-3.0-only\"]\n+\n+\n+class TestGenerateCycloneDX(unittest.TestCase):\n+    def setUp(self):\n+        # Provide a fake SPDX schema so the script never hits the network.\n+        self.schema_dir = tempfile.TemporaryDirectory()\n+        self.addCleanup(self.schema_dir.cleanup)\n+\n+        cyclonedx_dir = Path(self.schema_dir.name) / \"cyclonedx\"\n+        cyclonedx_dir.mkdir(parents=True)\n+        schema_path = cyclonedx_dir / \"spdx-1.6.schema.json\"\n+        schema_path.write_text(json.dumps({\"enum\": SCHEMA_LICENSES}))\n+\n+        self.env = os.environ.copy()\n+        self.env[\"BR2_DL_DIR\"] = self.schema_dir.name\n+        self.script = infra.basepath(\"utils/generate-cyclonedx\")\n+        self.cwd = infra.basepath()\n+\n+    def _make_show_info(self) -> dict:\n+        return {\n+            \"package-foo\": {\n+                \"name\": \"foo\",\n+                \"version\": \"1.2\",\n+                \"type\": \"target\",\n+                \"virtual\": False,\n+                \"licenses\": \"MIT\",\n+                \"cpe-id\": \"cpe:2.3:a:example:foo:1.2:*:*:*:*:*:*:*\",\n+                \"patches\": [PATCH],\n+                \"provides\": [\"package-virtual\"],\n+                \"dependencies\": [\"skeleton-baz\", \"package-bar\"],\n+                \"ignore_cves\": [\"CVE-2025-0001\"],\n+                \"package_dir\": \"package/package-foo\",\n+            },\n+            \"skeleton-baz\": {\n+                \"name\": \"skeleton-baz\",\n+                \"version\": \"0.1\",\n+                \"type\": \"target\",\n+                \"virtual\": False,\n+                \"licenses\": \"Apache-2.0\",\n+                \"dependencies\": [],\n+                \"package_dir\": \"package/skeleton-baz\",\n+            },\n+            \"package-bar\": {\n+                \"name\": \"bar\",\n+                \"version\": \"0.2\",\n+                \"type\": \"target\",\n+                \"virtual\": False,\n+                \"licenses\": \"MIT\",\n+                \"ignore_cves\": [\"CVE-2025-0002\"],\n+                \"dependencies\": [\"package-virtual\"],\n+                \"package_dir\": \"package/package-bar\",\n+            },\n+            \"host-tool\": {\n+                \"name\": \"host-tool\",\n+                \"version\": \"0.3\",\n+                \"type\": \"host\",\n+                \"virtual\": False,\n+                \"licenses\": \"GPL-3.0-only\",\n+                \"dependencies\": [],\n+                \"package_dir\": \"package/host-tool\",\n+            },\n+            \"package-virtual\": {\n+                \"name\": \"virtual-provider\",\n+                \"virtual\": True,\n+                \"type\": \"target\",\n+                \"dependencies\": [\"package-foo\"],\n+                \"package_dir\": \"package/package-virtual\",\n+            },\n+        }\n+\n+    def _run_script(self, extra_args=(), show_info=None):\n+        data = show_info if show_info is not None else self._make_show_info()\n+        completed = subprocess.run(\n+            [self.script, *extra_args],\n+            cwd=self.cwd,\n+            env=self.env,\n+            input=json.dumps(data),\n+            text=True,\n+            capture_output=True,\n+            check=True,\n+        )\n+        return json.loads(completed.stdout)\n+\n+    def _find_component(self, result: dict, name: str) -> dict:\n+        for component in result[\"components\"]:\n+            if component[\"bom-ref\"] == name:\n+                return component\n+        self.fail(f\"component {name} missing\")\n+\n+    def test_default(self):\n+        result = self._run_script()\n+\n+        self.assertEqual(len(result[\"components\"]), 4)\n+        self.assertIn(\"vulnerabilities\", result)\n+        vulnerabilities = {v[\"id\"]: v for v in result[\"vulnerabilities\"]}\n+        self.assertEqual(len(vulnerabilities), 2)\n+        self.assertEqual(vulnerabilities[\"CVE-2025-0001\"][\"analysis\"][\"state\"], \"resolved_with_pedigree\")\n+        self.assertEqual(vulnerabilities[\"CVE-2025-0002\"][\"analysis\"][\"state\"], \"in_triage\")\n+\n+        foo = self._find_component(result, \"package-foo\")\n+        patch = foo[\"pedigree\"][\"patches\"][0]\n+        self.assertIn(\"text\", patch[\"diff\"])\n+        self.assertIn(\"content\", patch[\"diff\"][\"text\"])\n+\n+        host = self._find_component(result, \"host-tool\")\n+        self.assertEqual(host[\"properties\"][0][\"value\"], \"host\")\n+\n+        names = {c[\"bom-ref\"] for c in result[\"components\"]}\n+        self.assertIn(\"skeleton-baz\", names)\n+        self.assertIn(\"package-bar\", names)\n+        self.assertNotIn(\"package-virtual\", names)\n+\n+        foo_deps = next(d for d in result[\"dependencies\"] if d[\"ref\"] == \"package-foo\")\n+        self.assertEqual(foo_deps[\"dependsOn\"], [\"package-bar\", \"skeleton-baz\"])\n+\n+        bar_deps = next(d for d in result[\"dependencies\"] if d[\"ref\"] == \"package-bar\")\n+        self.assertEqual(bar_deps[\"dependsOn\"], [\"package-foo\"])\n+\n+    def test_virtual(self):\n+        result = self._run_script([\"--virtual\"])\n+\n+        names = {c[\"bom-ref\"] for c in result[\"components\"]}\n+        self.assertEqual(names, {\"package-foo\", \"skeleton-baz\", \"host-tool\", \"package-virtual\", \"package-bar\"})\n+\n+        foo_deps = next(d for d in result[\"dependencies\"] if d[\"ref\"] == \"package-foo\")\n+        self.assertEqual(foo_deps[\"dependsOn\"], [\"package-bar\", \"skeleton-baz\"])\ndiff --git a/support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch b/support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch\nnew file mode 100644\nindex 000000000000..f18e51ebb9ec\n--- /dev/null\n+++ b/support/testing/tests/utils/test_generate_cyclonedx/cve_upstream.patch\n@@ -0,0 +1,11 @@\n+From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001\n+CVE: CVE-2025-0001\n+Upstream: https://patches.example/foo.patch\n+\n+diff --git a/foo.txt b/foo.txt\n+index 0000001..0000002 100644\n+--- a/foo.txt\n++++ b/foo.txt\n+@@\n+-foo\n++bar\n","prefixes":["v4","1/6"]}