use crate::config::DiffConfig;
use crate::pipeline::{
OutputTarget, auto_detect_format, compute_diff, exit_codes, output_report,
parse_sbom_with_context,
};
use crate::reports::ReportFormat;
use crate::tui::{App, run_tui};
use anyhow::Result;
#[allow(clippy::needless_pass_by_value)]
pub fn run_diff(config: DiffConfig) -> Result<i32> {
let quiet = config.behavior.quiet;
let mut old_parsed = parse_sbom_with_context(&config.paths.old, quiet)?;
let mut new_parsed = parse_sbom_with_context(&config.paths.new, quiet)?;
if !quiet {
tracing::info!(
"Parsed {} components from old SBOM, {} from new SBOM",
old_parsed.sbom().component_count(),
new_parsed.sbom().component_count()
);
}
#[cfg(feature = "enrichment")]
let mut enrichment_warnings: Vec<&str> = Vec::new();
#[cfg(feature = "enrichment")]
let enrichment_stats = {
if config.enrichment.enabled {
let osv_config = crate::pipeline::build_enrichment_config(&config.enrichment);
let stats_old = crate::pipeline::enrich_sbom(old_parsed.sbom_mut(), &osv_config, quiet);
let stats_new = crate::pipeline::enrich_sbom(new_parsed.sbom_mut(), &osv_config, quiet);
if stats_old.is_none() || stats_new.is_none() {
enrichment_warnings.push("OSV vulnerability enrichment failed");
}
Some((stats_old, stats_new))
} else {
None
}
};
#[cfg(feature = "enrichment")]
{
if config.enrichment.enable_eol {
let eol_config = crate::enrichment::EolClientConfig {
cache_dir: config
.enrichment
.cache_dir
.clone()
.unwrap_or_else(crate::pipeline::dirs::eol_cache_dir),
cache_ttl: std::time::Duration::from_secs(config.enrichment.cache_ttl_hours * 3600),
bypass_cache: config.enrichment.bypass_cache,
timeout: std::time::Duration::from_secs(config.enrichment.timeout_secs),
..Default::default()
};
let eol_old = crate::pipeline::enrich_eol(old_parsed.sbom_mut(), &eol_config, quiet);
let eol_new = crate::pipeline::enrich_eol(new_parsed.sbom_mut(), &eol_config, quiet);
if eol_old.is_none() || eol_new.is_none() {
enrichment_warnings.push("EOL enrichment failed");
}
}
}
#[cfg(feature = "enrichment")]
if !config.enrichment.vex_paths.is_empty() {
let vex_old =
crate::pipeline::enrich_vex(old_parsed.sbom_mut(), &config.enrichment.vex_paths, quiet);
let vex_new =
crate::pipeline::enrich_vex(new_parsed.sbom_mut(), &config.enrichment.vex_paths, quiet);
if vex_old.is_none() || vex_new.is_none() {
enrichment_warnings.push("VEX enrichment failed");
}
}
#[cfg(not(feature = "enrichment"))]
{
if config.enrichment.enabled {
eprintln!(
"Warning: enrichment requested but the 'enrichment' feature is not enabled. \
Rebuild with: cargo build --features enrichment"
);
}
}
let result = compute_diff(&config, &old_parsed.sbom, &new_parsed.sbom)?;
let exit_code = determine_exit_code(&config, &result);
let output_target = OutputTarget::from_option(config.output.file.clone());
let effective_output = auto_detect_format(config.output.format, &output_target);
if effective_output == ReportFormat::Tui {
let (old_sbom, old_raw) = old_parsed.into_parts();
let (new_sbom, new_raw) = new_parsed.into_parts();
#[cfg(feature = "enrichment")]
let mut app = {
let app = App::new_diff(result, old_sbom, new_sbom, &old_raw, &new_raw);
if let Some((stats_old, stats_new)) = enrichment_stats {
app.with_enrichment_stats(stats_old, stats_new)
} else {
app
}
};
#[cfg(not(feature = "enrichment"))]
let mut app = App::new_diff(result, old_sbom, new_sbom, &old_raw, &new_raw);
app.export_template = config.output.export_template.clone();
#[cfg(feature = "enrichment")]
if !enrichment_warnings.is_empty() {
app.set_status_message(format!("Warning: {}", enrichment_warnings.join(", ")));
app.status_sticky = true;
}
run_tui(&mut app)?;
} else {
old_parsed.drop_raw_content();
new_parsed.drop_raw_content();
output_report(&config, &result, &old_parsed.sbom, &new_parsed.sbom)?;
}
Ok(exit_code)
}
fn determine_exit_code(config: &DiffConfig, result: &crate::diff::DiffResult) -> i32 {
if config.filtering.fail_on_vex_gap {
let vex_summary = result.vulnerabilities.vex_summary();
let total_gaps = vex_summary.introduced_without_vex + vex_summary.persistent_without_vex;
if total_gaps > 0 {
eprintln!(
"VEX gap: {} vulnerability(ies) lack VEX statements ({} introduced, {} persistent)",
total_gaps, vex_summary.introduced_without_vex, vex_summary.persistent_without_vex,
);
return exit_codes::VEX_GAPS_FOUND;
}
}
if config.behavior.fail_on_vuln && result.summary.vulnerabilities_introduced > 0 {
return exit_codes::VULNS_INTRODUCED;
}
if config.behavior.fail_on_change && result.summary.total_changes > 0 {
return exit_codes::CHANGES_DETECTED;
}
exit_codes::SUCCESS
}
#[cfg(test)]
mod tests {
use crate::pipeline::OutputTarget;
use std::path::PathBuf;
#[test]
fn test_output_target_conversion() {
let none_target = OutputTarget::from_option(None);
assert!(matches!(none_target, OutputTarget::Stdout));
let some_target = OutputTarget::from_option(Some(PathBuf::from("/tmp/test.json")));
assert!(matches!(some_target, OutputTarget::File(_)));
}
}