contrast-agent 3.16.0 → 4.3.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Rakefile +1 -0
- data/ext/cs__assess_marshal_module/cs__assess_marshal_module.c +22 -10
- data/ext/cs__assess_marshal_module/cs__assess_marshal_module.h +4 -3
- data/lib/contrast/agent.rb +2 -3
- data/lib/contrast/agent/assess/contrast_event.rb +49 -130
- data/lib/contrast/agent/assess/contrast_object.rb +51 -0
- data/lib/contrast/agent/assess/events/source_event.rb +4 -9
- data/lib/contrast/agent/assess/policy/patcher.rb +4 -3
- data/lib/contrast/agent/assess/policy/policy_node.rb +31 -59
- data/lib/contrast/agent/assess/policy/policy_scanner.rb +17 -6
- data/lib/contrast/agent/assess/policy/preshift.rb +3 -3
- data/lib/contrast/agent/assess/policy/propagation_method.rb +13 -19
- data/lib/contrast/agent/assess/policy/propagation_node.rb +12 -24
- data/lib/contrast/agent/assess/policy/propagator/append.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/center.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/custom.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/database_write.rb +1 -3
- data/lib/contrast/agent/assess/policy/propagator/insert.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/keep.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/match_data.rb +3 -2
- data/lib/contrast/agent/assess/policy/propagator/next.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/prepend.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/remove.rb +2 -4
- data/lib/contrast/agent/assess/policy/propagator/replace.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/reverse.rb +1 -2
- data/lib/contrast/agent/assess/policy/propagator/select.rb +3 -4
- data/lib/contrast/agent/assess/policy/propagator/splat.rb +2 -4
- data/lib/contrast/agent/assess/policy/propagator/split.rb +73 -117
- data/lib/contrast/agent/assess/policy/propagator/substitution.rb +11 -11
- data/lib/contrast/agent/assess/policy/propagator/trim.rb +3 -7
- data/lib/contrast/agent/assess/policy/source_method.rb +2 -14
- data/lib/contrast/agent/assess/policy/trigger/reflected_xss.rb +5 -8
- data/lib/contrast/agent/assess/policy/trigger/xpath.rb +1 -1
- data/lib/contrast/agent/assess/policy/trigger_validation/ssrf_validator.rb +1 -1
- data/lib/contrast/agent/assess/property/tagged.rb +21 -15
- data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +3 -2
- data/lib/contrast/agent/assess/rule/redos.rb +1 -1
- data/lib/contrast/agent/assess/tracker.rb +16 -18
- data/lib/contrast/agent/deadzone/policy/deadzone_node.rb +7 -0
- data/lib/contrast/agent/inventory.rb +15 -0
- data/lib/contrast/agent/inventory/dependencies.rb +50 -0
- data/lib/contrast/agent/inventory/dependency_analysis.rb +37 -0
- data/lib/contrast/agent/inventory/dependency_usage_analysis.rb +104 -0
- data/lib/contrast/agent/inventory/gemfile_digest_cache.rb +38 -0
- data/lib/contrast/agent/middleware.rb +51 -3
- data/lib/contrast/agent/patching/policy/method_policy.rb +1 -1
- data/lib/contrast/agent/patching/policy/patch.rb +6 -0
- data/lib/contrast/agent/protect/policy/applies_deserialization_rule.rb +47 -1
- data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +4 -3
- data/lib/contrast/agent/protect/policy/rule_applicator.rb +53 -0
- data/lib/contrast/agent/protect/rule/base.rb +63 -14
- data/lib/contrast/agent/protect/rule/cmd_injection.rb +12 -28
- data/lib/contrast/agent/protect/rule/default_scanner.rb +1 -4
- data/lib/contrast/agent/protect/rule/deserialization.rb +4 -1
- data/lib/contrast/agent/protect/rule/no_sqli.rb +3 -3
- data/lib/contrast/agent/protect/rule/sqli.rb +3 -3
- data/lib/contrast/agent/protect/rule/xxe.rb +32 -11
- data/lib/contrast/agent/protect/rule/xxe/entity_wrapper.rb +10 -6
- data/lib/contrast/agent/reaction_processor.rb +1 -1
- data/lib/contrast/agent/request_handler.rb +1 -1
- data/lib/contrast/agent/response.rb +5 -5
- data/lib/contrast/agent/rewriter.rb +3 -3
- data/lib/contrast/agent/scope.rb +81 -55
- data/lib/contrast/agent/static_analysis.rb +14 -8
- data/lib/contrast/agent/tracepoint_hook.rb +1 -1
- data/lib/contrast/agent/version.rb +1 -1
- data/lib/contrast/api/decorators.rb +3 -0
- data/lib/contrast/api/decorators/address.rb +0 -1
- data/lib/contrast/api/decorators/application_update.rb +1 -1
- data/lib/contrast/api/decorators/library.rb +54 -0
- data/lib/contrast/api/decorators/library_usage_update.rb +31 -0
- data/lib/contrast/api/decorators/trace_event.rb +19 -31
- data/lib/contrast/api/decorators/trace_event_object.rb +11 -3
- data/lib/contrast/api/decorators/trace_event_signature.rb +27 -5
- data/lib/contrast/api/decorators/user_input.rb +2 -1
- data/lib/contrast/common_agent_configuration.rb +2 -1
- data/lib/contrast/components/agent.rb +6 -5
- data/lib/contrast/components/assess.rb +36 -0
- data/lib/contrast/components/config.rb +29 -37
- data/lib/contrast/components/interface.rb +30 -6
- data/lib/contrast/components/inventory.rb +6 -1
- data/lib/contrast/components/scope.rb +72 -6
- data/lib/contrast/components/settings.rb +6 -3
- data/lib/contrast/config/assess_configuration.rb +2 -1
- data/lib/contrast/config/inventory_configuration.rb +2 -2
- data/lib/contrast/extension/assess/array.rb +2 -3
- data/lib/contrast/extension/assess/erb.rb +1 -3
- data/lib/contrast/extension/assess/exec_trigger.rb +1 -4
- data/lib/contrast/extension/assess/fiber.rb +2 -3
- data/lib/contrast/extension/assess/hash.rb +4 -2
- data/lib/contrast/extension/assess/kernel.rb +1 -2
- data/lib/contrast/extension/assess/marshal.rb +34 -26
- data/lib/contrast/extension/assess/regexp.rb +3 -8
- data/lib/contrast/extension/assess/string.rb +1 -2
- data/lib/contrast/framework/base_support.rb +51 -53
- data/lib/contrast/framework/manager.rb +3 -2
- data/lib/contrast/framework/rack/patch/session_cookie.rb +2 -2
- data/lib/contrast/framework/rack/support.rb +2 -1
- data/lib/contrast/framework/rails/patch/action_controller_live_buffer.rb +1 -1
- data/lib/contrast/framework/rails/patch/assess_configuration.rb +1 -1
- data/lib/contrast/framework/rails/patch/rails_application_configuration.rb +1 -1
- data/lib/contrast/framework/rails/rewrite/action_controller_railties_helper_inherited.rb +1 -1
- data/lib/contrast/framework/rails/rewrite/active_record_attribute_methods_read.rb +1 -1
- data/lib/contrast/framework/rails/rewrite/active_record_time_zone_inherited.rb +1 -1
- data/lib/contrast/framework/rails/support.rb +5 -1
- data/lib/contrast/framework/sinatra/support.rb +3 -2
- data/lib/contrast/logger/application.rb +1 -4
- data/lib/contrast/utils/duck_utils.rb +1 -1
- data/lib/contrast/utils/heap_dump_util.rb +1 -1
- data/lib/contrast/utils/inventory_util.rb +0 -7
- data/lib/contrast/utils/object_share.rb +3 -3
- data/lib/contrast/utils/preflight_util.rb +1 -1
- data/lib/contrast/utils/prevent_serialization.rb +1 -1
- data/lib/contrast/utils/resource_loader.rb +1 -1
- data/lib/contrast/utils/sha256_builder.rb +2 -14
- data/lib/contrast/utils/string_utils.rb +1 -1
- data/lib/contrast/utils/tag_util.rb +9 -13
- data/resources/assess/policy.json +9 -9
- data/resources/deadzone/policy.json +150 -0
- data/resources/protect/policy.json +12 -0
- data/ruby-agent.gemspec +10 -6
- data/service_executables/VERSION +1 -1
- data/service_executables/linux/contrast-service +0 -0
- data/service_executables/mac/contrast-service +0 -0
- metadata +76 -27
- data/lib/contrast/utils/boolean_util.rb +0 -30
- data/lib/contrast/utils/gemfile_reader.rb +0 -193
@@ -21,10 +21,10 @@ module Contrast
|
|
21
21
|
end
|
22
22
|
|
23
23
|
def infilter context, database, query_string
|
24
|
-
return
|
24
|
+
return unless infilter?(context)
|
25
25
|
|
26
26
|
result = find_attacker(context, query_string, database: database)
|
27
|
-
return
|
27
|
+
return unless result
|
28
28
|
|
29
29
|
append_to_activity(context, result)
|
30
30
|
|
@@ -36,7 +36,7 @@ module Contrast
|
|
36
36
|
|
37
37
|
attack_string = input_analysis_result.value
|
38
38
|
regexp = Regexp.new(Regexp.escape(attack_string), Regexp::IGNORECASE)
|
39
|
-
return
|
39
|
+
return unless query_string.match?(regexp)
|
40
40
|
|
41
41
|
scanner = select_scanner
|
42
42
|
ss = StringScanner.new(query_string)
|
@@ -22,10 +22,10 @@ module Contrast
|
|
22
22
|
end
|
23
23
|
|
24
24
|
def infilter context, database, query_string
|
25
|
-
return
|
25
|
+
return unless infilter?(context)
|
26
26
|
|
27
27
|
result = find_attacker(context, query_string, database: database)
|
28
|
-
return
|
28
|
+
return unless result
|
29
29
|
|
30
30
|
append_to_activity(context, result)
|
31
31
|
|
@@ -36,7 +36,7 @@ module Contrast
|
|
36
36
|
attack_string = input_analysis_result.value
|
37
37
|
regexp = Regexp.new(Regexp.escape(attack_string), Regexp::IGNORECASE)
|
38
38
|
|
39
|
-
return
|
39
|
+
return unless query_string.match?(regexp)
|
40
40
|
|
41
41
|
database = kwargs[:database]
|
42
42
|
scanner = select_scanner(database)
|
@@ -19,7 +19,9 @@ module Contrast
|
|
19
19
|
NAME
|
20
20
|
end
|
21
21
|
|
22
|
-
# Given an xml, evaluate it for an XXE attack.
|
22
|
+
# Given an xml, evaluate it for an XXE attack. There's no return here
|
23
|
+
# as this method handles appending the evaluation to the request
|
24
|
+
# context, connecting it to the reporting mechanism at request end.
|
23
25
|
#
|
24
26
|
# @param context [Contrast::Agent::RequestContext] the context of the
|
25
27
|
# request in which this input is evaluated.
|
@@ -29,7 +31,7 @@ module Contrast
|
|
29
31
|
# attack is found and the rule is in block mode.
|
30
32
|
def infilter context, framework, xml
|
31
33
|
result = find_attacker(context, xml, framework: framework)
|
32
|
-
return
|
34
|
+
return unless result
|
33
35
|
|
34
36
|
append_to_activity(context, result)
|
35
37
|
return unless blocked?
|
@@ -39,16 +41,23 @@ module Contrast
|
|
39
41
|
|
40
42
|
protected
|
41
43
|
|
44
|
+
# Given an XML, find any externally resolved entities and create an
|
45
|
+
# Attack Result for them
|
46
|
+
#
|
47
|
+
# @param context [Contrast::Agent::RequestContext] the context of the
|
48
|
+
# request in which this input is evaluated.
|
49
|
+
# @param xml [String] the literal value of the XML being checked for
|
50
|
+
# external entity resolution
|
51
|
+
# @param _kwargs [Hash]
|
52
|
+
# @return [Contrast::Api::Dtm::AttackResult, nil] the determination
|
53
|
+
# as to whether or not this XML has an XXE attack in it.
|
42
54
|
def find_attacker context, xml, **_kwargs
|
43
|
-
return
|
44
|
-
return
|
55
|
+
return unless xml
|
56
|
+
return if protect_excluded_by_code?
|
45
57
|
|
46
|
-
xxe_details
|
47
|
-
return
|
58
|
+
xxe_details = build_details(xml)
|
59
|
+
return unless xxe_details
|
48
60
|
|
49
|
-
# For our definition, the prolog goes from the start of the XML
|
50
|
-
# string to the end of the last entity declaration.
|
51
|
-
xxe_details.xml = Contrast::Utils::StringUtils.protobuf_safe_string(xml[0, last_idx])
|
52
61
|
ia_result = build_evaluation(xxe_details.xml)
|
53
62
|
build_attack_with_match(
|
54
63
|
context,
|
@@ -58,7 +67,15 @@ module Contrast
|
|
58
67
|
details: xxe_details)
|
59
68
|
end
|
60
69
|
|
61
|
-
|
70
|
+
# Given an XML determined to be unsafe, build out the details of the
|
71
|
+
# attack. The details will include a substring of the given XML up to
|
72
|
+
# the end of the prolog, where the external entities are declared.
|
73
|
+
#
|
74
|
+
# @param xml [String] the literal value of the XML being checked for
|
75
|
+
# external entity resolution
|
76
|
+
# @return [Contrast::Api::Dtm::XxeDetails] The details of
|
77
|
+
# the XXE attack and the index of the last entity discovered
|
78
|
+
def build_details xml
|
62
79
|
last_idx = 0
|
63
80
|
ss = StringScanner.new(xml)
|
64
81
|
while ss.scan_until(EXTERNAL_ENTITY_PATTERN)
|
@@ -70,7 +87,11 @@ module Contrast
|
|
70
87
|
xxe_details.declared_entities << build_match(ss)
|
71
88
|
xxe_details.entities_resolved << build_wrapper(entity_wrapper)
|
72
89
|
end
|
73
|
-
|
90
|
+
# For our definition, the prolog goes from the start of the XML
|
91
|
+
# string to the end of the last entity declaration.
|
92
|
+
xxe_details.xml = Contrast::Utils::StringUtils.protobuf_safe_string(xml[0, last_idx]) if xxe_details
|
93
|
+
|
94
|
+
xxe_details
|
74
95
|
end
|
75
96
|
|
76
97
|
def build_sample context, ia_result, _url, **kwargs
|
@@ -18,12 +18,16 @@ module Contrast
|
|
18
18
|
end
|
19
19
|
|
20
20
|
def external_entity?
|
21
|
-
@_external_entity
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
21
|
+
if @_external_entity.nil?
|
22
|
+
@_external_entity ||= if @system_id
|
23
|
+
external_id?(@system_id)
|
24
|
+
elsif @public_id
|
25
|
+
external_id?(@public_id)
|
26
|
+
else
|
27
|
+
false
|
28
|
+
end
|
26
29
|
end
|
30
|
+
@_external_entity
|
27
31
|
end
|
28
32
|
|
29
33
|
# <!ENTITY name SYSTEM "URI">
|
@@ -48,7 +52,7 @@ module Contrast
|
|
48
52
|
UP_DIR_LINUX = '../'
|
49
53
|
UP_DIR_WIN = '..\\'
|
50
54
|
# we only use this against lowercase strings, removed A-Z for speed
|
51
|
-
FILE_PATTERN_WINDOWS =
|
55
|
+
FILE_PATTERN_WINDOWS = /^\\*[a-z]{1,3}:.*/.cs__freeze
|
52
56
|
def external_id? entity_id
|
53
57
|
return false unless entity_id
|
54
58
|
|
@@ -22,7 +22,7 @@ module Contrast
|
|
22
22
|
# @param application_settings [Contrast::Api::Settings::ApplicationSettings]
|
23
23
|
# those settings which the Service has relayed from TeamServer.
|
24
24
|
def self.process application_settings
|
25
|
-
return
|
25
|
+
return unless application_settings&.reactions&.any?
|
26
26
|
|
27
27
|
application_settings.reactions.each do |reaction|
|
28
28
|
# the enums are all uppercase, we need to downcase them before attempting to log
|
@@ -18,7 +18,7 @@ module Contrast
|
|
18
18
|
end
|
19
19
|
|
20
20
|
def send_activity_messages
|
21
|
-
Contrast::
|
21
|
+
Contrast::Agent::Inventory::DependencyUsageAnalysis.instance.generate_library_usage(context.activity)
|
22
22
|
[context.server_activity, context.activity, context.observed_route].each do |message|
|
23
23
|
Contrast::Agent.messaging_queue.send_event_eventually(message)
|
24
24
|
end
|
@@ -118,16 +118,16 @@ module Contrast
|
|
118
118
|
# holds, wraps, or is the body of the Response
|
119
119
|
# @return [nil, String] the content of the body
|
120
120
|
def extract_body body
|
121
|
-
return
|
121
|
+
return unless body
|
122
122
|
|
123
123
|
if defined?(Rack::File) && body.is_a?(Rack::File)
|
124
124
|
# not sure what to do in this situation, so don't do anything.
|
125
125
|
nil
|
126
126
|
elsif body.is_a?(Rack::BodyProxy)
|
127
127
|
handle_rack_body_proxy(body)
|
128
|
-
elsif defined?(ActionDispatch::Response::RackBody) && body.is_a?(ActionDispatch::Response::RackBody)
|
129
|
-
|
130
|
-
|
128
|
+
elsif (defined?(ActionDispatch::Response::RackBody) && body.is_a?(ActionDispatch::Response::RackBody)) ||
|
129
|
+
body.is_a?(Rack::Response)
|
130
|
+
|
131
131
|
extract_body(body.body)
|
132
132
|
elsif Contrast::Utils::DuckUtils.quacks_to?(body, :each)
|
133
133
|
acc = []
|
@@ -152,7 +152,7 @@ module Contrast
|
|
152
152
|
end
|
153
153
|
|
154
154
|
def read_or_string obj
|
155
|
-
return
|
155
|
+
return unless obj
|
156
156
|
|
157
157
|
if Contrast::Utils::DuckUtils.quacks_to?(obj, :read)
|
158
158
|
tmp = obj.read
|
@@ -96,11 +96,11 @@ module Contrast
|
|
96
96
|
return unless method_exists?(clazz, method_name, type)
|
97
97
|
|
98
98
|
method_instance = method_instance(clazz, method_name, type)
|
99
|
-
return
|
99
|
+
return if method_instance.nil?
|
100
100
|
|
101
101
|
location = method_instance.source_location
|
102
|
-
return
|
103
|
-
return
|
102
|
+
return unless location_available?(location)
|
103
|
+
return if opener.written_from_location?(location)
|
104
104
|
|
105
105
|
opener.written_from_location!(location)
|
106
106
|
opener.source_code(location, method_name)
|
data/lib/contrast/agent/scope.rb
CHANGED
@@ -15,67 +15,93 @@ module Contrast
|
|
15
15
|
# Instead, we should say "If I'm already doing Contrast things, don't track
|
16
16
|
# this"
|
17
17
|
class Scope
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
# in_monkey_scope?
|
25
|
-
# with_monkey_scope { special_monkey_function }
|
26
|
-
SCOPE_LIST = %i[contrast deserialization].cs__freeze
|
27
|
-
|
28
|
-
iv_list = SCOPE_LIST.map { |name| :"@#{ name }_scope" }
|
29
|
-
define_method 'initialize' do
|
30
|
-
iv_list.each do |iv_sym|
|
31
|
-
instance_variable_set(iv_sym, 0)
|
32
|
-
end
|
18
|
+
SCOPE_LIST = %i[contrast deserialization split].cs__freeze
|
19
|
+
|
20
|
+
def initialize
|
21
|
+
@contrast_scope = 0
|
22
|
+
@deserialization_scope = 0
|
23
|
+
@split_scope = 0
|
33
24
|
end
|
34
25
|
|
35
|
-
|
36
|
-
|
26
|
+
def in_contrast_scope?
|
27
|
+
@contrast_scope.positive?
|
28
|
+
end
|
37
29
|
|
38
|
-
|
39
|
-
|
40
|
-
|
30
|
+
def in_deserialization_scope?
|
31
|
+
@deserialization_scope.positive?
|
32
|
+
end
|
41
33
|
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
instance_variable_set(iv_sym, level + 1)
|
46
|
-
end
|
34
|
+
def in_split_scope?
|
35
|
+
@split_scope.positive?
|
36
|
+
end
|
47
37
|
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
# every exit/enter pair (regardless of series)
|
52
|
-
# should cancel each other out.
|
53
|
-
#
|
54
|
-
# so we prefer this sequence:
|
55
|
-
# scope = 0
|
56
|
-
# exit = -1
|
57
|
-
# enter = 0
|
58
|
-
# enter = 1
|
59
|
-
# exit = 0
|
60
|
-
# scope = 0
|
61
|
-
#
|
62
|
-
# over this sequence:
|
63
|
-
# scope = 0
|
64
|
-
# exit = 0
|
65
|
-
# enter = 1
|
66
|
-
# enter = 2
|
67
|
-
# exit = 1
|
68
|
-
# scope = 1
|
69
|
-
level = instance_variable_get(iv_sym)
|
70
|
-
instance_variable_set(iv_sym, level - 1)
|
71
|
-
end
|
38
|
+
def enter_contrast_scope!
|
39
|
+
@contrast_scope += 1
|
40
|
+
end
|
72
41
|
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
42
|
+
def enter_deserialization_scope!
|
43
|
+
@deserialization_scope += 1
|
44
|
+
end
|
45
|
+
|
46
|
+
def enter_split_scope!
|
47
|
+
@split_scope += 1
|
48
|
+
end
|
49
|
+
|
50
|
+
def split_scope_depth
|
51
|
+
@split_scope
|
52
|
+
end
|
53
|
+
|
54
|
+
# Scope Exits...
|
55
|
+
# by design, can go below zero.
|
56
|
+
# every exit/enter pair (regardless of series)
|
57
|
+
# should cancel each other out.
|
58
|
+
#
|
59
|
+
# so we prefer this sequence:
|
60
|
+
# scope = 0
|
61
|
+
# exit = -1
|
62
|
+
# enter = 0
|
63
|
+
# enter = 1
|
64
|
+
# exit = 0
|
65
|
+
# scope = 0
|
66
|
+
#
|
67
|
+
# over this sequence:
|
68
|
+
# scope = 0
|
69
|
+
# exit = 0
|
70
|
+
# enter = 1
|
71
|
+
# enter = 2
|
72
|
+
# exit = 1
|
73
|
+
# scope = 1
|
74
|
+
def exit_contrast_scope!
|
75
|
+
@contrast_scope -= 1
|
76
|
+
end
|
77
|
+
|
78
|
+
def exit_deserialization_scope!
|
79
|
+
@deserialization_scope -= 1
|
80
|
+
end
|
81
|
+
|
82
|
+
def exit_split_scope!
|
83
|
+
@split_scope -= 1
|
84
|
+
end
|
85
|
+
|
86
|
+
def with_contrast_scope
|
87
|
+
enter_contrast_scope!
|
88
|
+
yield
|
89
|
+
ensure
|
90
|
+
exit_contrast_scope!
|
91
|
+
end
|
92
|
+
|
93
|
+
def with_deserialization_scope
|
94
|
+
enter_deserialization_scope!
|
95
|
+
yield
|
96
|
+
ensure
|
97
|
+
exit_deserialization_scope!
|
98
|
+
end
|
99
|
+
|
100
|
+
def with_split_scope
|
101
|
+
enter_split_scope!
|
102
|
+
yield
|
103
|
+
ensure
|
104
|
+
exit_split_scope!
|
79
105
|
end
|
80
106
|
|
81
107
|
# Dynamic versions of the above.
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/components/interface'
|
5
|
-
require 'contrast/
|
5
|
+
require 'contrast/agent/inventory'
|
6
6
|
require 'contrast/api/decorators/application_update'
|
7
7
|
|
8
8
|
module Contrast
|
@@ -17,14 +17,9 @@ module Contrast
|
|
17
17
|
# report the already-loaded gems.
|
18
18
|
def catchup
|
19
19
|
@_catchup ||= begin
|
20
|
-
|
21
|
-
|
22
|
-
send_inventory_message
|
23
|
-
true
|
24
|
-
end
|
20
|
+
threaded_analysis!
|
21
|
+
true
|
25
22
|
end
|
26
|
-
rescue StandardError => e
|
27
|
-
logger.warn('Unable to run post-initialization static analysis', e)
|
28
23
|
end
|
29
24
|
|
30
25
|
def send_inventory_message
|
@@ -35,6 +30,17 @@ module Contrast
|
|
35
30
|
Contrast::Utils::InventoryUtil.append_db_config(app_update_msg)
|
36
31
|
Contrast::Agent.messaging_queue.send_event_eventually(app_update_msg)
|
37
32
|
end
|
33
|
+
|
34
|
+
private
|
35
|
+
|
36
|
+
def threaded_analysis!
|
37
|
+
Contrast::Agent::Thread.new do
|
38
|
+
Contrast::Agent::Inventory::DependencyUsageAnalysis.instance.catchup
|
39
|
+
send_inventory_message
|
40
|
+
rescue StandardError => e
|
41
|
+
logger.warn('Unable to run post-initialization static analysis', e)
|
42
|
+
end
|
43
|
+
end
|
38
44
|
end
|
39
45
|
end
|
40
46
|
end
|
@@ -35,7 +35,7 @@ module Contrast
|
|
35
35
|
path = tracepoint_event.path
|
36
36
|
return if path&.include?('contrast')
|
37
37
|
|
38
|
-
Contrast::
|
38
|
+
Contrast::Agent::Inventory::DependencyUsageAnalysis.instance.associate_file(path) if path
|
39
39
|
Contrast::Agent::Patching::Policy::Patcher.patch_specific_module(loaded_module)
|
40
40
|
Contrast::Agent::Assess::Policy::RewriterPatch.rewrite_interpolation(loaded_module)
|
41
41
|
Contrast::Agent::Assess::Policy::PolicyScanner.scan(tracepoint_event)
|
@@ -8,11 +8,14 @@ module Contrast
|
|
8
8
|
end
|
9
9
|
end
|
10
10
|
end
|
11
|
+
|
11
12
|
require 'contrast/api/decorators/message'
|
12
13
|
require 'contrast/api/decorators/application_update'
|
13
14
|
require 'contrast/api/decorators/input_analysis'
|
14
15
|
require 'contrast/api/decorators/application_settings'
|
15
16
|
require 'contrast/api/decorators/server_features'
|
17
|
+
require 'contrast/api/decorators/library'
|
18
|
+
require 'contrast/api/decorators/library_usage_update'
|
16
19
|
require 'contrast/api/decorators/route_coverage'
|
17
20
|
require 'contrast/api/decorators/trace_event_object'
|
18
21
|
require 'contrast/api/decorators/trace_event_signature'
|