dccscr 0.1.0 → 0.2.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 617eae30347338acd467d9b6e3fdbb39c98263657fa8e4caa57eca15890f81ad
4
- data.tar.gz: '09ced8194847fe70669147f19a39d6897b5bf8629cffb4047ab9c89c63666f56'
3
+ metadata.gz: 261894021f66c455747ff0bf23dae30fa2a1e6f81c49eec8ca5259452c5ee394
4
+ data.tar.gz: fc290c6ac35dfd3f9448350b56af6483a29247b5d633b217e1e0d2af9c87f541
5
5
  SHA512:
6
- metadata.gz: 5c109477378e93fc74be29651ef02b4ac5e0e26beda4a71c623d27c9b5522fdeb7d45075c14b0f3ae40cbba7eedacc8cfcd0ce72e9f0b70b5a321c28cbe8efa6
7
- data.tar.gz: 0e8bf782254e2ae32263399f166209ebf551aa8bba9c97ad2ae8cf22f85b522f04d2b46d12a00dde978341fbcd6e5bb37685f1de1376f13a96c9509ed19cda2c
6
+ metadata.gz: 0064c33c1810b27a0221a833c9269c70eed53f60206a4ce1d0f9b25fbe0b15dda1532e6e73bb0e91628d8243ab500f48ad9899e3f61c5f788eebf12ee3c2977e
7
+ data.tar.gz: 30faf367d582d3ad191977cca89d8337df665fde843709af991b3e5eba408c6f71f9de396fe9d44f11b0fe074cdfa7989833371f092229b2c04c684ab3bb5bd6
data/.gitignore CHANGED
@@ -1,3 +1,7 @@
1
+ /vulnerability-allowlist.yml
2
+ /local-vulnerability-allowlist.yml
3
+ /vendor/
4
+
1
5
  /.bundle/
2
6
  /.yardoc
3
7
  /_yardoc/
@@ -6,4 +10,3 @@
6
10
  /pkg/
7
11
  /spec/reports/
8
12
  /tmp/
9
- /vendor/
data/.rubocop.yml CHANGED
@@ -11,6 +11,9 @@ Metrics/MethodLength:
11
11
  Naming/InclusiveLanguage:
12
12
  Enabled: false
13
13
 
14
+ Naming/MethodParameterName:
15
+ MinNameLength: 2
16
+
14
17
  Style/BlockDelimiters:
15
18
  Enabled: false
16
19
 
data/Gemfile.lock CHANGED
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- dccscr (0.1.0)
4
+ dccscr (0.2.3)
5
5
 
6
6
  GEM
7
7
  remote: https://rubygems.org/
@@ -0,0 +1,74 @@
1
+ #!/usr/bin/env ruby
2
+ # frozen_string_literal: true
3
+
4
+ require 'dccscr/whitelist'
5
+
6
+ def load_dccscr_whitelist
7
+ DCCSCR::Whitelist.new.tap do |wl|
8
+ # load wl entries for args
9
+ # will load parents as well
10
+ ARGV.each { |arg| wl[arg] }
11
+ end
12
+ end
13
+
14
+ def load_gitlab_allowlist
15
+ if File.exist?('local-vulnerability-allowlist.yml')
16
+ warn 'Loading local-vulnerability-allowlist.yml'
17
+ YAML.safe_load(File.read('local-vulnerability-allowlist.yml'))
18
+ elsif File.exist?('vulnerability-allowlist.yml')
19
+ warn 'Loading and renaming vulnerability-allowlist.yml'
20
+ File.rename('vulnerability-allowlist.yml', 'local-vulnerability-allowlist.yml')
21
+ YAML.safe_load(File.read('local-vulnerability-allowlist.yml'))
22
+ else
23
+ warn 'No [local-]vulnerability-allowlist.yml'
24
+ {}
25
+ end
26
+ end
27
+
28
+ def allow_list_dccscr(wl)
29
+ warn 'Generating dccscr list in gitlab format'
30
+
31
+ {
32
+ 'generalallowlist' => Hash[
33
+ wl.entries.map { |_, entry|
34
+ entry.value['whitelisted_vulnerabilities'].map { |v|
35
+ [v['vulnerability'], "dccscr-whitelists:\n#{v['justification']}"]
36
+ }.compact
37
+ }.flatten(1).sort
38
+ ]
39
+ }
40
+ end
41
+
42
+ def combined_list(dl, ll)
43
+ warn 'Merging dccscr and local lists'
44
+
45
+ dl.merge(ll) { |_, d, l|
46
+ case d
47
+ when Hash
48
+ d.merge(l)
49
+ else
50
+ l
51
+ end
52
+ }
53
+ end
54
+
55
+ def update_allow_list_file(cl)
56
+ warn 'Updating vulnerability-allowlist.yml'
57
+
58
+ File.open('vulnerability-allowlist.yml', 'w') do |f|
59
+ f << cl.to_yaml
60
+ end
61
+ end
62
+
63
+ def run
64
+ ll = load_gitlab_allowlist
65
+
66
+ wl = load_dccscr_whitelist
67
+ dl = allow_list_dccscr(wl)
68
+
69
+ cl = combined_list(dl, ll)
70
+
71
+ update_allow_list_file(cl)
72
+ end
73
+
74
+ run
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module DCCSCR
4
- VERSION = '0.1.0'
4
+ VERSION = '0.2.3'
5
5
  end
@@ -48,7 +48,7 @@ module DCCSCR
48
48
  def initialize(whitelist:, subpath:, greylist: "#{File.basename(subpath)}.greylist")
49
49
  @value = JSON.parse(File.read(File.join(whitelist.path, subpath, greylist)))
50
50
 
51
- whitelist[@parent] unless (@parent = @value['image_parent_name']).empty?
51
+ whitelist[@parent] unless (@parent = @value['image_parent_name'])&.empty?
52
52
  end
53
53
  end
54
54
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dccscr
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.2.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - Frank J. Cameron
@@ -14,7 +14,7 @@ description:
14
14
  email:
15
15
  - fjc@fastmail.net
16
16
  executables:
17
- - dccscr_to_gitlab
17
+ - update_allowlist_with_dccscr
18
18
  extensions: []
19
19
  extra_rdoc_files: []
20
20
  files:
@@ -30,7 +30,7 @@ files:
30
30
  - bin/console
31
31
  - bin/setup
32
32
  - dccscr.gemspec
33
- - exe/dccscr_to_gitlab
33
+ - exe/update_allowlist_with_dccscr
34
34
  - lib/dccscr.rb
35
35
  - lib/dccscr/version.rb
36
36
  - lib/dccscr/whitelist.rb
data/exe/dccscr_to_gitlab DELETED
@@ -1,34 +0,0 @@
1
- #!/usr/bin/env ruby
2
- # frozen_string_literal: true
3
-
4
- require 'dccscr/whitelist'
5
-
6
- wl = DCCSCR::Whitelist.new
7
-
8
- ARGV.each { |arg| wl[arg] }
9
-
10
- local_list = begin
11
- YAML.safe_load(File.read('vulnerability-allowlist.yml'))
12
- rescue Errno::ENOENT
13
- warn $!.message
14
- {}
15
- end
16
-
17
- dccscr_list = {
18
- 'generalallowlist' => Hash[
19
- wl.entries.map { |_, entry|
20
- entry.value['whitelisted_vulnerabilities'].map { |v|
21
- [v['vulnerability'], "dccscr-whitelists:\n#{v['justification']}"]
22
- }
23
- }.flatten(1).sort
24
- ]
25
- }
26
-
27
- puts dccscr_list.merge(local_list) { |_, dl, ll|
28
- case dl
29
- when Hash
30
- dl.merge(ll)
31
- else
32
- ll
33
- end
34
- }.to_yaml