dccscr 0.1.0 → 0.2.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.gitignore +4 -1
- data/.rubocop.yml +3 -0
- data/Gemfile.lock +1 -1
- data/exe/update_allowlist_with_dccscr +74 -0
- data/lib/dccscr/version.rb +1 -1
- data/lib/dccscr/whitelist.rb +1 -1
- metadata +3 -3
- data/exe/dccscr_to_gitlab +0 -34
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 261894021f66c455747ff0bf23dae30fa2a1e6f81c49eec8ca5259452c5ee394
|
4
|
+
data.tar.gz: fc290c6ac35dfd3f9448350b56af6483a29247b5d633b217e1e0d2af9c87f541
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 0064c33c1810b27a0221a833c9269c70eed53f60206a4ce1d0f9b25fbe0b15dda1532e6e73bb0e91628d8243ab500f48ad9899e3f61c5f788eebf12ee3c2977e
|
7
|
+
data.tar.gz: 30faf367d582d3ad191977cca89d8337df665fde843709af991b3e5eba408c6f71f9de396fe9d44f11b0fe074cdfa7989833371f092229b2c04c684ab3bb5bd6
|
data/.gitignore
CHANGED
data/.rubocop.yml
CHANGED
data/Gemfile.lock
CHANGED
@@ -0,0 +1,74 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
# frozen_string_literal: true
|
3
|
+
|
4
|
+
require 'dccscr/whitelist'
|
5
|
+
|
6
|
+
def load_dccscr_whitelist
|
7
|
+
DCCSCR::Whitelist.new.tap do |wl|
|
8
|
+
# load wl entries for args
|
9
|
+
# will load parents as well
|
10
|
+
ARGV.each { |arg| wl[arg] }
|
11
|
+
end
|
12
|
+
end
|
13
|
+
|
14
|
+
def load_gitlab_allowlist
|
15
|
+
if File.exist?('local-vulnerability-allowlist.yml')
|
16
|
+
warn 'Loading local-vulnerability-allowlist.yml'
|
17
|
+
YAML.safe_load(File.read('local-vulnerability-allowlist.yml'))
|
18
|
+
elsif File.exist?('vulnerability-allowlist.yml')
|
19
|
+
warn 'Loading and renaming vulnerability-allowlist.yml'
|
20
|
+
File.rename('vulnerability-allowlist.yml', 'local-vulnerability-allowlist.yml')
|
21
|
+
YAML.safe_load(File.read('local-vulnerability-allowlist.yml'))
|
22
|
+
else
|
23
|
+
warn 'No [local-]vulnerability-allowlist.yml'
|
24
|
+
{}
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
def allow_list_dccscr(wl)
|
29
|
+
warn 'Generating dccscr list in gitlab format'
|
30
|
+
|
31
|
+
{
|
32
|
+
'generalallowlist' => Hash[
|
33
|
+
wl.entries.map { |_, entry|
|
34
|
+
entry.value['whitelisted_vulnerabilities'].map { |v|
|
35
|
+
[v['vulnerability'], "dccscr-whitelists:\n#{v['justification']}"]
|
36
|
+
}.compact
|
37
|
+
}.flatten(1).sort
|
38
|
+
]
|
39
|
+
}
|
40
|
+
end
|
41
|
+
|
42
|
+
def combined_list(dl, ll)
|
43
|
+
warn 'Merging dccscr and local lists'
|
44
|
+
|
45
|
+
dl.merge(ll) { |_, d, l|
|
46
|
+
case d
|
47
|
+
when Hash
|
48
|
+
d.merge(l)
|
49
|
+
else
|
50
|
+
l
|
51
|
+
end
|
52
|
+
}
|
53
|
+
end
|
54
|
+
|
55
|
+
def update_allow_list_file(cl)
|
56
|
+
warn 'Updating vulnerability-allowlist.yml'
|
57
|
+
|
58
|
+
File.open('vulnerability-allowlist.yml', 'w') do |f|
|
59
|
+
f << cl.to_yaml
|
60
|
+
end
|
61
|
+
end
|
62
|
+
|
63
|
+
def run
|
64
|
+
ll = load_gitlab_allowlist
|
65
|
+
|
66
|
+
wl = load_dccscr_whitelist
|
67
|
+
dl = allow_list_dccscr(wl)
|
68
|
+
|
69
|
+
cl = combined_list(dl, ll)
|
70
|
+
|
71
|
+
update_allow_list_file(cl)
|
72
|
+
end
|
73
|
+
|
74
|
+
run
|
data/lib/dccscr/version.rb
CHANGED
data/lib/dccscr/whitelist.rb
CHANGED
@@ -48,7 +48,7 @@ module DCCSCR
|
|
48
48
|
def initialize(whitelist:, subpath:, greylist: "#{File.basename(subpath)}.greylist")
|
49
49
|
@value = JSON.parse(File.read(File.join(whitelist.path, subpath, greylist)))
|
50
50
|
|
51
|
-
whitelist[@parent] unless (@parent = @value['image_parent_name'])
|
51
|
+
whitelist[@parent] unless (@parent = @value['image_parent_name'])&.empty?
|
52
52
|
end
|
53
53
|
end
|
54
54
|
end
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: dccscr
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.2.3
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Frank J. Cameron
|
@@ -14,7 +14,7 @@ description:
|
|
14
14
|
email:
|
15
15
|
- fjc@fastmail.net
|
16
16
|
executables:
|
17
|
-
-
|
17
|
+
- update_allowlist_with_dccscr
|
18
18
|
extensions: []
|
19
19
|
extra_rdoc_files: []
|
20
20
|
files:
|
@@ -30,7 +30,7 @@ files:
|
|
30
30
|
- bin/console
|
31
31
|
- bin/setup
|
32
32
|
- dccscr.gemspec
|
33
|
-
- exe/
|
33
|
+
- exe/update_allowlist_with_dccscr
|
34
34
|
- lib/dccscr.rb
|
35
35
|
- lib/dccscr/version.rb
|
36
36
|
- lib/dccscr/whitelist.rb
|
data/exe/dccscr_to_gitlab
DELETED
@@ -1,34 +0,0 @@
|
|
1
|
-
#!/usr/bin/env ruby
|
2
|
-
# frozen_string_literal: true
|
3
|
-
|
4
|
-
require 'dccscr/whitelist'
|
5
|
-
|
6
|
-
wl = DCCSCR::Whitelist.new
|
7
|
-
|
8
|
-
ARGV.each { |arg| wl[arg] }
|
9
|
-
|
10
|
-
local_list = begin
|
11
|
-
YAML.safe_load(File.read('vulnerability-allowlist.yml'))
|
12
|
-
rescue Errno::ENOENT
|
13
|
-
warn $!.message
|
14
|
-
{}
|
15
|
-
end
|
16
|
-
|
17
|
-
dccscr_list = {
|
18
|
-
'generalallowlist' => Hash[
|
19
|
-
wl.entries.map { |_, entry|
|
20
|
-
entry.value['whitelisted_vulnerabilities'].map { |v|
|
21
|
-
[v['vulnerability'], "dccscr-whitelists:\n#{v['justification']}"]
|
22
|
-
}
|
23
|
-
}.flatten(1).sort
|
24
|
-
]
|
25
|
-
}
|
26
|
-
|
27
|
-
puts dccscr_list.merge(local_list) { |_, dl, ll|
|
28
|
-
case dl
|
29
|
-
when Hash
|
30
|
-
dl.merge(ll)
|
31
|
-
else
|
32
|
-
ll
|
33
|
-
end
|
34
|
-
}.to_yaml
|