@loxia-labs/loxia-autopilot-one 1.0.1 → 1.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +44 -54
- package/bin/cli.js +1 -115
- package/bin/loxia-terminal-v2.js +3 -0
- package/bin/loxia-terminal.js +3 -0
- package/bin/start-with-terminal.js +3 -0
- package/package.json +14 -15
- package/scripts/install-scanners.js +1 -235
- package/src/analyzers/CSSAnalyzer.js +1 -297
- package/src/analyzers/ConfigValidator.js +1 -690
- package/src/analyzers/ESLintAnalyzer.js +1 -320
- package/src/analyzers/JavaScriptAnalyzer.js +1 -261
- package/src/analyzers/PrettierFormatter.js +1 -247
- package/src/analyzers/PythonAnalyzer.js +1 -266
- package/src/analyzers/SecurityAnalyzer.js +1 -729
- package/src/analyzers/TypeScriptAnalyzer.js +1 -247
- package/src/analyzers/codeCloneDetector/analyzer.js +1 -344
- package/src/analyzers/codeCloneDetector/detector.js +1 -203
- package/src/analyzers/codeCloneDetector/index.js +1 -160
- package/src/analyzers/codeCloneDetector/parser.js +1 -199
- package/src/analyzers/codeCloneDetector/reporter.js +1 -148
- package/src/analyzers/codeCloneDetector/scanner.js +1 -59
- package/src/core/agentPool.js +1 -1474
- package/src/core/agentScheduler.js +1 -2147
- package/src/core/contextManager.js +1 -709
- package/src/core/messageProcessor.js +1 -732
- package/src/core/orchestrator.js +1 -548
- package/src/core/stateManager.js +1 -877
- package/src/index.js +1 -631
- package/src/interfaces/cli.js +1 -549
- package/src/interfaces/terminal/__tests__/smoke/advancedFeatures.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/agentControl.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/agents.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/components.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/connection.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/enhancements.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/imports.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/messages.test.js +1 -0
- package/src/interfaces/terminal/__tests__/smoke/tools.test.js +1 -0
- package/src/interfaces/terminal/api/apiClient.js +1 -0
- package/src/interfaces/terminal/api/messageRouter.js +1 -0
- package/src/interfaces/terminal/api/session.js +1 -0
- package/src/interfaces/terminal/api/websocket.js +1 -0
- package/src/interfaces/terminal/components/AgentCreator.js +1 -0
- package/src/interfaces/terminal/components/AgentEditor.js +1 -0
- package/src/interfaces/terminal/components/AgentSwitcher.js +1 -0
- package/src/interfaces/terminal/components/ErrorBoundary.js +1 -0
- package/src/interfaces/terminal/components/ErrorPanel.js +1 -0
- package/src/interfaces/terminal/components/Header.js +1 -0
- package/src/interfaces/terminal/components/HelpPanel.js +1 -0
- package/src/interfaces/terminal/components/InputBox.js +1 -0
- package/src/interfaces/terminal/components/Layout.js +1 -0
- package/src/interfaces/terminal/components/LoadingSpinner.js +1 -0
- package/src/interfaces/terminal/components/MessageList.js +1 -0
- package/src/interfaces/terminal/components/MultilineTextInput.js +1 -0
- package/src/interfaces/terminal/components/SearchPanel.js +1 -0
- package/src/interfaces/terminal/components/SettingsPanel.js +1 -0
- package/src/interfaces/terminal/components/StatusBar.js +1 -0
- package/src/interfaces/terminal/components/TextInput.js +1 -0
- package/src/interfaces/terminal/config/agentEditorConstants.js +1 -0
- package/src/interfaces/terminal/config/constants.js +1 -0
- package/src/interfaces/terminal/index.js +1 -0
- package/src/interfaces/terminal/state/useAgentControl.js +1 -0
- package/src/interfaces/terminal/state/useAgents.js +1 -0
- package/src/interfaces/terminal/state/useConnection.js +1 -0
- package/src/interfaces/terminal/state/useMessages.js +1 -0
- package/src/interfaces/terminal/state/useTools.js +1 -0
- package/src/interfaces/terminal/utils/debugLogger.js +1 -0
- package/src/interfaces/terminal/utils/settingsStorage.js +1 -0
- package/src/interfaces/terminal/utils/theme.js +1 -0
- package/src/interfaces/webServer.js +1 -2162
- package/src/modules/fileExplorer/controller.js +1 -280
- package/src/modules/fileExplorer/index.js +1 -37
- package/src/modules/fileExplorer/middleware.js +1 -92
- package/src/modules/fileExplorer/routes.js +1 -125
- package/src/modules/fileExplorer/types.js +1 -44
- package/src/services/aiService.js +1 -1232
- package/src/services/apiKeyManager.js +1 -164
- package/src/services/benchmarkService.js +1 -366
- package/src/services/budgetService.js +1 -539
- package/src/services/contextInjectionService.js +1 -247
- package/src/services/conversationCompactionService.js +1 -637
- package/src/services/errorHandler.js +1 -810
- package/src/services/fileAttachmentService.js +1 -544
- package/src/services/modelRouterService.js +1 -366
- package/src/services/modelsService.js +1 -322
- package/src/services/qualityInspector.js +1 -796
- package/src/services/tokenCountingService.js +1 -536
- package/src/tools/agentCommunicationTool.js +1 -1344
- package/src/tools/agentDelayTool.js +1 -485
- package/src/tools/asyncToolManager.js +1 -604
- package/src/tools/baseTool.js +1 -800
- package/src/tools/browserTool.js +1 -920
- package/src/tools/cloneDetectionTool.js +1 -621
- package/src/tools/dependencyResolverTool.js +1 -1215
- package/src/tools/fileContentReplaceTool.js +1 -875
- package/src/tools/fileSystemTool.js +1 -1107
- package/src/tools/fileTreeTool.js +1 -853
- package/src/tools/imageTool.js +1 -901
- package/src/tools/importAnalyzerTool.js +1 -1060
- package/src/tools/jobDoneTool.js +1 -248
- package/src/tools/seekTool.js +1 -956
- package/src/tools/staticAnalysisTool.js +1 -1778
- package/src/tools/taskManagerTool.js +1 -2873
- package/src/tools/terminalTool.js +1 -2304
- package/src/tools/webTool.js +1 -1430
- package/src/types/agent.js +1 -519
- package/src/types/contextReference.js +1 -972
- package/src/types/conversation.js +1 -730
- package/src/types/toolCommand.js +1 -747
- package/src/utilities/attachmentValidator.js +1 -292
- package/src/utilities/configManager.js +1 -582
- package/src/utilities/constants.js +1 -722
- package/src/utilities/directoryAccessManager.js +1 -535
- package/src/utilities/fileProcessor.js +1 -307
- package/src/utilities/logger.js +1 -436
- package/src/utilities/tagParser.js +1 -1246
- package/src/utilities/toolConstants.js +1 -317
- package/web-ui/build/index.html +2 -2
- package/web-ui/build/static/{index-Dy2bYbOa.css → index-CClD1090.css} +1 -1
- package/web-ui/build/static/{index-CjkkcnFA.js → index-lCBai6dX.js} +66 -67
|
@@ -1,690 +1 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* ConfigValidator - Validate configuration files for errors and security issues
|
|
3
|
-
*
|
|
4
|
-
* Validates common configuration files:
|
|
5
|
-
* - package.json, tsconfig.json (JSON Schema)
|
|
6
|
-
* - Dockerfile (hadolint)
|
|
7
|
-
* - docker-compose.yml (yamllint)
|
|
8
|
-
* - Kubernetes YAML (checkov, yamllint)
|
|
9
|
-
* - Terraform (checkov)
|
|
10
|
-
* - .env files (secret detection)
|
|
11
|
-
* - GitHub Actions workflows (yamllint)
|
|
12
|
-
*/
|
|
13
|
-
|
|
14
|
-
import { exec } from 'child_process';
|
|
15
|
-
import { promisify } from 'util';
|
|
16
|
-
import path from 'path';
|
|
17
|
-
import fs from 'fs/promises';
|
|
18
|
-
import { STATIC_ANALYSIS } from '../utilities/constants.js';
|
|
19
|
-
|
|
20
|
-
const execAsync = promisify(exec);
|
|
21
|
-
|
|
22
|
-
class ConfigValidator {
|
|
23
|
-
constructor(logger = null) {
|
|
24
|
-
this.logger = logger;
|
|
25
|
-
this.availableScanners = null;
|
|
26
|
-
this.scannerCache = new Map();
|
|
27
|
-
}
|
|
28
|
-
|
|
29
|
-
/**
|
|
30
|
-
* Detect which validation tools are available
|
|
31
|
-
* @returns {Promise<Object>} Available validators
|
|
32
|
-
*/
|
|
33
|
-
async detectAvailableValidators() {
|
|
34
|
-
// Return cached result if available
|
|
35
|
-
if (this.availableScanners !== null) {
|
|
36
|
-
return this.availableScanners;
|
|
37
|
-
}
|
|
38
|
-
|
|
39
|
-
const available = {
|
|
40
|
-
checkov: false,
|
|
41
|
-
hadolint: false,
|
|
42
|
-
yamllint: false,
|
|
43
|
-
jsonSchema: false
|
|
44
|
-
};
|
|
45
|
-
|
|
46
|
-
// Check for checkov (Infrastructure as Code scanner)
|
|
47
|
-
try {
|
|
48
|
-
await execAsync('checkov --version', { timeout: 5000 });
|
|
49
|
-
available.checkov = true;
|
|
50
|
-
this.logger?.debug('checkov detected');
|
|
51
|
-
} catch (error) {
|
|
52
|
-
this.logger?.debug('checkov not available', { error: error.message });
|
|
53
|
-
}
|
|
54
|
-
|
|
55
|
-
// Check for hadolint (Dockerfile linter)
|
|
56
|
-
try {
|
|
57
|
-
await execAsync('hadolint --version', { timeout: 5000 });
|
|
58
|
-
available.hadolint = true;
|
|
59
|
-
this.logger?.debug('hadolint detected');
|
|
60
|
-
} catch (error) {
|
|
61
|
-
this.logger?.debug('hadolint not available', { error: error.message });
|
|
62
|
-
}
|
|
63
|
-
|
|
64
|
-
// Check for yamllint (YAML linter)
|
|
65
|
-
try {
|
|
66
|
-
await execAsync('yamllint --version', { timeout: 5000 });
|
|
67
|
-
available.yamllint = true;
|
|
68
|
-
this.logger?.debug('yamllint detected');
|
|
69
|
-
} catch (error) {
|
|
70
|
-
this.logger?.debug('yamllint not available', { error: error.message });
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
// Check for ajv (JSON Schema validation - npm package)
|
|
74
|
-
try {
|
|
75
|
-
await import('ajv');
|
|
76
|
-
available.jsonSchema = true;
|
|
77
|
-
this.logger?.debug('JSON Schema validation available');
|
|
78
|
-
} catch (error) {
|
|
79
|
-
this.logger?.debug('ajv not available', { error: error.message });
|
|
80
|
-
}
|
|
81
|
-
|
|
82
|
-
this.availableScanners = available;
|
|
83
|
-
return available;
|
|
84
|
-
}
|
|
85
|
-
|
|
86
|
-
/**
|
|
87
|
-
* Validate a configuration file
|
|
88
|
-
* @param {string} filePath - Path to config file
|
|
89
|
-
* @param {Object} options - Validation options
|
|
90
|
-
* @returns {Promise<Array>} Validation issues
|
|
91
|
-
*/
|
|
92
|
-
async validate(filePath, options = {}) {
|
|
93
|
-
const issues = [];
|
|
94
|
-
const available = await this.detectAvailableValidators();
|
|
95
|
-
const fileType = this.detectFileType(filePath);
|
|
96
|
-
|
|
97
|
-
this.logger?.debug('Validating config file', { filePath, fileType });
|
|
98
|
-
|
|
99
|
-
// Route to appropriate validator based on file type
|
|
100
|
-
switch (fileType) {
|
|
101
|
-
case 'dockerfile':
|
|
102
|
-
if (available.hadolint) {
|
|
103
|
-
const hadolintIssues = await this.validateDockerfile(filePath, options);
|
|
104
|
-
issues.push(...hadolintIssues);
|
|
105
|
-
}
|
|
106
|
-
if (available.checkov) {
|
|
107
|
-
const checkovIssues = await this.validateWithCheckov(filePath, 'dockerfile', options);
|
|
108
|
-
issues.push(...checkovIssues);
|
|
109
|
-
}
|
|
110
|
-
break;
|
|
111
|
-
|
|
112
|
-
case 'docker-compose':
|
|
113
|
-
if (available.yamllint) {
|
|
114
|
-
const yamlIssues = await this.validateYAML(filePath, options);
|
|
115
|
-
issues.push(...yamlIssues);
|
|
116
|
-
}
|
|
117
|
-
if (available.checkov) {
|
|
118
|
-
const checkovIssues = await this.validateWithCheckov(filePath, 'docker_compose', options);
|
|
119
|
-
issues.push(...checkovIssues);
|
|
120
|
-
}
|
|
121
|
-
break;
|
|
122
|
-
|
|
123
|
-
case 'kubernetes':
|
|
124
|
-
if (available.yamllint) {
|
|
125
|
-
const yamlIssues = await this.validateYAML(filePath, options);
|
|
126
|
-
issues.push(...yamlIssues);
|
|
127
|
-
}
|
|
128
|
-
if (available.checkov) {
|
|
129
|
-
const checkovIssues = await this.validateWithCheckov(filePath, 'kubernetes', options);
|
|
130
|
-
issues.push(...checkovIssues);
|
|
131
|
-
}
|
|
132
|
-
break;
|
|
133
|
-
|
|
134
|
-
case 'terraform':
|
|
135
|
-
if (available.checkov) {
|
|
136
|
-
const checkovIssues = await this.validateWithCheckov(filePath, 'terraform', options);
|
|
137
|
-
issues.push(...checkovIssues);
|
|
138
|
-
}
|
|
139
|
-
break;
|
|
140
|
-
|
|
141
|
-
case 'package.json':
|
|
142
|
-
if (available.jsonSchema) {
|
|
143
|
-
const schemaIssues = await this.validatePackageJson(filePath, options);
|
|
144
|
-
issues.push(...schemaIssues);
|
|
145
|
-
}
|
|
146
|
-
break;
|
|
147
|
-
|
|
148
|
-
case 'tsconfig.json':
|
|
149
|
-
if (available.jsonSchema) {
|
|
150
|
-
const schemaIssues = await this.validateTsConfig(filePath, options);
|
|
151
|
-
issues.push(...schemaIssues);
|
|
152
|
-
}
|
|
153
|
-
break;
|
|
154
|
-
|
|
155
|
-
case 'github-actions':
|
|
156
|
-
if (available.yamllint) {
|
|
157
|
-
const yamlIssues = await this.validateYAML(filePath, options);
|
|
158
|
-
issues.push(...yamlIssues);
|
|
159
|
-
}
|
|
160
|
-
break;
|
|
161
|
-
|
|
162
|
-
case 'env':
|
|
163
|
-
// Always check .env files for secrets (no external tool needed)
|
|
164
|
-
const secretIssues = await this.validateEnvFile(filePath, options);
|
|
165
|
-
issues.push(...secretIssues);
|
|
166
|
-
break;
|
|
167
|
-
|
|
168
|
-
case 'yaml':
|
|
169
|
-
if (available.yamllint) {
|
|
170
|
-
const yamlIssues = await this.validateYAML(filePath, options);
|
|
171
|
-
issues.push(...yamlIssues);
|
|
172
|
-
}
|
|
173
|
-
break;
|
|
174
|
-
|
|
175
|
-
default:
|
|
176
|
-
this.logger?.warn('Unknown config file type', { filePath, fileType });
|
|
177
|
-
return [];
|
|
178
|
-
}
|
|
179
|
-
|
|
180
|
-
return this.normalizeResults(issues);
|
|
181
|
-
}
|
|
182
|
-
|
|
183
|
-
/**
|
|
184
|
-
* Validate Dockerfile using hadolint
|
|
185
|
-
* @private
|
|
186
|
-
*/
|
|
187
|
-
async validateDockerfile(filePath, options = {}) {
|
|
188
|
-
try {
|
|
189
|
-
const result = await execAsync(
|
|
190
|
-
`hadolint --format json "${filePath}"`,
|
|
191
|
-
{
|
|
192
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
193
|
-
timeout: 30000
|
|
194
|
-
}
|
|
195
|
-
);
|
|
196
|
-
|
|
197
|
-
const output = JSON.parse(result.stdout);
|
|
198
|
-
return this.parseHadolintResults(output, filePath);
|
|
199
|
-
} catch (error) {
|
|
200
|
-
// hadolint exits with non-zero if issues found
|
|
201
|
-
if (error.stdout) {
|
|
202
|
-
try {
|
|
203
|
-
const output = JSON.parse(error.stdout);
|
|
204
|
-
return this.parseHadolintResults(output, filePath);
|
|
205
|
-
} catch (parseError) {
|
|
206
|
-
this.logger?.error('Failed to parse hadolint output', {
|
|
207
|
-
error: parseError.message
|
|
208
|
-
});
|
|
209
|
-
}
|
|
210
|
-
}
|
|
211
|
-
this.logger?.error('hadolint validation failed', { error: error.message });
|
|
212
|
-
return [];
|
|
213
|
-
}
|
|
214
|
-
}
|
|
215
|
-
|
|
216
|
-
/**
|
|
217
|
-
* Parse hadolint results
|
|
218
|
-
* @private
|
|
219
|
-
*/
|
|
220
|
-
parseHadolintResults(output, filePath) {
|
|
221
|
-
const issues = [];
|
|
222
|
-
|
|
223
|
-
if (Array.isArray(output)) {
|
|
224
|
-
for (const issue of output) {
|
|
225
|
-
issues.push({
|
|
226
|
-
file: filePath,
|
|
227
|
-
line: issue.line || 1,
|
|
228
|
-
column: issue.column || 1,
|
|
229
|
-
severity: this.mapHadolintSeverity(issue.level),
|
|
230
|
-
rule: issue.code,
|
|
231
|
-
message: issue.message,
|
|
232
|
-
category: 'dockerfile',
|
|
233
|
-
validator: 'hadolint'
|
|
234
|
-
});
|
|
235
|
-
}
|
|
236
|
-
}
|
|
237
|
-
|
|
238
|
-
return issues;
|
|
239
|
-
}
|
|
240
|
-
|
|
241
|
-
/**
|
|
242
|
-
* Validate YAML files using yamllint
|
|
243
|
-
* @private
|
|
244
|
-
*/
|
|
245
|
-
async validateYAML(filePath, options = {}) {
|
|
246
|
-
try {
|
|
247
|
-
const result = await execAsync(
|
|
248
|
-
`yamllint -f parsable "${filePath}"`,
|
|
249
|
-
{
|
|
250
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
251
|
-
timeout: 30000
|
|
252
|
-
}
|
|
253
|
-
);
|
|
254
|
-
|
|
255
|
-
return this.parseYamllintResults(result.stdout, filePath);
|
|
256
|
-
} catch (error) {
|
|
257
|
-
// yamllint exits with non-zero if issues found
|
|
258
|
-
if (error.stdout) {
|
|
259
|
-
return this.parseYamllintResults(error.stdout, filePath);
|
|
260
|
-
}
|
|
261
|
-
this.logger?.error('yamllint validation failed', { error: error.message });
|
|
262
|
-
return [];
|
|
263
|
-
}
|
|
264
|
-
}
|
|
265
|
-
|
|
266
|
-
/**
|
|
267
|
-
* Parse yamllint results
|
|
268
|
-
* @private
|
|
269
|
-
*/
|
|
270
|
-
parseYamllintResults(output, filePath) {
|
|
271
|
-
const issues = [];
|
|
272
|
-
const lines = output.split('\n').filter(line => line.trim());
|
|
273
|
-
|
|
274
|
-
for (const line of lines) {
|
|
275
|
-
// Format: file:line:column: [level] message (rule)
|
|
276
|
-
const match = line.match(/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);
|
|
277
|
-
if (match) {
|
|
278
|
-
const [, file, lineNum, col, level, message, rule] = match;
|
|
279
|
-
issues.push({
|
|
280
|
-
file: filePath,
|
|
281
|
-
line: parseInt(lineNum, 10),
|
|
282
|
-
column: parseInt(col, 10),
|
|
283
|
-
severity: this.mapYamllintSeverity(level),
|
|
284
|
-
rule: rule,
|
|
285
|
-
message: message,
|
|
286
|
-
category: 'yaml',
|
|
287
|
-
validator: 'yamllint'
|
|
288
|
-
});
|
|
289
|
-
}
|
|
290
|
-
}
|
|
291
|
-
|
|
292
|
-
return issues;
|
|
293
|
-
}
|
|
294
|
-
|
|
295
|
-
/**
|
|
296
|
-
* Validate with checkov (Infrastructure as Code)
|
|
297
|
-
* @private
|
|
298
|
-
*/
|
|
299
|
-
async validateWithCheckov(filePath, framework, options = {}) {
|
|
300
|
-
try {
|
|
301
|
-
const result = await execAsync(
|
|
302
|
-
`checkov -f "${filePath}" --framework ${framework} --output json --compact`,
|
|
303
|
-
{
|
|
304
|
-
maxBuffer: 10 * 1024 * 1024,
|
|
305
|
-
timeout: 60000
|
|
306
|
-
}
|
|
307
|
-
);
|
|
308
|
-
|
|
309
|
-
const output = JSON.parse(result.stdout);
|
|
310
|
-
return this.parseCheckovResults(output, filePath);
|
|
311
|
-
} catch (error) {
|
|
312
|
-
// checkov exits with non-zero if issues found
|
|
313
|
-
if (error.stdout) {
|
|
314
|
-
try {
|
|
315
|
-
const output = JSON.parse(error.stdout);
|
|
316
|
-
return this.parseCheckovResults(output, filePath);
|
|
317
|
-
} catch (parseError) {
|
|
318
|
-
this.logger?.error('Failed to parse checkov output', {
|
|
319
|
-
error: parseError.message
|
|
320
|
-
});
|
|
321
|
-
}
|
|
322
|
-
}
|
|
323
|
-
this.logger?.error('checkov validation failed', { error: error.message });
|
|
324
|
-
return [];
|
|
325
|
-
}
|
|
326
|
-
}
|
|
327
|
-
|
|
328
|
-
/**
|
|
329
|
-
* Parse checkov results
|
|
330
|
-
* @private
|
|
331
|
-
*/
|
|
332
|
-
parseCheckovResults(output, filePath) {
|
|
333
|
-
const issues = [];
|
|
334
|
-
|
|
335
|
-
if (output.results && output.results.failed_checks) {
|
|
336
|
-
for (const check of output.results.failed_checks) {
|
|
337
|
-
issues.push({
|
|
338
|
-
file: filePath,
|
|
339
|
-
line: check.file_line_range ? check.file_line_range[0] : 1,
|
|
340
|
-
column: 1,
|
|
341
|
-
severity: this.mapCheckovSeverity(check.check_class),
|
|
342
|
-
rule: check.check_id,
|
|
343
|
-
message: check.check_name || check.check_id,
|
|
344
|
-
category: 'security',
|
|
345
|
-
validator: 'checkov',
|
|
346
|
-
remediation: check.guideline,
|
|
347
|
-
cwe: check.cwe,
|
|
348
|
-
references: check.guideline ? [check.guideline] : []
|
|
349
|
-
});
|
|
350
|
-
}
|
|
351
|
-
}
|
|
352
|
-
|
|
353
|
-
return issues;
|
|
354
|
-
}
|
|
355
|
-
|
|
356
|
-
/**
|
|
357
|
-
* Validate package.json using JSON Schema
|
|
358
|
-
* @private
|
|
359
|
-
*/
|
|
360
|
-
async validatePackageJson(filePath, options = {}) {
|
|
361
|
-
try {
|
|
362
|
-
const Ajv = (await import('ajv')).default;
|
|
363
|
-
const addFormats = (await import('ajv-formats')).default;
|
|
364
|
-
|
|
365
|
-
const content = await fs.readFile(filePath, 'utf-8');
|
|
366
|
-
const packageJson = JSON.parse(content);
|
|
367
|
-
|
|
368
|
-
const ajv = new Ajv({ allErrors: true, strict: false });
|
|
369
|
-
addFormats(ajv);
|
|
370
|
-
|
|
371
|
-
// Basic package.json schema (simplified)
|
|
372
|
-
const schema = {
|
|
373
|
-
type: 'object',
|
|
374
|
-
required: ['name', 'version'],
|
|
375
|
-
properties: {
|
|
376
|
-
name: { type: 'string', pattern: '^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$' },
|
|
377
|
-
version: { type: 'string' },
|
|
378
|
-
description: { type: 'string' },
|
|
379
|
-
main: { type: 'string' },
|
|
380
|
-
type: { type: 'string', enum: ['module', 'commonjs'] },
|
|
381
|
-
scripts: { type: 'object' },
|
|
382
|
-
dependencies: { type: 'object' },
|
|
383
|
-
devDependencies: { type: 'object' }
|
|
384
|
-
},
|
|
385
|
-
additionalProperties: true
|
|
386
|
-
};
|
|
387
|
-
|
|
388
|
-
const validate = ajv.compile(schema);
|
|
389
|
-
const valid = validate(packageJson);
|
|
390
|
-
|
|
391
|
-
if (!valid && validate.errors) {
|
|
392
|
-
return validate.errors.map(error => ({
|
|
393
|
-
file: filePath,
|
|
394
|
-
line: 1,
|
|
395
|
-
column: 1,
|
|
396
|
-
severity: STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
397
|
-
rule: 'json-schema',
|
|
398
|
-
message: error.instancePath ? `${error.instancePath} ${error.message}` : `must have required property '${error.params.missingProperty}'`,
|
|
399
|
-
category: 'validation',
|
|
400
|
-
validator: 'json-schema'
|
|
401
|
-
}));
|
|
402
|
-
}
|
|
403
|
-
|
|
404
|
-
return [];
|
|
405
|
-
} catch (error) {
|
|
406
|
-
this.logger?.error('package.json validation failed', { error: error.message });
|
|
407
|
-
return [{
|
|
408
|
-
file: filePath,
|
|
409
|
-
line: 1,
|
|
410
|
-
column: 1,
|
|
411
|
-
severity: STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
412
|
-
rule: 'json-parse',
|
|
413
|
-
message: `Invalid JSON: ${error.message}`,
|
|
414
|
-
category: 'syntax',
|
|
415
|
-
validator: 'json-parse'
|
|
416
|
-
}];
|
|
417
|
-
}
|
|
418
|
-
}
|
|
419
|
-
|
|
420
|
-
/**
|
|
421
|
-
* Validate tsconfig.json using JSON Schema
|
|
422
|
-
* @private
|
|
423
|
-
*/
|
|
424
|
-
async validateTsConfig(filePath, options = {}) {
|
|
425
|
-
try {
|
|
426
|
-
const content = await fs.readFile(filePath, 'utf-8');
|
|
427
|
-
const tsconfig = JSON.parse(content);
|
|
428
|
-
|
|
429
|
-
const issues = [];
|
|
430
|
-
|
|
431
|
-
// Check for common misconfigurations
|
|
432
|
-
if (tsconfig.compilerOptions) {
|
|
433
|
-
const opts = tsconfig.compilerOptions;
|
|
434
|
-
|
|
435
|
-
// Check for strict mode
|
|
436
|
-
if (!opts.strict) {
|
|
437
|
-
issues.push({
|
|
438
|
-
file: filePath,
|
|
439
|
-
line: 1,
|
|
440
|
-
column: 1,
|
|
441
|
-
severity: STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
442
|
-
rule: 'strict-mode',
|
|
443
|
-
message: 'Consider enabling "strict" mode for better type safety',
|
|
444
|
-
category: 'best-practice',
|
|
445
|
-
validator: 'tsconfig-validator'
|
|
446
|
-
});
|
|
447
|
-
}
|
|
448
|
-
|
|
449
|
-
// Check for noImplicitAny
|
|
450
|
-
if (opts.noImplicitAny === false) {
|
|
451
|
-
issues.push({
|
|
452
|
-
file: filePath,
|
|
453
|
-
line: 1,
|
|
454
|
-
column: 1,
|
|
455
|
-
severity: STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
456
|
-
rule: 'no-implicit-any',
|
|
457
|
-
message: 'Disabling noImplicitAny reduces type safety',
|
|
458
|
-
category: 'best-practice',
|
|
459
|
-
validator: 'tsconfig-validator'
|
|
460
|
-
});
|
|
461
|
-
}
|
|
462
|
-
}
|
|
463
|
-
|
|
464
|
-
return issues;
|
|
465
|
-
} catch (error) {
|
|
466
|
-
this.logger?.error('tsconfig.json validation failed', { error: error.message });
|
|
467
|
-
return [{
|
|
468
|
-
file: filePath,
|
|
469
|
-
line: 1,
|
|
470
|
-
column: 1,
|
|
471
|
-
severity: STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
472
|
-
rule: 'json-parse',
|
|
473
|
-
message: `Invalid JSON: ${error.message}`,
|
|
474
|
-
category: 'syntax',
|
|
475
|
-
validator: 'json-parse'
|
|
476
|
-
}];
|
|
477
|
-
}
|
|
478
|
-
}
|
|
479
|
-
|
|
480
|
-
/**
|
|
481
|
-
* Validate .env file for security issues
|
|
482
|
-
* @private
|
|
483
|
-
*/
|
|
484
|
-
async validateEnvFile(filePath, options = {}) {
|
|
485
|
-
try {
|
|
486
|
-
const content = await fs.readFile(filePath, 'utf-8');
|
|
487
|
-
const issues = [];
|
|
488
|
-
const lines = content.split('\n');
|
|
489
|
-
|
|
490
|
-
const secretPatterns = [
|
|
491
|
-
{ pattern: /password|passwd|pwd/i, name: 'password' },
|
|
492
|
-
{ pattern: /api[_-]?key/i, name: 'API key' },
|
|
493
|
-
{ pattern: /secret/i, name: 'secret' },
|
|
494
|
-
{ pattern: /token/i, name: 'token' },
|
|
495
|
-
{ pattern: /private[_-]?key/i, name: 'private key' },
|
|
496
|
-
{ pattern: /aws[_-]?access/i, name: 'AWS credentials' }
|
|
497
|
-
];
|
|
498
|
-
|
|
499
|
-
lines.forEach((line, index) => {
|
|
500
|
-
const trimmed = line.trim();
|
|
501
|
-
|
|
502
|
-
// Skip comments and empty lines
|
|
503
|
-
if (!trimmed || trimmed.startsWith('#')) return;
|
|
504
|
-
|
|
505
|
-
// Check for hardcoded values (not references to other env vars)
|
|
506
|
-
if (trimmed.includes('=')) {
|
|
507
|
-
const [key, value] = trimmed.split('=');
|
|
508
|
-
const keyLower = key.toLowerCase();
|
|
509
|
-
const valueTrimmed = value?.trim() || '';
|
|
510
|
-
|
|
511
|
-
// Check if value looks like a real secret (not empty, not a placeholder)
|
|
512
|
-
const looksLikeSecret = valueTrimmed &&
|
|
513
|
-
valueTrimmed !== '' &&
|
|
514
|
-
!valueTrimmed.startsWith('$') && // Not env var reference
|
|
515
|
-
valueTrimmed !== 'your-key-here' &&
|
|
516
|
-
valueTrimmed !== 'changeme' &&
|
|
517
|
-
valueTrimmed.length > 5;
|
|
518
|
-
|
|
519
|
-
if (looksLikeSecret) {
|
|
520
|
-
for (const { pattern, name } of secretPatterns) {
|
|
521
|
-
if (pattern.test(keyLower)) {
|
|
522
|
-
issues.push({
|
|
523
|
-
file: filePath,
|
|
524
|
-
line: index + 1,
|
|
525
|
-
column: 1,
|
|
526
|
-
severity: STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
527
|
-
rule: 'hardcoded-secret',
|
|
528
|
-
message: `Potential hardcoded ${name} detected in .env file`,
|
|
529
|
-
category: 'security',
|
|
530
|
-
validator: 'env-validator',
|
|
531
|
-
remediation: 'Use environment-specific .env files and add .env to .gitignore'
|
|
532
|
-
});
|
|
533
|
-
break;
|
|
534
|
-
}
|
|
535
|
-
}
|
|
536
|
-
}
|
|
537
|
-
}
|
|
538
|
-
});
|
|
539
|
-
|
|
540
|
-
return issues;
|
|
541
|
-
} catch (error) {
|
|
542
|
-
this.logger?.error('.env validation failed', { error: error.message });
|
|
543
|
-
return [];
|
|
544
|
-
}
|
|
545
|
-
}
|
|
546
|
-
|
|
547
|
-
/**
|
|
548
|
-
* Detect configuration file type
|
|
549
|
-
* @private
|
|
550
|
-
*/
|
|
551
|
-
detectFileType(filePath) {
|
|
552
|
-
const basename = path.basename(filePath).toLowerCase();
|
|
553
|
-
const dirname = path.dirname(filePath);
|
|
554
|
-
|
|
555
|
-
// Exact filename matches
|
|
556
|
-
if (basename === 'dockerfile') return 'dockerfile';
|
|
557
|
-
if (basename === 'docker-compose.yml' || basename === 'docker-compose.yaml') return 'docker-compose';
|
|
558
|
-
if (basename === 'package.json') return 'package.json';
|
|
559
|
-
if (basename === 'tsconfig.json') return 'tsconfig.json';
|
|
560
|
-
if (basename === '.env' || basename.endsWith('.env')) return 'env';
|
|
561
|
-
|
|
562
|
-
// Path-based detection
|
|
563
|
-
if (dirname.includes('.github/workflows')) return 'github-actions';
|
|
564
|
-
if (dirname.includes('kubernetes') || dirname.includes('k8s')) return 'kubernetes';
|
|
565
|
-
|
|
566
|
-
// Extension-based detection
|
|
567
|
-
const ext = path.extname(filePath).toLowerCase();
|
|
568
|
-
if (ext === '.tf' || ext === '.tfvars') return 'terraform';
|
|
569
|
-
if (ext === '.yml' || ext === '.yaml') return 'yaml';
|
|
570
|
-
if (ext === '.json') return 'json';
|
|
571
|
-
|
|
572
|
-
return 'unknown';
|
|
573
|
-
}
|
|
574
|
-
|
|
575
|
-
/**
|
|
576
|
-
* Normalize all validator results to common format
|
|
577
|
-
* @private
|
|
578
|
-
*/
|
|
579
|
-
normalizeResults(results) {
|
|
580
|
-
return results.map(result => ({
|
|
581
|
-
file: result.file,
|
|
582
|
-
line: result.line || 1,
|
|
583
|
-
column: result.column || 1,
|
|
584
|
-
severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
585
|
-
rule: result.rule || 'unknown',
|
|
586
|
-
message: result.message || 'Validation issue detected',
|
|
587
|
-
category: result.category || 'validation',
|
|
588
|
-
validator: result.validator,
|
|
589
|
-
cwe: result.cwe || null,
|
|
590
|
-
remediation: result.remediation || null,
|
|
591
|
-
references: result.references || []
|
|
592
|
-
}));
|
|
593
|
-
}
|
|
594
|
-
|
|
595
|
-
/**
|
|
596
|
-
* Map hadolint severity to our standard
|
|
597
|
-
* @private
|
|
598
|
-
*/
|
|
599
|
-
mapHadolintSeverity(level) {
|
|
600
|
-
const map = {
|
|
601
|
-
'error': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
602
|
-
'warning': STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
603
|
-
'info': STATIC_ANALYSIS.SEVERITY.INFO,
|
|
604
|
-
'style': STATIC_ANALYSIS.SEVERITY.INFO
|
|
605
|
-
};
|
|
606
|
-
return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
607
|
-
}
|
|
608
|
-
|
|
609
|
-
/**
|
|
610
|
-
* Map yamllint severity to our standard
|
|
611
|
-
* @private
|
|
612
|
-
*/
|
|
613
|
-
mapYamllintSeverity(level) {
|
|
614
|
-
const map = {
|
|
615
|
-
'error': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
616
|
-
'warning': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
617
|
-
};
|
|
618
|
-
return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
619
|
-
}
|
|
620
|
-
|
|
621
|
-
/**
|
|
622
|
-
* Map checkov severity to our standard
|
|
623
|
-
* @private
|
|
624
|
-
*/
|
|
625
|
-
mapCheckovSeverity(checkClass) {
|
|
626
|
-
// checkov uses check_class to categorize severity
|
|
627
|
-
// Most security issues are treated as errors
|
|
628
|
-
return STATIC_ANALYSIS.SEVERITY.ERROR;
|
|
629
|
-
}
|
|
630
|
-
|
|
631
|
-
/**
|
|
632
|
-
* Get validator status report
|
|
633
|
-
* @returns {Promise<Object>} Validator availability and status
|
|
634
|
-
*/
|
|
635
|
-
async getValidatorStatus() {
|
|
636
|
-
const available = await this.detectAvailableValidators();
|
|
637
|
-
return {
|
|
638
|
-
validators: available,
|
|
639
|
-
recommendations: this.getInstallRecommendations(available)
|
|
640
|
-
};
|
|
641
|
-
}
|
|
642
|
-
|
|
643
|
-
/**
|
|
644
|
-
* Get installation recommendations for missing validators
|
|
645
|
-
* @private
|
|
646
|
-
*/
|
|
647
|
-
getInstallRecommendations(available) {
|
|
648
|
-
const recommendations = [];
|
|
649
|
-
|
|
650
|
-
if (!available.checkov) {
|
|
651
|
-
recommendations.push({
|
|
652
|
-
validator: 'checkov',
|
|
653
|
-
reason: 'Infrastructure as Code security scanning (Docker, Kubernetes, Terraform)',
|
|
654
|
-
install: 'pip install checkov',
|
|
655
|
-
priority: 'high'
|
|
656
|
-
});
|
|
657
|
-
}
|
|
658
|
-
|
|
659
|
-
if (!available.hadolint) {
|
|
660
|
-
recommendations.push({
|
|
661
|
-
validator: 'hadolint',
|
|
662
|
-
reason: 'Dockerfile linting and best practices',
|
|
663
|
-
install: 'Download from https://github.com/hadolint/hadolint/releases',
|
|
664
|
-
priority: 'high'
|
|
665
|
-
});
|
|
666
|
-
}
|
|
667
|
-
|
|
668
|
-
if (!available.yamllint) {
|
|
669
|
-
recommendations.push({
|
|
670
|
-
validator: 'yamllint',
|
|
671
|
-
reason: 'YAML file validation',
|
|
672
|
-
install: 'pip install yamllint',
|
|
673
|
-
priority: 'medium'
|
|
674
|
-
});
|
|
675
|
-
}
|
|
676
|
-
|
|
677
|
-
if (!available.jsonSchema) {
|
|
678
|
-
recommendations.push({
|
|
679
|
-
validator: 'ajv (JSON Schema)',
|
|
680
|
-
reason: 'JSON configuration validation',
|
|
681
|
-
install: 'npm install ajv ajv-formats',
|
|
682
|
-
priority: 'medium'
|
|
683
|
-
});
|
|
684
|
-
}
|
|
685
|
-
|
|
686
|
-
return recommendations;
|
|
687
|
-
}
|
|
688
|
-
}
|
|
689
|
-
|
|
690
|
-
export default ConfigValidator;
|
|
1
|
+
const a0_0x271c1c=a0_0x5021;(function(_0x150aa3,_0x483e44){const _0x3fd058=a0_0x5021,_0x35e91b=_0x150aa3();while(!![]){try{const _0x2eafc8=parseInt(_0x3fd058(0x131))/0x1+-parseInt(_0x3fd058(0x153))/0x2+parseInt(_0x3fd058(0x189))/0x3+-parseInt(_0x3fd058(0x161))/0x4*(parseInt(_0x3fd058(0x142))/0x5)+-parseInt(_0x3fd058(0x16f))/0x6+parseInt(_0x3fd058(0x19b))/0x7+parseInt(_0x3fd058(0x192))/0x8*(parseInt(_0x3fd058(0x134))/0x9);if(_0x2eafc8===_0x483e44)break;else _0x35e91b['push'](_0x35e91b['shift']());}catch(_0xbd959){_0x35e91b['push'](_0x35e91b['shift']());}}}(a0_0x4ada,0x83457));import{exec}from'child_process';import{promisify}from'util';function a0_0x4ada(){const _0x288d8b=['u0vwrvjjvfK','D2fYBG','nde4mdq2m21ct3D6CG','CgfJA2fNzs5QC29UihzHBgLKyxrPB24GzMfPBgvK','zxjYB3i','rMfPBgvKihrVihbHCNnLignOzwnRB3yGB3v0Chv0','CgfJA2fNzs5QC29U','CgLWigLUC3rHBgWGEwfTBgXPBNq','zgv0zwn0qxzHAwXHyMXLvMfSAwrHDg9YCW','y2HLy2TVDG','ANnVBI1Zy2HLBwe','lNLTBa','z2L0AhvIlwfJDgLVBNm','sw52ywXPzcbku09ooIa','AgfKB2XPBNq','zg9JA2vYzMLSzq','Aw5ZDgfUy2vqyxrO','C3rKB3v0','C3bSAxq','sLnptIbJB25MAwD1CMf0Aw9UihzHBgLKyxrPB24','DMfSAwrHDgvzqu1m','nJC5nZmZrKPeAuLh','ANnVBI1WyxjZzq','CMvTzwrPyxrPB24','mtm3nJuYm3Dcq3HIta','ANnVBLnJAgvTyq','y2HLy2TFy2XHC3m','Ew91CI1RzxKTAgvYzq','vxnLigvUDMLYB25Tzw50lxnWzwnPzMLJic5LBNyGzMLSzxmGyw5KigfKzcaUzw52ihrVic5NAxrPz25VCMu','ywP2','yxzHAwXHyMXLu2nHBM5LCNm','DhjPBq','ChvZAa','BwfWq2HLy2TVDLnLDMvYAxr5','Bg9Nz2vY','EwfTBa','zgvIDwC','z2v0sw5ZDgfSBfjLy29TBwvUzgf0Aw9UCW','mtGXodvNruTbrK0','ANnVBG','y29Kzq','vMfSAwrHDgLUzYbJB25MAwCGzMLSzq','vMfSAwrHDgLVBIbPC3n1zsbKzxrLy3rLza','DMfSAwrHDgvxAxrOq2HLy2TVDG','BwvZC2fNzq','zxjYB3jZ','DgvYCMfMB3jT','AgfKB2XPBNqGls1MB3jTyxqGANnVBIaI','rg9JA2vYzMLSzsbSAw50Aw5NigfUzcbIzxn0ihbYywn0AwnLCW','zgLYBMfTzq','v0fstKLorW','DhnJB25MAwCUANnVBG','ug90zw50AwfSigHHCMrJB2rLzca','AgfKB2XPBNqGBM90igf2ywLSywjSzq','BgLUzq','mtCWode2nfbkq0Xxva','zg9JA2vYlwnVBxbVC2uUEw1S','zMLSzq','y29TCgLSzq','C2vJDxjPDhK','DMfSAwrHDgLVBG','AgfYzgnVzgvKlxnLy3jLDa','CgfYC2vdAgvJA292uMvZDwX0CW','BxvZDcbOyxzLihjLCxvPCMvKihbYB3bLCNr5icC','y2HHBMDLBwu','BgvUz3rO','DMfSAwrHDg9Y','AgLNAa','CMvHzezPBgu','odm2wMrrqvn1','DMfSAwrHDgvfBNzgAwXL','Dg9mB3DLCKnHC2u','CgfYyw1Z','yMvZDc1WCMfJDgLJzq','BwfWwwfTBgXPBNrtzxzLCML0Eq','A3vIzxjUzxrLCW','Bgv2zwW','lMDPDgH1yI93B3jRzMXVD3m','igrLDgvJDgvKigLUic5LBNyGzMLSzq','rvjst1i','Dw5RBM93BG','BwfWsgfKB2XPBNrtzxzLCML0Eq','CgfYC2viywrVBgLUDfjLC3vSDhm','mJmXmdC1mgzlswj4uG','rMfPBgvKihrVihbHCNnLigHHzg9SAw50ig91Dhb1Da','BwLZC2LUz1bYB3bLCNr5','CgfYC2u','wufntcbMAwXLihzHBgLKyxrPB24','C2nHBM5LCKnHy2HL','EwfTBgXPBNqGDMfSAwrHDgLVBIbMywLSzwq','ywP2icHku09oifnJAgvTysK','C2v2zxjPDhK','EwfTBgXPBNq','BwvKAxvT','DxrMltG','C3LUDgf4','DhnJB25MAwCUANnVBIb2ywXPzgf0Aw9UigzHAwXLza','y2HLy2TVDIaTlxzLCNnPB24','Aw5JBhvKzxm','EwfTBgXPBNqGzgv0zwn0zwq','BM9YBwfSAxPLuMvZDwX0CW','zMLSzv9SAw5Lx3jHBMDL','y2HLy2TFAwq','C3rYAwn0lw1Vzgu','C3rYAw5N','CgLWigLUC3rHBgWGy2HLy2TVDG','zMfPBgvKx2nOzwnRCW','AgfKB2XPBNqGDMfSAwrHDgLVBIbMywLSzwq','C3rHCNrZv2L0Aa','mJqWmZCZmKrZCvv4uW','CNvSzq','qvDtignYzwrLBNrPywXZ','zgv0zwn0rMLSzvr5Cgu','lNrM','lNrMDMfYCW','zg9JA2vYlwnVBxbVC2u','CMvZDwX0CW','B2jQzwn0','mJr6CMjbsLK','z3vPzgvSAw5L','CgfYC2vzyw1SBgLUDfjLC3vSDhm','ywP2lwzVCM1HDhm','C3rYAwn0','lNLHBwW','zw52lxzHBgLKyxrVCG'];a0_0x4ada=function(){return _0x288d8b;};return a0_0x4ada();}import a0_0x93ea92 from'path';import a0_0x110e41 from'fs/promises';import{STATIC_ANALYSIS}from'../utilities/constants.js';const execAsync=promisify(exec);class ConfigValidator{constructor(_0x40cb36=null){const _0x56703c=a0_0x5021;this['logger']=_0x40cb36,this[_0x56703c(0x13a)]=null,this[_0x56703c(0x174)]=new Map();}async[a0_0x271c1c(0x124)](){const _0x1d5fa0=a0_0x271c1c;if(this['availableScanners']!==null)return this[_0x1d5fa0(0x13a)];const _0x55ed33={'checkov':![],'hadolint':![],'yamllint':![],'jsonSchema':![]};try{await execAsync(_0x1d5fa0(0x17d),{'timeout':0x1388}),_0x55ed33['checkov']=!![],this[_0x1d5fa0(0x13e)]?.['debug']('checkov\x20detected');}catch(_0x1a6027){this[_0x1d5fa0(0x13e)]?.[_0x1d5fa0(0x140)]('checkov\x20not\x20available',{'error':_0x1a6027[_0x1d5fa0(0x148)]});}try{await execAsync('hadolint\x20--version',{'timeout':0x1388}),_0x55ed33[_0x1d5fa0(0x12a)]=!![],this[_0x1d5fa0(0x13e)]?.[_0x1d5fa0(0x140)]('hadolint\x20detected');}catch(_0x1e12ae){this['logger']?.['debug'](_0x1d5fa0(0x151),{'error':_0x1e12ae[_0x1d5fa0(0x148)]});}try{await execAsync('yamllint\x20--version',{'timeout':0x1388}),_0x55ed33[_0x1d5fa0(0x178)]=!![],this['logger']?.['debug'](_0x1d5fa0(0x17f));}catch(_0x3fac13){this['logger']?.['debug']('yamllint\x20not\x20available',{'error':_0x3fac13[_0x1d5fa0(0x148)]});}try{await import(_0x1d5fa0(0x139)),_0x55ed33['jsonSchema']=!![],this['logger']?.[_0x1d5fa0(0x140)]('JSON\x20Schema\x20validation\x20available');}catch(_0xb494e0){this['logger']?.['debug']('ajv\x20not\x20available',{'error':_0xb494e0[_0x1d5fa0(0x148)]});}return this[_0x1d5fa0(0x13a)]=_0x55ed33,_0x55ed33;}async['validate'](_0x188ab1,_0x563622={}){const _0x5c2ad7=a0_0x271c1c,_0x291894=[],_0x5d68eb=await this['detectAvailableValidators'](),_0x5bfd30=this[_0x5c2ad7(0x18c)](_0x188ab1);this['logger']?.[_0x5c2ad7(0x140)](_0x5c2ad7(0x145),{'filePath':_0x188ab1,'fileType':_0x5bfd30});switch(_0x5bfd30){case'dockerfile':if(_0x5d68eb['hadolint']){const _0x16f097=await this['validateDockerfile'](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x16f097);}if(_0x5d68eb['checkov']){const _0x49f71c=await this['validateWithCheckov'](_0x188ab1,'dockerfile',_0x563622);_0x291894['push'](..._0x49f71c);}break;case _0x5c2ad7(0x18f):if(_0x5d68eb[_0x5c2ad7(0x178)]){const _0x387b8d=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x387b8d);}if(_0x5d68eb[_0x5c2ad7(0x125)]){const _0x59ed27=await this['validateWithCheckov'](_0x188ab1,'docker_compose',_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x59ed27);}break;case _0x5c2ad7(0x167):if(_0x5d68eb['yamllint']){const _0x30fc38=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x30fc38);}if(_0x5d68eb['checkov']){const _0x1bc14e=await this[_0x5c2ad7(0x147)](_0x188ab1,_0x5c2ad7(0x167),_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x1bc14e);}break;case'terraform':if(_0x5d68eb['checkov']){const _0x3a2b32=await this[_0x5c2ad7(0x147)](_0x188ab1,'terraform',_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x3a2b32);}break;case _0x5c2ad7(0x122):if(_0x5d68eb[_0x5c2ad7(0x135)]){const _0x9ca265=await this['validatePackageJson'](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x9ca265);}break;case _0x5c2ad7(0x14f):if(_0x5d68eb['jsonSchema']){const _0x520947=await this['validateTsConfig'](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x520947);}break;case _0x5c2ad7(0x128):if(_0x5d68eb['yamllint']){const _0x38f97b=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x38f97b);}break;case'env':const _0x4fcc23=await this[_0x5c2ad7(0x162)](_0x188ab1,_0x563622);_0x291894['push'](..._0x4fcc23);break;case'yaml':if(_0x5d68eb[_0x5c2ad7(0x178)]){const _0x235ee0=await this[_0x5c2ad7(0x130)](_0x188ab1,_0x563622);_0x291894[_0x5c2ad7(0x13c)](..._0x235ee0);}break;default:this[_0x5c2ad7(0x13e)]?.[_0x5c2ad7(0x19a)]('Unknown\x20config\x20file\x20type',{'filePath':_0x188ab1,'fileType':_0x5bfd30});return[];}return this['normalizeResults'](_0x291894);}async['validateDockerfile'](_0x9577e3,_0x2394e3={}){const _0xd8a849=a0_0x271c1c;try{const _0x28b04f=await execAsync(_0xd8a849(0x14b)+_0x9577e3+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530}),_0x248246=JSON[_0xd8a849(0x172)](_0x28b04f['stdout']);return this[_0xd8a849(0x16e)](_0x248246,_0x9577e3);}catch(_0x5f1360){if(_0x5f1360['stdout'])try{const _0x1e7d03=JSON[_0xd8a849(0x172)](_0x5f1360['stdout']);return this[_0xd8a849(0x16e)](_0x1e7d03,_0x9577e3);}catch(_0x5aa668){this[_0xd8a849(0x13e)]?.[_0xd8a849(0x19d)](_0xd8a849(0x170),{'error':_0x5aa668['message']});}return this[_0xd8a849(0x13e)]?.['error'](_0xd8a849(0x187),{'error':_0x5f1360['message']}),[];}}[a0_0x271c1c(0x16e)](_0x151185,_0x4cf6b1){const _0x59ed34=a0_0x271c1c,_0x578758=[];if(Array['isArray'](_0x151185))for(const _0x5b688f of _0x151185){_0x578758[_0x59ed34(0x13c)]({'file':_0x4cf6b1,'line':_0x5b688f[_0x59ed34(0x152)]||0x1,'column':_0x5b688f['column']||0x1,'severity':this[_0x59ed34(0x16d)](_0x5b688f[_0x59ed34(0x168)]),'rule':_0x5b688f[_0x59ed34(0x144)],'message':_0x5b688f[_0x59ed34(0x148)],'category':'dockerfile','validator':_0x59ed34(0x12a)});}return _0x578758;}async['validateYAML'](_0x290904,_0x2d8d3f={}){const _0x385f1e=a0_0x271c1c;try{const _0x245937=await execAsync('yamllint\x20-f\x20parsable\x20\x22'+_0x290904+'\x22',{'maxBuffer':0xa*0x400*0x400,'timeout':0x7530});return this[_0x385f1e(0x194)](_0x245937[_0x385f1e(0x12d)],_0x290904);}catch(_0x38ff87){if(_0x38ff87['stdout'])return this['parseYamllintResults'](_0x38ff87[_0x385f1e(0x12d)],_0x290904);return this['logger']?.[_0x385f1e(0x19d)](_0x385f1e(0x175),{'error':_0x38ff87[_0x385f1e(0x148)]}),[];}}['parseYamllintResults'](_0x2a0aa8,_0x20f3b4){const _0x4696a2=a0_0x271c1c,_0x4ca861=[],_0x3e36c3=_0x2a0aa8[_0x4696a2(0x12e)]('\x0a')['filter'](_0x4919b2=>_0x4919b2[_0x4696a2(0x13b)]());for(const _0x525979 of _0x3e36c3){const _0x57481a=_0x525979['match'](/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);if(_0x57481a){const [,_0x4bdc0e,_0xa53462,_0x3dd132,_0x2a7a59,_0x43a980,_0x2594a7]=_0x57481a;_0x4ca861['push']({'file':_0x20f3b4,'line':parseInt(_0xa53462,0xa),'column':parseInt(_0x3dd132,0xa),'severity':this[_0x4696a2(0x166)](_0x2a7a59),'rule':_0x2594a7,'message':_0x43a980,'category':'yaml','validator':'yamllint'});}}return _0x4ca861;}async[a0_0x271c1c(0x147)](_0x48d896,_0x54ab1c,_0x289402={}){const _0x202575=a0_0x271c1c;try{const _0x41fee9=await execAsync('checkov\x20-f\x20\x22'+_0x48d896+'\x22\x20--framework\x20'+_0x54ab1c+'\x20--output\x20json\x20--compact',{'maxBuffer':0xa*0x400*0x400,'timeout':0xea60}),_0x554e8d=JSON[_0x202575(0x172)](_0x41fee9[_0x202575(0x12d)]);return this[_0x202575(0x15a)](_0x554e8d,_0x48d896);}catch(_0x8dcb7a){if(_0x8dcb7a['stdout'])try{const _0xf71fad=JSON[_0x202575(0x172)](_0x8dcb7a['stdout']);return this['parseCheckovResults'](_0xf71fad,_0x48d896);}catch(_0x8bbe2d){this['logger']?.[_0x202575(0x19d)](_0x202575(0x121),{'error':_0x8bbe2d[_0x202575(0x148)]});}return this[_0x202575(0x13e)]?.[_0x202575(0x19d)]('checkov\x20validation\x20failed',{'error':_0x8dcb7a[_0x202575(0x148)]}),[];}}[a0_0x271c1c(0x15a)](_0x4009dc,_0xe45095){const _0x11f162=a0_0x271c1c,_0x19125e=[];if(_0x4009dc['results']&&_0x4009dc['results'][_0x11f162(0x186)])for(const _0x2b627e of _0x4009dc[_0x11f162(0x190)][_0x11f162(0x186)]){_0x19125e[_0x11f162(0x13c)]({'file':_0xe45095,'line':_0x2b627e['file_line_range']?_0x2b627e[_0x11f162(0x181)][0x0]:0x1,'column':0x1,'severity':this[_0x11f162(0x13d)](_0x2b627e[_0x11f162(0x136)]),'rule':_0x2b627e['check_id'],'message':_0x2b627e['check_name']||_0x2b627e[_0x11f162(0x182)],'category':_0x11f162(0x157),'validator':'checkov','remediation':_0x2b627e[_0x11f162(0x193)],'cwe':_0x2b627e['cwe'],'references':_0x2b627e[_0x11f162(0x193)]?[_0x2b627e['guideline']]:[]});}return _0x19125e;}async['validatePackageJson'](_0x99a87f,_0x319cd9={}){const _0x4902b3=a0_0x271c1c;try{const _0x44ae93=(await import(_0x4902b3(0x139)))['default'],_0x27c9f=(await import(_0x4902b3(0x195)))['default'],_0x22a26e=await a0_0x110e41['readFile'](_0x99a87f,'utf-8'),_0x9caa7c=JSON[_0x4902b3(0x172)](_0x22a26e),_0x421efd=new _0x44ae93({'allErrors':!![],'strict':![]});_0x27c9f(_0x421efd);const _0x4a88bd={'type':'object','required':['name','version'],'properties':{'name':{'type':_0x4902b3(0x184),'pattern':'^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$'},'version':{'type':'string'},'description':{'type':'string'},'main':{'type':_0x4902b3(0x184)},'type':{'type':'string','enum':['module','commonjs']},'scripts':{'type':_0x4902b3(0x191)},'dependencies':{'type':'object'},'devDependencies':{'type':'object'}},'additionalProperties':!![]},_0x117cc3=_0x421efd[_0x4902b3(0x156)](_0x4a88bd),_0x1599e6=_0x117cc3(_0x9caa7c);if(!_0x1599e6&&_0x117cc3['errors'])return _0x117cc3[_0x4902b3(0x149)]['map'](_0x45bab5=>({'file':_0x99a87f,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY'][_0x4902b3(0x16b)],'rule':_0x4902b3(0x126),'message':_0x45bab5[_0x4902b3(0x12c)]?_0x45bab5['instancePath']+'\x20'+_0x45bab5[_0x4902b3(0x148)]:_0x4902b3(0x15b)+_0x45bab5[_0x4902b3(0x164)][_0x4902b3(0x171)]+'\x27','category':_0x4902b3(0x158),'validator':'json-schema'}));return[];}catch(_0x10fe52){return this[_0x4902b3(0x13e)]?.[_0x4902b3(0x19d)](_0x4902b3(0x19c),{'error':_0x10fe52['message']}),[{'file':_0x99a87f,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x4902b3(0x199)]['ERROR'],'rule':'json-parse','message':_0x4902b3(0x129)+_0x10fe52['message'],'category':_0x4902b3(0x17b),'validator':_0x4902b3(0x132)}];}}async['validateTsConfig'](_0x357c41,_0x41bc21={}){const _0x3e3687=a0_0x271c1c;try{const _0x4cebac=await a0_0x110e41[_0x3e3687(0x160)](_0x357c41,_0x3e3687(0x17a)),_0x30e347=JSON[_0x3e3687(0x172)](_0x4cebac),_0x1dbcdf=[];if(_0x30e347['compilerOptions']){const _0xbb4db1=_0x30e347['compilerOptions'];!_0xbb4db1[_0x3e3687(0x196)]&&_0x1dbcdf[_0x3e3687(0x13c)]({'file':_0x357c41,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY']['WARNING'],'rule':_0x3e3687(0x183),'message':'Consider\x20enabling\x20\x22strict\x22\x20mode\x20for\x20better\x20type\x20safety','category':_0x3e3687(0x165),'validator':'tsconfig-validator'}),_0xbb4db1['noImplicitAny']===![]&&_0x1dbcdf[_0x3e3687(0x13c)]({'file':_0x357c41,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS['SEVERITY'][_0x3e3687(0x14e)],'rule':'no-implicit-any','message':'Disabling\x20noImplicitAny\x20reduces\x20type\x20safety','category':'best-practice','validator':'tsconfig-validator'});}return _0x1dbcdf;}catch(_0x254da7){return this[_0x3e3687(0x13e)]?.[_0x3e3687(0x19d)](_0x3e3687(0x17c),{'error':_0x254da7['message']}),[{'file':_0x357c41,'line':0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x3e3687(0x199)][_0x3e3687(0x16b)],'rule':_0x3e3687(0x132),'message':_0x3e3687(0x129)+_0x254da7[_0x3e3687(0x148)],'category':_0x3e3687(0x17b),'validator':'json-parse'}];}}async[a0_0x271c1c(0x162)](_0x159fcd,_0x44c65b={}){const _0x364880=a0_0x271c1c;try{const _0x3da7ca=await a0_0x110e41['readFile'](_0x159fcd,_0x364880(0x17a)),_0x2448d0=[],_0x2e9558=_0x3da7ca['split']('\x0a'),_0x5d904c=[{'pattern':/password|passwd|pwd/i,'name':'password'},{'pattern':/api[_-]?key/i,'name':'API\x20key'},{'pattern':/secret/i,'name':'secret'},{'pattern':/token/i,'name':'token'},{'pattern':/private[_-]?key/i,'name':'private\x20key'},{'pattern':/aws[_-]?access/i,'name':_0x364880(0x18b)}];return _0x2e9558['forEach']((_0x10d18a,_0x4c0113)=>{const _0x2f1145=_0x364880,_0x1e221d=_0x10d18a[_0x2f1145(0x13b)]();if(!_0x1e221d||_0x1e221d['startsWith']('#'))return;if(_0x1e221d[_0x2f1145(0x17e)]('=')){const [_0x3e6bec,_0x54a176]=_0x1e221d[_0x2f1145(0x12e)]('='),_0x2c5db5=_0x3e6bec['toLowerCase'](),_0x305bd2=_0x54a176?.[_0x2f1145(0x13b)]()||'',_0x22f52a=_0x305bd2&&_0x305bd2!==''&&!_0x305bd2[_0x2f1145(0x188)]('$')&&_0x305bd2!==_0x2f1145(0x137)&&_0x305bd2!==_0x2f1145(0x15c)&&_0x305bd2[_0x2f1145(0x15d)]>0x5;if(_0x22f52a)for(const {pattern:_0x1c11eb,name:_0x52ba33}of _0x5d904c){if(_0x1c11eb['test'](_0x2c5db5)){_0x2448d0[_0x2f1145(0x13c)]({'file':_0x159fcd,'line':_0x4c0113+0x1,'column':0x1,'severity':STATIC_ANALYSIS[_0x2f1145(0x199)]['CRITICAL'],'rule':_0x2f1145(0x159),'message':_0x2f1145(0x150)+_0x52ba33+_0x2f1145(0x16a),'category':'security','validator':_0x2f1145(0x198),'remediation':_0x2f1145(0x138)});break;}}}}),_0x2448d0;}catch(_0x2b68ba){return this['logger']?.['error']('.env\x20validation\x20failed',{'error':_0x2b68ba['message']}),[];}}[a0_0x271c1c(0x18c)](_0x2a2f02){const _0x5e3951=a0_0x271c1c,_0x56546a=a0_0x93ea92['basename'](_0x2a2f02)[_0x5e3951(0x163)](),_0x5ecc41=a0_0x93ea92[_0x5e3951(0x14d)](_0x2a2f02);if(_0x56546a==='dockerfile')return _0x5e3951(0x12b);if(_0x56546a===_0x5e3951(0x154)||_0x56546a==='docker-compose.yaml')return'docker-compose';if(_0x56546a===_0x5e3951(0x122))return'package.json';if(_0x56546a==='tsconfig.json')return'tsconfig.json';if(_0x56546a==='.env'||_0x56546a['endsWith']('.env'))return'env';if(_0x5ecc41[_0x5e3951(0x17e)](_0x5e3951(0x169)))return _0x5e3951(0x128);if(_0x5ecc41[_0x5e3951(0x17e)]('kubernetes')||_0x5ecc41[_0x5e3951(0x17e)]('k8s'))return _0x5e3951(0x167);const _0x5e9b88=a0_0x93ea92['extname'](_0x2a2f02)[_0x5e3951(0x163)]();if(_0x5e9b88===_0x5e3951(0x18d)||_0x5e9b88===_0x5e3951(0x18e))return _0x5e3951(0x14a);if(_0x5e9b88===_0x5e3951(0x127)||_0x5e9b88===_0x5e3951(0x197))return _0x5e3951(0x13f);if(_0x5e9b88==='.json')return _0x5e3951(0x143);return _0x5e3951(0x16c);}[a0_0x271c1c(0x180)](_0x4b4264){const _0x7f6348=a0_0x271c1c;return _0x4b4264['map'](_0x2469f7=>({'file':_0x2469f7[_0x7f6348(0x155)],'line':_0x2469f7[_0x7f6348(0x152)]||0x1,'column':_0x2469f7['column']||0x1,'severity':_0x2469f7[_0x7f6348(0x177)]||STATIC_ANALYSIS['SEVERITY'][_0x7f6348(0x14e)],'rule':_0x2469f7[_0x7f6348(0x18a)]||_0x7f6348(0x16c),'message':_0x2469f7[_0x7f6348(0x148)]||_0x7f6348(0x146),'category':_0x2469f7['category']||_0x7f6348(0x158),'validator':_0x2469f7[_0x7f6348(0x15e)],'cwe':_0x2469f7['cwe']||null,'remediation':_0x2469f7[_0x7f6348(0x133)]||null,'references':_0x2469f7['references']||[]}));}['mapHadolintSeverity'](_0xc2cdbc){const _0x109218=a0_0x271c1c,_0x1e8ac4={'error':STATIC_ANALYSIS[_0x109218(0x199)]['ERROR'],'warning':STATIC_ANALYSIS[_0x109218(0x199)][_0x109218(0x14e)],'info':STATIC_ANALYSIS[_0x109218(0x199)]['INFO'],'style':STATIC_ANALYSIS['SEVERITY']['INFO']};return _0x1e8ac4[_0xc2cdbc?.['toLowerCase']()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}['mapYamllintSeverity'](_0x2e9f96){const _0x5cfb55=a0_0x271c1c,_0x2a0b46={'error':STATIC_ANALYSIS[_0x5cfb55(0x199)][_0x5cfb55(0x16b)],'warning':STATIC_ANALYSIS[_0x5cfb55(0x199)]['WARNING']};return _0x2a0b46[_0x2e9f96?.[_0x5cfb55(0x163)]()]||STATIC_ANALYSIS['SEVERITY']['WARNING'];}['mapCheckovSeverity'](_0x2565df){const _0x551de5=a0_0x271c1c;return STATIC_ANALYSIS['SEVERITY'][_0x551de5(0x16b)];}async['getValidatorStatus'](){const _0x52bd9f=a0_0x271c1c,_0x5512a8=await this[_0x52bd9f(0x124)]();return{'validators':_0x5512a8,'recommendations':this['getInstallRecommendations'](_0x5512a8)};}[a0_0x271c1c(0x141)](_0x235060){const _0x3cfe23=a0_0x271c1c,_0x2219a4=[];return!_0x235060[_0x3cfe23(0x125)]&&_0x2219a4['push']({'validator':_0x3cfe23(0x125),'reason':'Infrastructure\x20as\x20Code\x20security\x20scanning\x20(Docker,\x20Kubernetes,\x20Terraform)','install':_0x3cfe23(0x185),'priority':_0x3cfe23(0x15f)}),!_0x235060[_0x3cfe23(0x12a)]&&_0x2219a4[_0x3cfe23(0x13c)]({'validator':_0x3cfe23(0x12a),'reason':_0x3cfe23(0x14c),'install':'Download from https://github.com/hadolint/hadolint/releases','priority':'high'}),!_0x235060[_0x3cfe23(0x178)]&&_0x2219a4[_0x3cfe23(0x13c)]({'validator':'yamllint','reason':_0x3cfe23(0x173),'install':_0x3cfe23(0x123),'priority':_0x3cfe23(0x179)}),!_0x235060['jsonSchema']&&_0x2219a4['push']({'validator':_0x3cfe23(0x176),'reason':_0x3cfe23(0x12f),'install':'npm\x20install\x20ajv\x20ajv-formats','priority':'medium'}),_0x2219a4;}}function a0_0x5021(_0x3396ca,_0x5c3ac4){_0x3396ca=_0x3396ca-0x121;const _0x4ada90=a0_0x4ada();let _0x50214b=_0x4ada90[_0x3396ca];if(a0_0x5021['VFySla']===undefined){var _0x1d674f=function(_0x3ef6a6){const _0x47f929='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/=';let _0x93ea92='',_0x110e41='';for(let _0x40cb36=0x0,_0x55ed33,_0x1a6027,_0x1e12ae=0x0;_0x1a6027=_0x3ef6a6['charAt'](_0x1e12ae++);~_0x1a6027&&(_0x55ed33=_0x40cb36%0x4?_0x55ed33*0x40+_0x1a6027:_0x1a6027,_0x40cb36++%0x4)?_0x93ea92+=String['fromCharCode'](0xff&_0x55ed33>>(-0x2*_0x40cb36&0x6)):0x0){_0x1a6027=_0x47f929['indexOf'](_0x1a6027);}for(let _0x3fac13=0x0,_0xb494e0=_0x93ea92['length'];_0x3fac13<_0xb494e0;_0x3fac13++){_0x110e41+='%'+('00'+_0x93ea92['charCodeAt'](_0x3fac13)['toString'](0x10))['slice'](-0x2);}return decodeURIComponent(_0x110e41);};a0_0x5021['JqVOCZ']=_0x1d674f,a0_0x5021['eBVWXp']={},a0_0x5021['VFySla']=!![];}const _0x2ac695=_0x4ada90[0x0],_0x40356a=_0x3396ca+_0x2ac695,_0x471e62=a0_0x5021['eBVWXp'][_0x40356a];return!_0x471e62?(_0x50214b=a0_0x5021['JqVOCZ'](_0x50214b),a0_0x5021['eBVWXp'][_0x40356a]=_0x50214b):_0x50214b=_0x471e62,_0x50214b;}export default ConfigValidator;
|