@loxia-labs/loxia-autopilot-one 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +267 -0
- package/README.md +509 -0
- package/bin/cli.js +117 -0
- package/package.json +94 -0
- package/scripts/install-scanners.js +236 -0
- package/src/analyzers/CSSAnalyzer.js +297 -0
- package/src/analyzers/ConfigValidator.js +690 -0
- package/src/analyzers/ESLintAnalyzer.js +320 -0
- package/src/analyzers/JavaScriptAnalyzer.js +261 -0
- package/src/analyzers/PrettierFormatter.js +247 -0
- package/src/analyzers/PythonAnalyzer.js +266 -0
- package/src/analyzers/SecurityAnalyzer.js +729 -0
- package/src/analyzers/TypeScriptAnalyzer.js +247 -0
- package/src/analyzers/codeCloneDetector/analyzer.js +344 -0
- package/src/analyzers/codeCloneDetector/detector.js +203 -0
- package/src/analyzers/codeCloneDetector/index.js +160 -0
- package/src/analyzers/codeCloneDetector/parser.js +199 -0
- package/src/analyzers/codeCloneDetector/reporter.js +148 -0
- package/src/analyzers/codeCloneDetector/scanner.js +59 -0
- package/src/core/agentPool.js +1474 -0
- package/src/core/agentScheduler.js +2147 -0
- package/src/core/contextManager.js +709 -0
- package/src/core/messageProcessor.js +732 -0
- package/src/core/orchestrator.js +548 -0
- package/src/core/stateManager.js +877 -0
- package/src/index.js +631 -0
- package/src/interfaces/cli.js +549 -0
- package/src/interfaces/webServer.js +2162 -0
- package/src/modules/fileExplorer/controller.js +280 -0
- package/src/modules/fileExplorer/index.js +37 -0
- package/src/modules/fileExplorer/middleware.js +92 -0
- package/src/modules/fileExplorer/routes.js +125 -0
- package/src/modules/fileExplorer/types.js +44 -0
- package/src/services/aiService.js +1232 -0
- package/src/services/apiKeyManager.js +164 -0
- package/src/services/benchmarkService.js +366 -0
- package/src/services/budgetService.js +539 -0
- package/src/services/contextInjectionService.js +247 -0
- package/src/services/conversationCompactionService.js +637 -0
- package/src/services/errorHandler.js +810 -0
- package/src/services/fileAttachmentService.js +544 -0
- package/src/services/modelRouterService.js +366 -0
- package/src/services/modelsService.js +322 -0
- package/src/services/qualityInspector.js +796 -0
- package/src/services/tokenCountingService.js +536 -0
- package/src/tools/agentCommunicationTool.js +1344 -0
- package/src/tools/agentDelayTool.js +485 -0
- package/src/tools/asyncToolManager.js +604 -0
- package/src/tools/baseTool.js +800 -0
- package/src/tools/browserTool.js +920 -0
- package/src/tools/cloneDetectionTool.js +621 -0
- package/src/tools/dependencyResolverTool.js +1215 -0
- package/src/tools/fileContentReplaceTool.js +875 -0
- package/src/tools/fileSystemTool.js +1107 -0
- package/src/tools/fileTreeTool.js +853 -0
- package/src/tools/imageTool.js +901 -0
- package/src/tools/importAnalyzerTool.js +1060 -0
- package/src/tools/jobDoneTool.js +248 -0
- package/src/tools/seekTool.js +956 -0
- package/src/tools/staticAnalysisTool.js +1778 -0
- package/src/tools/taskManagerTool.js +2873 -0
- package/src/tools/terminalTool.js +2304 -0
- package/src/tools/webTool.js +1430 -0
- package/src/types/agent.js +519 -0
- package/src/types/contextReference.js +972 -0
- package/src/types/conversation.js +730 -0
- package/src/types/toolCommand.js +747 -0
- package/src/utilities/attachmentValidator.js +292 -0
- package/src/utilities/configManager.js +582 -0
- package/src/utilities/constants.js +722 -0
- package/src/utilities/directoryAccessManager.js +535 -0
- package/src/utilities/fileProcessor.js +307 -0
- package/src/utilities/logger.js +436 -0
- package/src/utilities/tagParser.js +1246 -0
- package/src/utilities/toolConstants.js +317 -0
- package/web-ui/build/index.html +15 -0
- package/web-ui/build/logo.png +0 -0
- package/web-ui/build/logo2.png +0 -0
- package/web-ui/build/static/index-CjkkcnFA.js +344 -0
- package/web-ui/build/static/index-Dy2bYbOa.css +1 -0
|
@@ -0,0 +1,690 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* ConfigValidator - Validate configuration files for errors and security issues
|
|
3
|
+
*
|
|
4
|
+
* Validates common configuration files:
|
|
5
|
+
* - package.json, tsconfig.json (JSON Schema)
|
|
6
|
+
* - Dockerfile (hadolint)
|
|
7
|
+
* - docker-compose.yml (yamllint)
|
|
8
|
+
* - Kubernetes YAML (checkov, yamllint)
|
|
9
|
+
* - Terraform (checkov)
|
|
10
|
+
* - .env files (secret detection)
|
|
11
|
+
* - GitHub Actions workflows (yamllint)
|
|
12
|
+
*/
|
|
13
|
+
|
|
14
|
+
import { exec } from 'child_process';
|
|
15
|
+
import { promisify } from 'util';
|
|
16
|
+
import path from 'path';
|
|
17
|
+
import fs from 'fs/promises';
|
|
18
|
+
import { STATIC_ANALYSIS } from '../utilities/constants.js';
|
|
19
|
+
|
|
20
|
+
const execAsync = promisify(exec);
|
|
21
|
+
|
|
22
|
+
class ConfigValidator {
|
|
23
|
+
constructor(logger = null) {
|
|
24
|
+
this.logger = logger;
|
|
25
|
+
this.availableScanners = null;
|
|
26
|
+
this.scannerCache = new Map();
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
/**
|
|
30
|
+
* Detect which validation tools are available
|
|
31
|
+
* @returns {Promise<Object>} Available validators
|
|
32
|
+
*/
|
|
33
|
+
async detectAvailableValidators() {
|
|
34
|
+
// Return cached result if available
|
|
35
|
+
if (this.availableScanners !== null) {
|
|
36
|
+
return this.availableScanners;
|
|
37
|
+
}
|
|
38
|
+
|
|
39
|
+
const available = {
|
|
40
|
+
checkov: false,
|
|
41
|
+
hadolint: false,
|
|
42
|
+
yamllint: false,
|
|
43
|
+
jsonSchema: false
|
|
44
|
+
};
|
|
45
|
+
|
|
46
|
+
// Check for checkov (Infrastructure as Code scanner)
|
|
47
|
+
try {
|
|
48
|
+
await execAsync('checkov --version', { timeout: 5000 });
|
|
49
|
+
available.checkov = true;
|
|
50
|
+
this.logger?.debug('checkov detected');
|
|
51
|
+
} catch (error) {
|
|
52
|
+
this.logger?.debug('checkov not available', { error: error.message });
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
// Check for hadolint (Dockerfile linter)
|
|
56
|
+
try {
|
|
57
|
+
await execAsync('hadolint --version', { timeout: 5000 });
|
|
58
|
+
available.hadolint = true;
|
|
59
|
+
this.logger?.debug('hadolint detected');
|
|
60
|
+
} catch (error) {
|
|
61
|
+
this.logger?.debug('hadolint not available', { error: error.message });
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
// Check for yamllint (YAML linter)
|
|
65
|
+
try {
|
|
66
|
+
await execAsync('yamllint --version', { timeout: 5000 });
|
|
67
|
+
available.yamllint = true;
|
|
68
|
+
this.logger?.debug('yamllint detected');
|
|
69
|
+
} catch (error) {
|
|
70
|
+
this.logger?.debug('yamllint not available', { error: error.message });
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
// Check for ajv (JSON Schema validation - npm package)
|
|
74
|
+
try {
|
|
75
|
+
await import('ajv');
|
|
76
|
+
available.jsonSchema = true;
|
|
77
|
+
this.logger?.debug('JSON Schema validation available');
|
|
78
|
+
} catch (error) {
|
|
79
|
+
this.logger?.debug('ajv not available', { error: error.message });
|
|
80
|
+
}
|
|
81
|
+
|
|
82
|
+
this.availableScanners = available;
|
|
83
|
+
return available;
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
/**
|
|
87
|
+
* Validate a configuration file
|
|
88
|
+
* @param {string} filePath - Path to config file
|
|
89
|
+
* @param {Object} options - Validation options
|
|
90
|
+
* @returns {Promise<Array>} Validation issues
|
|
91
|
+
*/
|
|
92
|
+
async validate(filePath, options = {}) {
|
|
93
|
+
const issues = [];
|
|
94
|
+
const available = await this.detectAvailableValidators();
|
|
95
|
+
const fileType = this.detectFileType(filePath);
|
|
96
|
+
|
|
97
|
+
this.logger?.debug('Validating config file', { filePath, fileType });
|
|
98
|
+
|
|
99
|
+
// Route to appropriate validator based on file type
|
|
100
|
+
switch (fileType) {
|
|
101
|
+
case 'dockerfile':
|
|
102
|
+
if (available.hadolint) {
|
|
103
|
+
const hadolintIssues = await this.validateDockerfile(filePath, options);
|
|
104
|
+
issues.push(...hadolintIssues);
|
|
105
|
+
}
|
|
106
|
+
if (available.checkov) {
|
|
107
|
+
const checkovIssues = await this.validateWithCheckov(filePath, 'dockerfile', options);
|
|
108
|
+
issues.push(...checkovIssues);
|
|
109
|
+
}
|
|
110
|
+
break;
|
|
111
|
+
|
|
112
|
+
case 'docker-compose':
|
|
113
|
+
if (available.yamllint) {
|
|
114
|
+
const yamlIssues = await this.validateYAML(filePath, options);
|
|
115
|
+
issues.push(...yamlIssues);
|
|
116
|
+
}
|
|
117
|
+
if (available.checkov) {
|
|
118
|
+
const checkovIssues = await this.validateWithCheckov(filePath, 'docker_compose', options);
|
|
119
|
+
issues.push(...checkovIssues);
|
|
120
|
+
}
|
|
121
|
+
break;
|
|
122
|
+
|
|
123
|
+
case 'kubernetes':
|
|
124
|
+
if (available.yamllint) {
|
|
125
|
+
const yamlIssues = await this.validateYAML(filePath, options);
|
|
126
|
+
issues.push(...yamlIssues);
|
|
127
|
+
}
|
|
128
|
+
if (available.checkov) {
|
|
129
|
+
const checkovIssues = await this.validateWithCheckov(filePath, 'kubernetes', options);
|
|
130
|
+
issues.push(...checkovIssues);
|
|
131
|
+
}
|
|
132
|
+
break;
|
|
133
|
+
|
|
134
|
+
case 'terraform':
|
|
135
|
+
if (available.checkov) {
|
|
136
|
+
const checkovIssues = await this.validateWithCheckov(filePath, 'terraform', options);
|
|
137
|
+
issues.push(...checkovIssues);
|
|
138
|
+
}
|
|
139
|
+
break;
|
|
140
|
+
|
|
141
|
+
case 'package.json':
|
|
142
|
+
if (available.jsonSchema) {
|
|
143
|
+
const schemaIssues = await this.validatePackageJson(filePath, options);
|
|
144
|
+
issues.push(...schemaIssues);
|
|
145
|
+
}
|
|
146
|
+
break;
|
|
147
|
+
|
|
148
|
+
case 'tsconfig.json':
|
|
149
|
+
if (available.jsonSchema) {
|
|
150
|
+
const schemaIssues = await this.validateTsConfig(filePath, options);
|
|
151
|
+
issues.push(...schemaIssues);
|
|
152
|
+
}
|
|
153
|
+
break;
|
|
154
|
+
|
|
155
|
+
case 'github-actions':
|
|
156
|
+
if (available.yamllint) {
|
|
157
|
+
const yamlIssues = await this.validateYAML(filePath, options);
|
|
158
|
+
issues.push(...yamlIssues);
|
|
159
|
+
}
|
|
160
|
+
break;
|
|
161
|
+
|
|
162
|
+
case 'env':
|
|
163
|
+
// Always check .env files for secrets (no external tool needed)
|
|
164
|
+
const secretIssues = await this.validateEnvFile(filePath, options);
|
|
165
|
+
issues.push(...secretIssues);
|
|
166
|
+
break;
|
|
167
|
+
|
|
168
|
+
case 'yaml':
|
|
169
|
+
if (available.yamllint) {
|
|
170
|
+
const yamlIssues = await this.validateYAML(filePath, options);
|
|
171
|
+
issues.push(...yamlIssues);
|
|
172
|
+
}
|
|
173
|
+
break;
|
|
174
|
+
|
|
175
|
+
default:
|
|
176
|
+
this.logger?.warn('Unknown config file type', { filePath, fileType });
|
|
177
|
+
return [];
|
|
178
|
+
}
|
|
179
|
+
|
|
180
|
+
return this.normalizeResults(issues);
|
|
181
|
+
}
|
|
182
|
+
|
|
183
|
+
/**
|
|
184
|
+
* Validate Dockerfile using hadolint
|
|
185
|
+
* @private
|
|
186
|
+
*/
|
|
187
|
+
async validateDockerfile(filePath, options = {}) {
|
|
188
|
+
try {
|
|
189
|
+
const result = await execAsync(
|
|
190
|
+
`hadolint --format json "${filePath}"`,
|
|
191
|
+
{
|
|
192
|
+
maxBuffer: 10 * 1024 * 1024,
|
|
193
|
+
timeout: 30000
|
|
194
|
+
}
|
|
195
|
+
);
|
|
196
|
+
|
|
197
|
+
const output = JSON.parse(result.stdout);
|
|
198
|
+
return this.parseHadolintResults(output, filePath);
|
|
199
|
+
} catch (error) {
|
|
200
|
+
// hadolint exits with non-zero if issues found
|
|
201
|
+
if (error.stdout) {
|
|
202
|
+
try {
|
|
203
|
+
const output = JSON.parse(error.stdout);
|
|
204
|
+
return this.parseHadolintResults(output, filePath);
|
|
205
|
+
} catch (parseError) {
|
|
206
|
+
this.logger?.error('Failed to parse hadolint output', {
|
|
207
|
+
error: parseError.message
|
|
208
|
+
});
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
this.logger?.error('hadolint validation failed', { error: error.message });
|
|
212
|
+
return [];
|
|
213
|
+
}
|
|
214
|
+
}
|
|
215
|
+
|
|
216
|
+
/**
|
|
217
|
+
* Parse hadolint results
|
|
218
|
+
* @private
|
|
219
|
+
*/
|
|
220
|
+
parseHadolintResults(output, filePath) {
|
|
221
|
+
const issues = [];
|
|
222
|
+
|
|
223
|
+
if (Array.isArray(output)) {
|
|
224
|
+
for (const issue of output) {
|
|
225
|
+
issues.push({
|
|
226
|
+
file: filePath,
|
|
227
|
+
line: issue.line || 1,
|
|
228
|
+
column: issue.column || 1,
|
|
229
|
+
severity: this.mapHadolintSeverity(issue.level),
|
|
230
|
+
rule: issue.code,
|
|
231
|
+
message: issue.message,
|
|
232
|
+
category: 'dockerfile',
|
|
233
|
+
validator: 'hadolint'
|
|
234
|
+
});
|
|
235
|
+
}
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
return issues;
|
|
239
|
+
}
|
|
240
|
+
|
|
241
|
+
/**
|
|
242
|
+
* Validate YAML files using yamllint
|
|
243
|
+
* @private
|
|
244
|
+
*/
|
|
245
|
+
async validateYAML(filePath, options = {}) {
|
|
246
|
+
try {
|
|
247
|
+
const result = await execAsync(
|
|
248
|
+
`yamllint -f parsable "${filePath}"`,
|
|
249
|
+
{
|
|
250
|
+
maxBuffer: 10 * 1024 * 1024,
|
|
251
|
+
timeout: 30000
|
|
252
|
+
}
|
|
253
|
+
);
|
|
254
|
+
|
|
255
|
+
return this.parseYamllintResults(result.stdout, filePath);
|
|
256
|
+
} catch (error) {
|
|
257
|
+
// yamllint exits with non-zero if issues found
|
|
258
|
+
if (error.stdout) {
|
|
259
|
+
return this.parseYamllintResults(error.stdout, filePath);
|
|
260
|
+
}
|
|
261
|
+
this.logger?.error('yamllint validation failed', { error: error.message });
|
|
262
|
+
return [];
|
|
263
|
+
}
|
|
264
|
+
}
|
|
265
|
+
|
|
266
|
+
/**
|
|
267
|
+
* Parse yamllint results
|
|
268
|
+
* @private
|
|
269
|
+
*/
|
|
270
|
+
parseYamllintResults(output, filePath) {
|
|
271
|
+
const issues = [];
|
|
272
|
+
const lines = output.split('\n').filter(line => line.trim());
|
|
273
|
+
|
|
274
|
+
for (const line of lines) {
|
|
275
|
+
// Format: file:line:column: [level] message (rule)
|
|
276
|
+
const match = line.match(/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);
|
|
277
|
+
if (match) {
|
|
278
|
+
const [, file, lineNum, col, level, message, rule] = match;
|
|
279
|
+
issues.push({
|
|
280
|
+
file: filePath,
|
|
281
|
+
line: parseInt(lineNum, 10),
|
|
282
|
+
column: parseInt(col, 10),
|
|
283
|
+
severity: this.mapYamllintSeverity(level),
|
|
284
|
+
rule: rule,
|
|
285
|
+
message: message,
|
|
286
|
+
category: 'yaml',
|
|
287
|
+
validator: 'yamllint'
|
|
288
|
+
});
|
|
289
|
+
}
|
|
290
|
+
}
|
|
291
|
+
|
|
292
|
+
return issues;
|
|
293
|
+
}
|
|
294
|
+
|
|
295
|
+
/**
|
|
296
|
+
* Validate with checkov (Infrastructure as Code)
|
|
297
|
+
* @private
|
|
298
|
+
*/
|
|
299
|
+
async validateWithCheckov(filePath, framework, options = {}) {
|
|
300
|
+
try {
|
|
301
|
+
const result = await execAsync(
|
|
302
|
+
`checkov -f "${filePath}" --framework ${framework} --output json --compact`,
|
|
303
|
+
{
|
|
304
|
+
maxBuffer: 10 * 1024 * 1024,
|
|
305
|
+
timeout: 60000
|
|
306
|
+
}
|
|
307
|
+
);
|
|
308
|
+
|
|
309
|
+
const output = JSON.parse(result.stdout);
|
|
310
|
+
return this.parseCheckovResults(output, filePath);
|
|
311
|
+
} catch (error) {
|
|
312
|
+
// checkov exits with non-zero if issues found
|
|
313
|
+
if (error.stdout) {
|
|
314
|
+
try {
|
|
315
|
+
const output = JSON.parse(error.stdout);
|
|
316
|
+
return this.parseCheckovResults(output, filePath);
|
|
317
|
+
} catch (parseError) {
|
|
318
|
+
this.logger?.error('Failed to parse checkov output', {
|
|
319
|
+
error: parseError.message
|
|
320
|
+
});
|
|
321
|
+
}
|
|
322
|
+
}
|
|
323
|
+
this.logger?.error('checkov validation failed', { error: error.message });
|
|
324
|
+
return [];
|
|
325
|
+
}
|
|
326
|
+
}
|
|
327
|
+
|
|
328
|
+
/**
|
|
329
|
+
* Parse checkov results
|
|
330
|
+
* @private
|
|
331
|
+
*/
|
|
332
|
+
parseCheckovResults(output, filePath) {
|
|
333
|
+
const issues = [];
|
|
334
|
+
|
|
335
|
+
if (output.results && output.results.failed_checks) {
|
|
336
|
+
for (const check of output.results.failed_checks) {
|
|
337
|
+
issues.push({
|
|
338
|
+
file: filePath,
|
|
339
|
+
line: check.file_line_range ? check.file_line_range[0] : 1,
|
|
340
|
+
column: 1,
|
|
341
|
+
severity: this.mapCheckovSeverity(check.check_class),
|
|
342
|
+
rule: check.check_id,
|
|
343
|
+
message: check.check_name || check.check_id,
|
|
344
|
+
category: 'security',
|
|
345
|
+
validator: 'checkov',
|
|
346
|
+
remediation: check.guideline,
|
|
347
|
+
cwe: check.cwe,
|
|
348
|
+
references: check.guideline ? [check.guideline] : []
|
|
349
|
+
});
|
|
350
|
+
}
|
|
351
|
+
}
|
|
352
|
+
|
|
353
|
+
return issues;
|
|
354
|
+
}
|
|
355
|
+
|
|
356
|
+
/**
|
|
357
|
+
* Validate package.json using JSON Schema
|
|
358
|
+
* @private
|
|
359
|
+
*/
|
|
360
|
+
async validatePackageJson(filePath, options = {}) {
|
|
361
|
+
try {
|
|
362
|
+
const Ajv = (await import('ajv')).default;
|
|
363
|
+
const addFormats = (await import('ajv-formats')).default;
|
|
364
|
+
|
|
365
|
+
const content = await fs.readFile(filePath, 'utf-8');
|
|
366
|
+
const packageJson = JSON.parse(content);
|
|
367
|
+
|
|
368
|
+
const ajv = new Ajv({ allErrors: true, strict: false });
|
|
369
|
+
addFormats(ajv);
|
|
370
|
+
|
|
371
|
+
// Basic package.json schema (simplified)
|
|
372
|
+
const schema = {
|
|
373
|
+
type: 'object',
|
|
374
|
+
required: ['name', 'version'],
|
|
375
|
+
properties: {
|
|
376
|
+
name: { type: 'string', pattern: '^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$' },
|
|
377
|
+
version: { type: 'string' },
|
|
378
|
+
description: { type: 'string' },
|
|
379
|
+
main: { type: 'string' },
|
|
380
|
+
type: { type: 'string', enum: ['module', 'commonjs'] },
|
|
381
|
+
scripts: { type: 'object' },
|
|
382
|
+
dependencies: { type: 'object' },
|
|
383
|
+
devDependencies: { type: 'object' }
|
|
384
|
+
},
|
|
385
|
+
additionalProperties: true
|
|
386
|
+
};
|
|
387
|
+
|
|
388
|
+
const validate = ajv.compile(schema);
|
|
389
|
+
const valid = validate(packageJson);
|
|
390
|
+
|
|
391
|
+
if (!valid && validate.errors) {
|
|
392
|
+
return validate.errors.map(error => ({
|
|
393
|
+
file: filePath,
|
|
394
|
+
line: 1,
|
|
395
|
+
column: 1,
|
|
396
|
+
severity: STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
397
|
+
rule: 'json-schema',
|
|
398
|
+
message: error.instancePath ? `${error.instancePath} ${error.message}` : `must have required property '${error.params.missingProperty}'`,
|
|
399
|
+
category: 'validation',
|
|
400
|
+
validator: 'json-schema'
|
|
401
|
+
}));
|
|
402
|
+
}
|
|
403
|
+
|
|
404
|
+
return [];
|
|
405
|
+
} catch (error) {
|
|
406
|
+
this.logger?.error('package.json validation failed', { error: error.message });
|
|
407
|
+
return [{
|
|
408
|
+
file: filePath,
|
|
409
|
+
line: 1,
|
|
410
|
+
column: 1,
|
|
411
|
+
severity: STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
412
|
+
rule: 'json-parse',
|
|
413
|
+
message: `Invalid JSON: ${error.message}`,
|
|
414
|
+
category: 'syntax',
|
|
415
|
+
validator: 'json-parse'
|
|
416
|
+
}];
|
|
417
|
+
}
|
|
418
|
+
}
|
|
419
|
+
|
|
420
|
+
/**
|
|
421
|
+
* Validate tsconfig.json using JSON Schema
|
|
422
|
+
* @private
|
|
423
|
+
*/
|
|
424
|
+
async validateTsConfig(filePath, options = {}) {
|
|
425
|
+
try {
|
|
426
|
+
const content = await fs.readFile(filePath, 'utf-8');
|
|
427
|
+
const tsconfig = JSON.parse(content);
|
|
428
|
+
|
|
429
|
+
const issues = [];
|
|
430
|
+
|
|
431
|
+
// Check for common misconfigurations
|
|
432
|
+
if (tsconfig.compilerOptions) {
|
|
433
|
+
const opts = tsconfig.compilerOptions;
|
|
434
|
+
|
|
435
|
+
// Check for strict mode
|
|
436
|
+
if (!opts.strict) {
|
|
437
|
+
issues.push({
|
|
438
|
+
file: filePath,
|
|
439
|
+
line: 1,
|
|
440
|
+
column: 1,
|
|
441
|
+
severity: STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
442
|
+
rule: 'strict-mode',
|
|
443
|
+
message: 'Consider enabling "strict" mode for better type safety',
|
|
444
|
+
category: 'best-practice',
|
|
445
|
+
validator: 'tsconfig-validator'
|
|
446
|
+
});
|
|
447
|
+
}
|
|
448
|
+
|
|
449
|
+
// Check for noImplicitAny
|
|
450
|
+
if (opts.noImplicitAny === false) {
|
|
451
|
+
issues.push({
|
|
452
|
+
file: filePath,
|
|
453
|
+
line: 1,
|
|
454
|
+
column: 1,
|
|
455
|
+
severity: STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
456
|
+
rule: 'no-implicit-any',
|
|
457
|
+
message: 'Disabling noImplicitAny reduces type safety',
|
|
458
|
+
category: 'best-practice',
|
|
459
|
+
validator: 'tsconfig-validator'
|
|
460
|
+
});
|
|
461
|
+
}
|
|
462
|
+
}
|
|
463
|
+
|
|
464
|
+
return issues;
|
|
465
|
+
} catch (error) {
|
|
466
|
+
this.logger?.error('tsconfig.json validation failed', { error: error.message });
|
|
467
|
+
return [{
|
|
468
|
+
file: filePath,
|
|
469
|
+
line: 1,
|
|
470
|
+
column: 1,
|
|
471
|
+
severity: STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
472
|
+
rule: 'json-parse',
|
|
473
|
+
message: `Invalid JSON: ${error.message}`,
|
|
474
|
+
category: 'syntax',
|
|
475
|
+
validator: 'json-parse'
|
|
476
|
+
}];
|
|
477
|
+
}
|
|
478
|
+
}
|
|
479
|
+
|
|
480
|
+
/**
|
|
481
|
+
* Validate .env file for security issues
|
|
482
|
+
* @private
|
|
483
|
+
*/
|
|
484
|
+
async validateEnvFile(filePath, options = {}) {
|
|
485
|
+
try {
|
|
486
|
+
const content = await fs.readFile(filePath, 'utf-8');
|
|
487
|
+
const issues = [];
|
|
488
|
+
const lines = content.split('\n');
|
|
489
|
+
|
|
490
|
+
const secretPatterns = [
|
|
491
|
+
{ pattern: /password|passwd|pwd/i, name: 'password' },
|
|
492
|
+
{ pattern: /api[_-]?key/i, name: 'API key' },
|
|
493
|
+
{ pattern: /secret/i, name: 'secret' },
|
|
494
|
+
{ pattern: /token/i, name: 'token' },
|
|
495
|
+
{ pattern: /private[_-]?key/i, name: 'private key' },
|
|
496
|
+
{ pattern: /aws[_-]?access/i, name: 'AWS credentials' }
|
|
497
|
+
];
|
|
498
|
+
|
|
499
|
+
lines.forEach((line, index) => {
|
|
500
|
+
const trimmed = line.trim();
|
|
501
|
+
|
|
502
|
+
// Skip comments and empty lines
|
|
503
|
+
if (!trimmed || trimmed.startsWith('#')) return;
|
|
504
|
+
|
|
505
|
+
// Check for hardcoded values (not references to other env vars)
|
|
506
|
+
if (trimmed.includes('=')) {
|
|
507
|
+
const [key, value] = trimmed.split('=');
|
|
508
|
+
const keyLower = key.toLowerCase();
|
|
509
|
+
const valueTrimmed = value?.trim() || '';
|
|
510
|
+
|
|
511
|
+
// Check if value looks like a real secret (not empty, not a placeholder)
|
|
512
|
+
const looksLikeSecret = valueTrimmed &&
|
|
513
|
+
valueTrimmed !== '' &&
|
|
514
|
+
!valueTrimmed.startsWith('$') && // Not env var reference
|
|
515
|
+
valueTrimmed !== 'your-key-here' &&
|
|
516
|
+
valueTrimmed !== 'changeme' &&
|
|
517
|
+
valueTrimmed.length > 5;
|
|
518
|
+
|
|
519
|
+
if (looksLikeSecret) {
|
|
520
|
+
for (const { pattern, name } of secretPatterns) {
|
|
521
|
+
if (pattern.test(keyLower)) {
|
|
522
|
+
issues.push({
|
|
523
|
+
file: filePath,
|
|
524
|
+
line: index + 1,
|
|
525
|
+
column: 1,
|
|
526
|
+
severity: STATIC_ANALYSIS.SEVERITY.CRITICAL,
|
|
527
|
+
rule: 'hardcoded-secret',
|
|
528
|
+
message: `Potential hardcoded ${name} detected in .env file`,
|
|
529
|
+
category: 'security',
|
|
530
|
+
validator: 'env-validator',
|
|
531
|
+
remediation: 'Use environment-specific .env files and add .env to .gitignore'
|
|
532
|
+
});
|
|
533
|
+
break;
|
|
534
|
+
}
|
|
535
|
+
}
|
|
536
|
+
}
|
|
537
|
+
}
|
|
538
|
+
});
|
|
539
|
+
|
|
540
|
+
return issues;
|
|
541
|
+
} catch (error) {
|
|
542
|
+
this.logger?.error('.env validation failed', { error: error.message });
|
|
543
|
+
return [];
|
|
544
|
+
}
|
|
545
|
+
}
|
|
546
|
+
|
|
547
|
+
/**
|
|
548
|
+
* Detect configuration file type
|
|
549
|
+
* @private
|
|
550
|
+
*/
|
|
551
|
+
detectFileType(filePath) {
|
|
552
|
+
const basename = path.basename(filePath).toLowerCase();
|
|
553
|
+
const dirname = path.dirname(filePath);
|
|
554
|
+
|
|
555
|
+
// Exact filename matches
|
|
556
|
+
if (basename === 'dockerfile') return 'dockerfile';
|
|
557
|
+
if (basename === 'docker-compose.yml' || basename === 'docker-compose.yaml') return 'docker-compose';
|
|
558
|
+
if (basename === 'package.json') return 'package.json';
|
|
559
|
+
if (basename === 'tsconfig.json') return 'tsconfig.json';
|
|
560
|
+
if (basename === '.env' || basename.endsWith('.env')) return 'env';
|
|
561
|
+
|
|
562
|
+
// Path-based detection
|
|
563
|
+
if (dirname.includes('.github/workflows')) return 'github-actions';
|
|
564
|
+
if (dirname.includes('kubernetes') || dirname.includes('k8s')) return 'kubernetes';
|
|
565
|
+
|
|
566
|
+
// Extension-based detection
|
|
567
|
+
const ext = path.extname(filePath).toLowerCase();
|
|
568
|
+
if (ext === '.tf' || ext === '.tfvars') return 'terraform';
|
|
569
|
+
if (ext === '.yml' || ext === '.yaml') return 'yaml';
|
|
570
|
+
if (ext === '.json') return 'json';
|
|
571
|
+
|
|
572
|
+
return 'unknown';
|
|
573
|
+
}
|
|
574
|
+
|
|
575
|
+
/**
|
|
576
|
+
* Normalize all validator results to common format
|
|
577
|
+
* @private
|
|
578
|
+
*/
|
|
579
|
+
normalizeResults(results) {
|
|
580
|
+
return results.map(result => ({
|
|
581
|
+
file: result.file,
|
|
582
|
+
line: result.line || 1,
|
|
583
|
+
column: result.column || 1,
|
|
584
|
+
severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
585
|
+
rule: result.rule || 'unknown',
|
|
586
|
+
message: result.message || 'Validation issue detected',
|
|
587
|
+
category: result.category || 'validation',
|
|
588
|
+
validator: result.validator,
|
|
589
|
+
cwe: result.cwe || null,
|
|
590
|
+
remediation: result.remediation || null,
|
|
591
|
+
references: result.references || []
|
|
592
|
+
}));
|
|
593
|
+
}
|
|
594
|
+
|
|
595
|
+
/**
|
|
596
|
+
* Map hadolint severity to our standard
|
|
597
|
+
* @private
|
|
598
|
+
*/
|
|
599
|
+
mapHadolintSeverity(level) {
|
|
600
|
+
const map = {
|
|
601
|
+
'error': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
602
|
+
'warning': STATIC_ANALYSIS.SEVERITY.WARNING,
|
|
603
|
+
'info': STATIC_ANALYSIS.SEVERITY.INFO,
|
|
604
|
+
'style': STATIC_ANALYSIS.SEVERITY.INFO
|
|
605
|
+
};
|
|
606
|
+
return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
607
|
+
}
|
|
608
|
+
|
|
609
|
+
/**
|
|
610
|
+
* Map yamllint severity to our standard
|
|
611
|
+
* @private
|
|
612
|
+
*/
|
|
613
|
+
mapYamllintSeverity(level) {
|
|
614
|
+
const map = {
|
|
615
|
+
'error': STATIC_ANALYSIS.SEVERITY.ERROR,
|
|
616
|
+
'warning': STATIC_ANALYSIS.SEVERITY.WARNING
|
|
617
|
+
};
|
|
618
|
+
return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
|
|
619
|
+
}
|
|
620
|
+
|
|
621
|
+
/**
|
|
622
|
+
* Map checkov severity to our standard
|
|
623
|
+
* @private
|
|
624
|
+
*/
|
|
625
|
+
mapCheckovSeverity(checkClass) {
|
|
626
|
+
// checkov uses check_class to categorize severity
|
|
627
|
+
// Most security issues are treated as errors
|
|
628
|
+
return STATIC_ANALYSIS.SEVERITY.ERROR;
|
|
629
|
+
}
|
|
630
|
+
|
|
631
|
+
/**
|
|
632
|
+
* Get validator status report
|
|
633
|
+
* @returns {Promise<Object>} Validator availability and status
|
|
634
|
+
*/
|
|
635
|
+
async getValidatorStatus() {
|
|
636
|
+
const available = await this.detectAvailableValidators();
|
|
637
|
+
return {
|
|
638
|
+
validators: available,
|
|
639
|
+
recommendations: this.getInstallRecommendations(available)
|
|
640
|
+
};
|
|
641
|
+
}
|
|
642
|
+
|
|
643
|
+
/**
|
|
644
|
+
* Get installation recommendations for missing validators
|
|
645
|
+
* @private
|
|
646
|
+
*/
|
|
647
|
+
getInstallRecommendations(available) {
|
|
648
|
+
const recommendations = [];
|
|
649
|
+
|
|
650
|
+
if (!available.checkov) {
|
|
651
|
+
recommendations.push({
|
|
652
|
+
validator: 'checkov',
|
|
653
|
+
reason: 'Infrastructure as Code security scanning (Docker, Kubernetes, Terraform)',
|
|
654
|
+
install: 'pip install checkov',
|
|
655
|
+
priority: 'high'
|
|
656
|
+
});
|
|
657
|
+
}
|
|
658
|
+
|
|
659
|
+
if (!available.hadolint) {
|
|
660
|
+
recommendations.push({
|
|
661
|
+
validator: 'hadolint',
|
|
662
|
+
reason: 'Dockerfile linting and best practices',
|
|
663
|
+
install: 'Download from https://github.com/hadolint/hadolint/releases',
|
|
664
|
+
priority: 'high'
|
|
665
|
+
});
|
|
666
|
+
}
|
|
667
|
+
|
|
668
|
+
if (!available.yamllint) {
|
|
669
|
+
recommendations.push({
|
|
670
|
+
validator: 'yamllint',
|
|
671
|
+
reason: 'YAML file validation',
|
|
672
|
+
install: 'pip install yamllint',
|
|
673
|
+
priority: 'medium'
|
|
674
|
+
});
|
|
675
|
+
}
|
|
676
|
+
|
|
677
|
+
if (!available.jsonSchema) {
|
|
678
|
+
recommendations.push({
|
|
679
|
+
validator: 'ajv (JSON Schema)',
|
|
680
|
+
reason: 'JSON configuration validation',
|
|
681
|
+
install: 'npm install ajv ajv-formats',
|
|
682
|
+
priority: 'medium'
|
|
683
|
+
});
|
|
684
|
+
}
|
|
685
|
+
|
|
686
|
+
return recommendations;
|
|
687
|
+
}
|
|
688
|
+
}
|
|
689
|
+
|
|
690
|
+
export default ConfigValidator;
|