conviso-cli 2.2.4__tar.gz → 2.2.5.dev0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (130) hide show
  1. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/PKG-INFO +1 -1
  2. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/conviso_cli.egg-info/PKG-INFO +1 -1
  3. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/ast/entrypoint.py +5 -5
  4. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/import_sarif/entrypoint.py +3 -3
  5. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/iac/run.py +7 -7
  6. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/requirements_verifier.py +12 -12
  7. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sast/run.py +9 -9
  8. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sbom/generate.py +2 -2
  9. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sca/run.py +7 -7
  10. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/vulnerability/assert_security_rules.py +6 -6
  11. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/vulnerability/run.py +9 -9
  12. conviso-cli-2.2.5.dev0/convisoappsec/version.py +1 -0
  13. conviso-cli-2.2.4/convisoappsec/version.py +0 -1
  14. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/README.md +0 -0
  15. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/conviso_cli.egg-info/SOURCES.txt +0 -0
  16. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/conviso_cli.egg-info/dependency_links.txt +0 -0
  17. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/conviso_cli.egg-info/entry_points.txt +0 -0
  18. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/conviso_cli.egg-info/requires.txt +0 -0
  19. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/conviso_cli.egg-info/top_level.txt +0 -0
  20. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/__init__.py +0 -0
  21. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/__init__.py +0 -0
  22. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/box.py +0 -0
  23. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/docker.py +0 -0
  24. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/exceptions.py +0 -0
  25. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/git_data_parser.py +0 -0
  26. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/graphql/__init__.py +0 -0
  27. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/graphql/error_handlers.py +0 -0
  28. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/graphql/errors.py +0 -0
  29. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/graphql/low_client.py +0 -0
  30. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/common/strings.py +0 -0
  31. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/__init__.py +0 -0
  32. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/api.py +0 -0
  33. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/__init__.py +0 -0
  34. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/__init__.py +0 -0
  35. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/client.py +0 -0
  36. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/models/__init__.py +0 -0
  37. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/models/issues/__init__.py +0 -0
  38. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/models/issues/iac.py +0 -0
  39. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/models/issues/normalize.py +0 -0
  40. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/models/issues/sast.py +0 -0
  41. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/models/issues/sca.py +0 -0
  42. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/resources_api.py +0 -0
  43. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/schemas/__init__.py +0 -0
  44. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/schemas/mutations/__init__.py +0 -0
  45. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/beta/schemas/resolvers/__init__.py +0 -0
  46. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/__init__.py +0 -0
  47. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/client.py +0 -0
  48. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/models/__init__.py +0 -0
  49. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/models/asset.py +0 -0
  50. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/models/issues.py +0 -0
  51. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/models/project.py +0 -0
  52. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/resources_api.py +0 -0
  53. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/schemas/__init__.py +0 -0
  54. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/schemas/mutations/__init__.py +0 -0
  55. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/graphql_api/v1/schemas/resolvers/__init__.py +0 -0
  56. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/source_code_scanner/__init__.py +0 -0
  57. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/source_code_scanner/exceptions.py +0 -0
  58. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/source_code_scanner/scc.py +0 -0
  59. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/source_code_scanner/source_code_scanner.py +0 -0
  60. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/util/__init__.py +0 -0
  61. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/util/ci_provider.py +0 -0
  62. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/util/metrics.py +0 -0
  63. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/util/source_code_compressor.py +0 -0
  64. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/version_control_system_adapter.py +0 -0
  65. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/version_searchers/__init__.py +0 -0
  66. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/version_searchers/sorted_by_versioning_style.py +0 -0
  67. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/version_searchers/timebased_version_seacher.py +0 -0
  68. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/version_searchers/version_searcher_result.py +0 -0
  69. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/versioning_style/__init__.py +0 -0
  70. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flow/versioning_style/semantic_versioning.py +0 -0
  71. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/__init__.py +0 -0
  72. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/__main__.py +0 -0
  73. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/assets/__init__.py +0 -0
  74. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/assets/create.py +0 -0
  75. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/assets/entrypoint.py +0 -0
  76. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/assets/ls.py +0 -0
  77. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/ast/__init__.py +0 -0
  78. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/common.py +0 -0
  79. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/companies/__init__.py +0 -0
  80. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/companies/ls.py +0 -0
  81. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/context.py +0 -0
  82. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/__init__.py +0 -0
  83. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/__init__.py +0 -0
  84. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/context.py +0 -0
  85. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/entrypoint.py +0 -0
  86. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/__init__.py +0 -0
  87. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/entrypoint.py +0 -0
  88. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/tag_tracker/__init__.py +0 -0
  89. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/tag_tracker/context.py +0 -0
  90. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/tag_tracker/entrypoint.py +0 -0
  91. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/tag_tracker/sort_by/__init__.py +0 -0
  92. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/tag_tracker/sort_by/entrypoint.py +0 -0
  93. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/tag_tracker/sort_by/time_.py +0 -0
  94. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/tag_tracker/sort_by/versioning_style.py +0 -0
  95. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/create/with_/values.py +0 -0
  96. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/entrypoint.py +0 -0
  97. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/ls.py +0 -0
  98. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/deploy/show.py +0 -0
  99. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/entrypoint.py +0 -0
  100. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/__init__.py +0 -0
  101. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/create/__init__.py +0 -0
  102. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/create/entrypoint.py +0 -0
  103. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/create/with_/__init__.py +0 -0
  104. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/create/with_/entrypoint.py +0 -0
  105. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/create/with_/version_tracker.py +0 -0
  106. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/entrypoint.py +0 -0
  107. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/findings/import_sarif/__init__.py +0 -0
  108. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/help_option.py +0 -0
  109. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/iac/__init__.py +0 -0
  110. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/iac/entrypoint.py +0 -0
  111. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/projects/__init__.py +0 -0
  112. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/projects/ls.py +0 -0
  113. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sast/__init__.py +0 -0
  114. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sast/entrypoint.py +0 -0
  115. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sbom/__init__.py +0 -0
  116. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sbom/entrypoint.py +0 -0
  117. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sca/__init__.py +0 -0
  118. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/sca/entrypoint.py +0 -0
  119. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/vulnerability/__init__.py +0 -0
  120. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/vulnerability/entrypoint.py +0 -0
  121. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/flowcli/vulnerability/rules_schema.json +0 -0
  122. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/logger.py +0 -0
  123. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/sast/__init__.py +0 -0
  124. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/sast/decision.py +0 -0
  125. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/convisoappsec/sast/sastbox.py +0 -0
  126. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/scripts/shell_completer/flow_bash_completer.sh +0 -0
  127. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/scripts/shell_completer/flow_fish_completer.fish +0 -0
  128. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/scripts/shell_completer/flow_zsh_completer.sh +0 -0
  129. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/setup.cfg +0 -0
  130. {conviso-cli-2.2.4 → conviso-cli-2.2.5.dev0}/setup.py +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: conviso-cli
3
- Version: 2.2.4
3
+ Version: 2.2.5.dev0
4
4
  Summary: UNKNOWN
5
5
  Maintainer: Conviso
6
6
  Maintainer-email: development@convisoappsec.com
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: conviso-cli
3
- Version: 2.2.4
3
+ Version: 2.2.5.dev0
4
4
  Summary: UNKNOWN
5
5
  Maintainer: Conviso
6
6
  Maintainer-email: development@convisoappsec.com
@@ -64,7 +64,7 @@ def perform_sast(context) -> None:
64
64
  context.params = parse_params(context.params, sast_run.params)
65
65
  try:
66
66
  LOGGER.info(
67
- 'Running SAST on deploy ID "{deploy_id}"'
67
+ 'Running SAST on deploy ID "{deploy_id}"...'
68
68
  .format(deploy_id=context.params["deploy_id"])
69
69
  )
70
70
  sast_run.invoke(context)
@@ -84,7 +84,7 @@ def perform_sca(context) -> None:
84
84
  context.params = parse_params(context.params, sca_run.params)
85
85
  try:
86
86
  LOGGER.info(
87
- 'Running SCA on deploy ID "{deploy_id}"'
87
+ 'Running SCA on deploy ID "{deploy_id}"...'
88
88
  .format(deploy_id=context.params["deploy_id"])
89
89
  )
90
90
  sca_run.invoke(context)
@@ -105,7 +105,7 @@ def perform_iac(context) -> None:
105
105
 
106
106
  try:
107
107
  LOGGER.info(
108
- 'Running IAC on deploy ID "{deploy_id}"'
108
+ 'Running IAC on deploy ID "{deploy_id}"...'
109
109
  .format(deploy_id=context.params["deploy_id"])
110
110
  )
111
111
  iac_run.invoke(context)
@@ -125,7 +125,7 @@ def perform_vulnerabilities_service(context) -> None:
125
125
  context.params = parse_params(context.params, auto_close_run.params)
126
126
 
127
127
  try:
128
- LOGGER.info("[*] Verifying if any vulnerability was fixed ...")
128
+ LOGGER.info("[*] Verifying if any vulnerability was fixed...")
129
129
  auto_close_run.invoke(context)
130
130
  except Exception as err:
131
131
  raise click.ClickException(str(err)) from err
@@ -152,7 +152,7 @@ def perform_deploy(context):
152
152
  )
153
153
  context.params = parse_params(context.params, values.params)
154
154
  try:
155
- LOGGER.info("Creating new deploy ...")
155
+ LOGGER.info("Creating new deploy...")
156
156
  created_deploy = values.invoke(context)
157
157
 
158
158
  if created_deploy:
@@ -94,7 +94,7 @@ def perform_command(flow_context, input_file, project_code=None, asset_id=None,
94
94
  # check if this function is called by the cli itself, then returns only the converted file.
95
95
  return sastboxv1_filepath
96
96
 
97
- print('Initializing importation of SARIF results to the Conviso Platform...')
97
+ print('Initializing the importation of SARIF results to the Conviso Platform...')
98
98
 
99
99
  if experimental:
100
100
  conviso_api = flow_context.create_conviso_api_client_beta()
@@ -162,9 +162,9 @@ def create_conviso_findings_from_sarif_on_new_flow(conviso_api, sastboxv1_filepa
162
162
  else:
163
163
  raise(error)
164
164
 
165
- msg = "\U0001F4AC %s Issue/Issues ignored during duplication" % duplicated_issues
165
+ msg = "💬 %s Issue/Issues ignored during duplication." % duplicated_issues
166
166
  LOGGER.info(msg)
167
- LOGGER.info("Success on importation of SARIF file.")
167
+ LOGGER.info("Successful importation of the SARIF file.")
168
168
 
169
169
  def parse_code_snippet(encoded_base64):
170
170
  decoded_text = b64decode(encoded_base64).decode("utf-8")
@@ -138,7 +138,7 @@ def run(context, flow_context, project_code, asset_id, company_id, repository_di
138
138
 
139
139
  def deploy_results_to_conviso(conviso_api, results_filepaths, project_code, deploy_id, repository_dir, token, scanner_timeout):
140
140
  results_context = click.progressbar(
141
- results_filepaths, label="Sending reports to Conviso Platform"
141
+ results_filepaths, label="Sending results to the Conviso Platform..."
142
142
  )
143
143
 
144
144
  with results_context as reports:
@@ -161,7 +161,7 @@ def deploy_results_to_conviso(conviso_api, results_filepaths, project_code, depl
161
161
  def deploy_results_to_conviso_beta(
162
162
  conviso_api, results_filepaths, asset_id, deploy_id, repository_dir, token, scanner_timeout, commit_ref=None
163
163
  ):
164
- results_context = click.progressbar(results_filepaths, label="Sending results to Conviso Platform")
164
+ results_context = click.progressbar(results_filepaths, label="Sending results to the Conviso Platform...")
165
165
 
166
166
  duplicated_issues = 0
167
167
 
@@ -196,7 +196,7 @@ def deploy_results_to_conviso_beta(
196
196
  else:
197
197
  raise error
198
198
 
199
- msg = "\U0001F4AC %s Issue/Issues ignored during duplication" % duplicated_issues
199
+ msg = "💬 %s Issue/Issues ignored during duplication." % duplicated_issues
200
200
  LOGGER.info(msg)
201
201
  pass
202
202
 
@@ -242,7 +242,7 @@ def perform_command(
242
242
  },
243
243
  }
244
244
 
245
- LOGGER.info('\U0001F4AC Preparing Environment')
245
+ LOGGER.info('💬 Preparing Environment...')
246
246
  conviso_rest_api = flow_context.create_conviso_rest_api_client()
247
247
  token = conviso_rest_api.docker_registry.get_sast_token()
248
248
  scanners_wrapper = ContainerWrapper(
@@ -252,7 +252,7 @@ def perform_command(
252
252
  timeout=scanner_timeout
253
253
  )
254
254
 
255
- LOGGER.info('\U0001F4AC Starting IaC')
255
+ LOGGER.info('💬 Starting IaC...')
256
256
  scanners_wrapper.run()
257
257
 
258
258
  results_filepaths = [] # [str(r.results) for r in scanners_wrapper.scanners]
@@ -261,7 +261,7 @@ def perform_command(
261
261
  if report_filepath:
262
262
  results_filepaths.append(report_filepath)
263
263
 
264
- LOGGER.info('\U0001F4AC Processing Results')
264
+ LOGGER.info('💬 Processing Results...')
265
265
  if send_to_flow:
266
266
  git_adapater = GitAdapter(repository_dir)
267
267
  end_commit = git_adapater.head_commit
@@ -290,7 +290,7 @@ def perform_command(
290
290
  token=token,
291
291
  scanner_timeout=scanner_timeout,
292
292
  )
293
- LOGGER.info('\U00002705 IaC Scan Finished')
293
+ LOGGER.info(' IaC Scan Finished.')
294
294
 
295
295
  except Exception as e:
296
296
  on_http_error(e)
@@ -79,10 +79,10 @@ class RequirementsVerifier:
79
79
  existing_assets = RequirementsVerifier.list_assets(company_id, old_name, 'SAST')
80
80
  for asset in existing_assets:
81
81
  if asset['name'] == old_name or asset['name'] == new_name:
82
- LOGGER.info('Asset found ...')
82
+ LOGGER.info('Asset found...')
83
83
  context.params['asset_name'] = asset['name']
84
84
  return [asset]
85
- LOGGER.info('Asset not found creating ...')
85
+ LOGGER.info('Asset not found; creating...')
86
86
  new_asset = RequirementsVerifier.create_asset(company_id, new_name, 'SAST')
87
87
  context.params['asset_name'] = new_name
88
88
  return [new_asset]
@@ -98,10 +98,10 @@ class RequirementsVerifier:
98
98
  existing_asset = RequirementsVerifier.list_assets(company_id, asset_name, 'SAST')
99
99
 
100
100
  if not existing_asset:
101
- LOGGER.info("Asset not found creating with name {} ...".format(asset_name))
101
+ LOGGER.info("Asset not found; creating with name {}...".format(asset_name))
102
102
  asset = RequirementsVerifier.create_asset(company_id, asset_name, 'SAST')
103
103
  else:
104
- LOGGER.info('Asset found ...')
104
+ LOGGER.info('Asset found...')
105
105
  asset = existing_asset[0]
106
106
 
107
107
  context.params['asset_name'] = asset_name
@@ -118,7 +118,7 @@ class RequirementsVerifier:
118
118
  project = RequirementsVerifier.create_project(company_id, asset_id, project_label)
119
119
  return [project]
120
120
  elif len(existing_project) > 1:
121
- error_msg = 'You need to specify the project using --project-code'
121
+ error_msg = 'You need to specify the project using --project-code.'
122
122
  raise CreateDeployException(error_msg)
123
123
 
124
124
  return existing_project
@@ -163,12 +163,12 @@ class RequirementsVerifier:
163
163
  RequirementsVerifier.update_project(project['id'], asset_target['id'])
164
164
 
165
165
  elif len(assets) == 1:
166
- LOGGER.info('Asset found ...')
166
+ LOGGER.info('Asset found...')
167
167
  asset_target = assets[0]
168
168
  elif len(assets) > 1:
169
169
  for asset in assets:
170
170
  if asset['name'] == asset_name:
171
- LOGGER.info('Asset found ...')
171
+ LOGGER.info('Asset found...')
172
172
  asset_target = asset
173
173
  break
174
174
 
@@ -191,14 +191,14 @@ class RequirementsVerifier:
191
191
 
192
192
  if len(companies_filtered) > 1:
193
193
  raise CreateDeployException(
194
- "Deploy not created. You have access to multiple companies, specify one using CONVISO_COMPANY_ID"
194
+ "Deploy not created. You have access to multiple companies; please specify one using CONVISO_COMPANY_ID."
195
195
  )
196
196
 
197
197
  company = companies_filtered[0]
198
198
  company_id = company['id']
199
199
 
200
200
  if new_management_flag not in company['customFeatures']:
201
- error_msg = "Deploy not created. The company '{}' does not have access to the new vulnerability management".format(company['label'])
201
+ error_msg = "Deploy not created. The company '{}' does not have access to the new vulnerability management.".format(company['label'])
202
202
  raise CreateDeployException(error_msg)
203
203
 
204
204
  if context.params['asset_name'] is not None:
@@ -223,7 +223,7 @@ class RequirementsVerifier:
223
223
  project_label = asset_name + '_ast'
224
224
 
225
225
  if 'projects' not in asset or len(asset['projects']) == 0:
226
- LOGGER.info('Project ast not found, creating ...')
226
+ LOGGER.info('Project AST not found; creating...')
227
227
  project = RequirementsVerifier.find_or_create_project(
228
228
  flow_context, project_label, company_id, asset['id']
229
229
  )
@@ -235,11 +235,11 @@ class RequirementsVerifier:
235
235
 
236
236
  for project in projects:
237
237
  if project['type'] == 'ast' and project['label'] == project_label:
238
- LOGGER.info('Project ast founded ...')
238
+ LOGGER.info('Project AST found...')
239
239
  project_code = project['apiCode']
240
240
  break
241
241
  else:
242
- LOGGER.info('Project ast not founded, we will create one ...')
242
+ LOGGER.info('Project AST not found; we will create one...')
243
243
  project = RequirementsVerifier.find_or_create_project(
244
244
  flow_context, project_label, company_id, asset['id']
245
245
  )
@@ -98,11 +98,11 @@ def perform_sastbox_scan(
98
98
  logger("Max retries reached. Failed to perform SAST download.")
99
99
  raise Exception(f"Max retries reached. Could not complete the SAST download. Error: {str(e)}")
100
100
 
101
- logger("Starting SAST scandiff...")
101
+ logger("Starting SAST scan diff...")
102
102
 
103
103
  reports = sastbox.run_scan_diff(repository_dir, end_commit, start_commit, log=logger)
104
104
 
105
- logger("SAST scandiff done")
105
+ logger("SAST scan diff done.")
106
106
 
107
107
  results_filepaths = []
108
108
  for r in reports:
@@ -110,7 +110,7 @@ def perform_sastbox_scan(
110
110
  file_path = str(r)
111
111
  results_filepaths.append(file_path)
112
112
  except Exception as e:
113
- click.echo(f"Error decoding file path: {r} with error {e}", file=sys.stderr)
113
+ click.echo(f"Error decoding file path: {r} with error {e}.", file=sys.stderr)
114
114
 
115
115
  return results_filepaths
116
116
 
@@ -119,7 +119,7 @@ def deploy_results_to_conviso(
119
119
  conviso_api, results_filepaths, project_code, deploy_id=None, commit_refs=None
120
120
  ):
121
121
  results_context = click.progressbar(
122
- results_filepaths, label="Sending SAST reports to Conviso Platform"
122
+ results_filepaths, label="Sending SAST reports to the Conviso Platform..."
123
123
  )
124
124
 
125
125
  with results_context as reports:
@@ -200,7 +200,7 @@ def deploy_results_to_conviso_beta(
200
200
  ):
201
201
 
202
202
  results_context = click.progressbar(
203
- results_filepaths, label="Sending SAST reports to Conviso Platform"
203
+ results_filepaths, label="Sending SAST reports to the Conviso Platform..."
204
204
  )
205
205
 
206
206
  duplicated_issues = 0
@@ -240,7 +240,7 @@ def deploy_results_to_conviso_beta(
240
240
  else:
241
241
  raise error
242
242
 
243
- msg = "\U0001F4AC %s Issue/Issues already on conviso platform due internal validation." % duplicated_issues
243
+ msg = "💬 %s Issue/Issues already on the Conviso Platform due to internal validation." % duplicated_issues
244
244
  log_func(msg)
245
245
 
246
246
 
@@ -269,7 +269,7 @@ def hash_issues_from_cp(context, conviso_api, issues):
269
269
  page += 1
270
270
 
271
271
  log_func(
272
- "\U0001F4AC %s vulnerability/vulnerabilities already on conviso platform." % len(original_issue_ids)
272
+ "💬 %s vulnerability/vulnerabilities already on the Conviso Platform." % len(original_issue_ids)
273
273
  )
274
274
 
275
275
  data = []
@@ -280,7 +280,7 @@ def hash_issues_from_cp(context, conviso_api, issues):
280
280
  data.append(item)
281
281
 
282
282
  log_func(
283
- "\U0001F4AC %s New vulnerability/vulnerabilities founded." % len(data)
283
+ "💬 %s New vulnerability/vulnerabilities found." % len(data)
284
284
  )
285
285
 
286
286
  return data
@@ -530,7 +530,7 @@ def perform_command(
530
530
 
531
531
  if start_commit == end_commit:
532
532
  click.echo(
533
- "Previous commit ({0}) and Current commit ({1}) are the same, nothing to do.".format(
533
+ "Previous commit ({0}) and current commit ({1}) are the same; nothing to do.".format(
534
534
  start_commit, end_commit
535
535
  ),
536
536
  file=sys.stderr,
@@ -145,7 +145,7 @@ def generate(context, flow_context, project_code, asset_id, company_id, reposito
145
145
  subprocess.run(command, shell=True, check=True, capture_output=True)
146
146
  log_func("SBOM file generated successfully!")
147
147
  except subprocess.CalledProcessError as error:
148
- log_func(f"Error generating SBOM file: {error}")
148
+ log_func(f"Error generating SBOM file: {error}.")
149
149
  return
150
150
 
151
151
  asset_id = asset_id or context.params.get('asset_id')
@@ -158,7 +158,7 @@ def send_sbom_file_to_csc(flow_context, company_id, asset_id, file):
158
158
  conviso_api = flow_context.create_conviso_graphql_client()
159
159
  api_key = flow_context.key
160
160
 
161
- log_func(f"Sending sbom to conviso platform ...")
161
+ log_func(f"Sending SBOM to the Conviso Platform...")
162
162
 
163
163
  return conviso_api.sbom.send_sbom_file(company_id=company_id, asset_id=asset_id, file_path=file, api_key=api_key)
164
164
 
@@ -193,7 +193,7 @@ def deploy_results_to_conviso_beta(conviso_api, results_filepaths, asset_id):
193
193
  """ Send vulnerabilities to conviso platform via graphql endpoint """
194
194
 
195
195
  results_context = click.progressbar(
196
- results_filepaths, label="Sending SCA reports to Conviso Platform"
196
+ results_filepaths, label="Sending SCA reports to the Conviso Platform..."
197
197
  )
198
198
 
199
199
  duplicated_issues = 0
@@ -243,7 +243,7 @@ def deploy_results_to_conviso_beta(conviso_api, results_filepaths, asset_id):
243
243
  else:
244
244
  raise error
245
245
 
246
- msg = "\U0001F4AC %s Issue/Issues ignored during duplication" % duplicated_issues
246
+ msg = "💬 %s Issue/Issues ignored during duplication." % duplicated_issues
247
247
  LOGGER.info(msg)
248
248
 
249
249
 
@@ -325,17 +325,17 @@ def perform_command(
325
325
 
326
326
  conviso_rest_api = flow_context.create_conviso_rest_api_client()
327
327
  token = conviso_rest_api.docker_registry.get_sast_token()
328
- LOGGER.info('\U0001F4AC Preparing Environment')
328
+ LOGGER.info('💬 Preparing Environment...')
329
329
  scabox = ContainerWrapper(
330
330
  token=token,
331
331
  containers_map=scanners,
332
332
  logger=LOGGER,
333
333
  timeout=scanner_timeout
334
334
  )
335
- LOGGER.info('\U0001F4AC Starting SCA')
335
+ LOGGER.info('💬 Starting SCA...')
336
336
  scabox.run()
337
337
 
338
- LOGGER.info('\U0001F4AC Processing Results')
338
+ LOGGER.info('💬 Processing Results...')
339
339
  results_filepaths = []
340
340
  for unit in scabox.scanners:
341
341
  file_path = unit.results
@@ -343,7 +343,7 @@ def perform_command(
343
343
  results_filepaths.append(file_path)
344
344
 
345
345
  if send_to_flow:
346
- LOGGER.info(" Sending data to Conviso Platform...")
346
+ LOGGER.info("Sending data to the Conviso Platform...")
347
347
  conviso_beta_api = flow_context.create_conviso_api_client_beta()
348
348
  if experimental:
349
349
  deploy_results_to_conviso_beta(
@@ -360,7 +360,7 @@ def perform_command(
360
360
  )
361
361
 
362
362
  # TODO add CI Decision block code
363
- LOGGER.info('\U00002705 SCA Scan Finished')
363
+ LOGGER.info(' SCA Scan Finished.')
364
364
 
365
365
  # Generate SBOM when execute a sca only scan.
366
366
  sbom_generate = sbom.commands.get('generate')
@@ -79,12 +79,12 @@ def assert_security_rules(
79
79
  )
80
80
 
81
81
  click.secho(
82
- '\U0001F4AC Starting vulnerabilities security rules assertion',
82
+ '💬 Starting vulnerability security rules assertion...',
83
83
  bold=True
84
84
  )
85
85
 
86
86
  click.secho(
87
- "\U0001F4AC Applying the given rules at security gate:\n{0}".format(yaml.dump(rules)),
87
+ "💬 Applying the given rules at the security gate:\n{0}".format(yaml.dump(rules)),
88
88
  bold=True
89
89
  )
90
90
 
@@ -94,7 +94,7 @@ def assert_security_rules(
94
94
 
95
95
  if validate_json(rules)[0] is False:
96
96
  msg = click.secho(
97
- '\U0001F4AC Error: Validation of security gate yaml file, failed in validation step!',
97
+ '💬 Error: Validation of the security gate YAML file failed during the validation step!',
98
98
  bold=True
99
99
  )
100
100
 
@@ -138,7 +138,7 @@ def assert_security_rules(
138
138
  __raise_if_gate_locked(response)
139
139
 
140
140
  click.secho(
141
- '\U00002705 Vulnerabilities security rules assertion finished',
141
+ ' Vulnerability security rules assertion finished.',
142
142
  bold=True
143
143
  )
144
144
  except Exception as e:
@@ -163,14 +163,14 @@ def tolerated_days_by_severity(rules):
163
163
 
164
164
  def __raise_if_gate_locked(response):
165
165
  if response['locked']:
166
- click.secho('\U0001F4AC Vulnerabilities summary', bold=True)
166
+ click.secho('💬 Vulnerabilities summary...', bold=True)
167
167
 
168
168
  logger.info(
169
169
  json.dumps(response['summary'], indent=4)
170
170
  )
171
171
 
172
172
  raise click.ClickException(
173
- 'Vulnerabilities quantity offending security rules'
173
+ 'Vulnerabilities quantity offending security rules.'
174
174
  )
175
175
 
176
176
 
@@ -172,7 +172,7 @@ def run(context, flow_context, project_code, asset_id, company_id, end_commit, s
172
172
  merged_issues_sast = []
173
173
  merged_issues_sca = []
174
174
 
175
- log_func("Running auto close vulnerabilities ...")
175
+ log_func("Running automatic closure of vulnerabilities...")
176
176
 
177
177
  while True:
178
178
  issues_from_cp = conviso_api.issues.auto_close_vulnerabilities(
@@ -206,7 +206,7 @@ def run(context, flow_context, project_code, asset_id, company_id, end_commit, s
206
206
  sca_issues_without_fix_accepted = [item for item in merged_issues_sca if item['status'] != 'FIX_ACCEPTED']
207
207
 
208
208
  if len(issues_from_cp) == 0:
209
- log_func("No vulnerabilities was founded on conviso platform!")
209
+ log_func("No vulnerabilities were found on the Conviso Platform!")
210
210
  return
211
211
 
212
212
  # Starting executing the ast again
@@ -220,7 +220,7 @@ def run(context, flow_context, project_code, asset_id, company_id, end_commit, s
220
220
  # end ast execution
221
221
 
222
222
  if len(sast_hash_issues) == 0 and len(sca_hash_issues) == 0:
223
- log_func("No vulnerabilities was founded congrats !!!")
223
+ log_func("No vulnerabilities were found; congratulations!")
224
224
  return
225
225
 
226
226
  set_of_sast_hash_issues = set(sast_hash_issues)
@@ -262,7 +262,7 @@ def close_sast_issues(conviso_api, issues_from_cp, issues_from_current_scan):
262
262
  # issues_from_current_scan are issues identify on each time the ast command runs, these are always from a full code
263
263
  base scan
264
264
  """
265
- log_func("SAST: Verifying if any vulnerability was solved ...")
265
+ log_func("SAST: Verifying if any vulnerability was solved...")
266
266
 
267
267
  differences = [
268
268
  {'id': item['id'], 'originalIssueIdFromTool': item['originalIssueIdFromTool']}
@@ -270,10 +270,10 @@ def close_sast_issues(conviso_api, issues_from_cp, issues_from_current_scan):
270
270
  ]
271
271
 
272
272
  if len(differences) == 0:
273
- log_func("No vulnerabilities was fixed yet ...")
273
+ log_func("No vulnerabilities have been fixed yet...")
274
274
  return
275
275
 
276
- log_func("SAST: Fixing {issues} vulnerabilities on conviso platform ...".format(issues=len(differences)))
276
+ log_func("SAST: Fixing {issues} vulnerabilities on the Conviso Platform...".format(issues=len(differences)))
277
277
 
278
278
  for issue in differences:
279
279
  issue_id = issue['id']
@@ -287,17 +287,17 @@ def close_sast_issues(conviso_api, issues_from_cp, issues_from_current_scan):
287
287
  def close_sca_issues(conviso_api, issues_from_cp, issues_from_current_scan):
288
288
  """ method to close sca issues on conviso platform """
289
289
 
290
- log_func("SCA: Verifying if any vulnerability was solved ...")
290
+ log_func("SCA: Verifying if any vulnerability was solved...")
291
291
  differences = [
292
292
  {'id': item['id'], 'originalIssueIdFromTool': item['originalIssueIdFromTool']}
293
293
  for item in issues_from_cp if item['originalIssueIdFromTool'] not in issues_from_current_scan
294
294
  ]
295
295
 
296
296
  if len(differences) == 0:
297
- log_func("No vulnerabilities was fixed yet ...")
297
+ log_func("No vulnerabilities have been fixed yet...")
298
298
  return
299
299
 
300
- log_func("SCA: Fixing {issues} vulnerabilities on conviso platform ...".format(issues=len(differences)))
300
+ log_func("SCA: Fixing {issues} vulnerabilities on the Conviso Platform...".format(issues=len(differences)))
301
301
 
302
302
  for issue in differences:
303
303
  issue_id = issue['id']
@@ -0,0 +1 @@
1
+ __version__ = '2.2.5-dev.0'
@@ -1 +0,0 @@
1
- __version__ = '2.2.4'
File without changes
File without changes
File without changes