devsecops-engine-tools 1.40.0__py3-none-any.whl → 1.41.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of devsecops-engine-tools might be problematic. Click here for more details.
- devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/defect_dojo/defect_dojo.py +9 -5
- devsecops_engine_tools/engine_risk/src/domain/usecases/break_build.py +32 -14
- devsecops_engine_tools/engine_risk/src/domain/usecases/get_exclusions.py +36 -3
- devsecops_engine_tools/engine_risk/src/domain/usecases/handle_filters.py +3 -1
- devsecops_engine_tools/engine_risk/src/infrastructure/entry_points/entry_point_risk.py +12 -4
- devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/finding.py +1 -1
- devsecops_engine_tools/engine_utilities/defect_dojo/domain/request_objects/import_scan.py +3 -2
- devsecops_engine_tools/engine_utilities/defect_dojo/domain/serializers/import_scan.py +2 -2
- devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/import_scan.py +2 -2
- devsecops_engine_tools/version.py +1 -1
- {devsecops_engine_tools-1.40.0.dist-info → devsecops_engine_tools-1.41.0.dist-info}/METADATA +1 -1
- {devsecops_engine_tools-1.40.0.dist-info → devsecops_engine_tools-1.41.0.dist-info}/RECORD +15 -15
- {devsecops_engine_tools-1.40.0.dist-info → devsecops_engine_tools-1.41.0.dist-info}/WHEEL +0 -0
- {devsecops_engine_tools-1.40.0.dist-info → devsecops_engine_tools-1.41.0.dist-info}/entry_points.txt +0 -0
- {devsecops_engine_tools-1.40.0.dist-info → devsecops_engine_tools-1.41.0.dist-info}/top_level.txt +0 -0
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/defect_dojo/defect_dojo.py
CHANGED
|
@@ -1,4 +1,5 @@
|
|
|
1
1
|
from dataclasses import dataclass
|
|
2
|
+
import re
|
|
2
3
|
from devsecops_engine_tools.engine_core.src.domain.model.gateway.vulnerability_management_gateway import (
|
|
3
4
|
VulnerabilityManagementGateway,
|
|
4
5
|
)
|
|
@@ -91,10 +92,13 @@ class DefectDojoPlatform(VulnerabilityManagementGateway):
|
|
|
91
92
|
"VULNERABILITY_MANAGER"
|
|
92
93
|
]["BRANCH_FILTER"]
|
|
93
94
|
) or (vulnerability_management.dict_args["module"] == "engine_secret"):
|
|
94
|
-
tags = vulnerability_management.dict_args["module"]
|
|
95
|
+
tags = [vulnerability_management.dict_args["module"]]
|
|
95
96
|
if vulnerability_management.dict_args["module"] == "engine_iac":
|
|
96
|
-
tags = f"{vulnerability_management.dict_args['module']}_{'_'.join(vulnerability_management.dict_args['platform'])}"
|
|
97
|
-
|
|
97
|
+
tags = [f"{vulnerability_management.dict_args['module']}_{'_'.join(vulnerability_management.dict_args['platform'])}"]
|
|
98
|
+
if vulnerability_management.dict_args["module"] == "engine_container" and sum(1 for line in open("scanned_images.txt", 'r', encoding='utf-8') if line.strip()) > 1:
|
|
99
|
+
match = re.search(r"(?<=:)([^-]+)", vulnerability_management.dict_args['image_to_scan'])
|
|
100
|
+
tags.append(match.group(1) if match else None)
|
|
101
|
+
|
|
98
102
|
use_cmdb = vulnerability_management.config_tool[
|
|
99
103
|
"VULNERABILITY_MANAGER"
|
|
100
104
|
]["DEFECT_DOJO"]["CMDB"]["USE_CMDB"]
|
|
@@ -451,7 +455,7 @@ class DefectDojoPlatform(VulnerabilityManagementGateway):
|
|
|
451
455
|
"branch_tag": vulnerability_management.branch_tag,
|
|
452
456
|
"commit_hash": vulnerability_management.commit_hash,
|
|
453
457
|
"service": vulnerability_management.input_core.scope_pipeline,
|
|
454
|
-
"test_title": tags,
|
|
458
|
+
"test_title": '_'.join(tags),
|
|
455
459
|
"environment": (
|
|
456
460
|
enviroment_mapping[vulnerability_management.environment.lower()]
|
|
457
461
|
if vulnerability_management.environment is not None
|
|
@@ -785,4 +789,4 @@ class DefectDojoPlatform(VulnerabilityManagementGateway):
|
|
|
785
789
|
return self._get_where(finding, tag)
|
|
786
790
|
return finding.file_path
|
|
787
791
|
else:
|
|
788
|
-
return finding.file_path
|
|
792
|
+
return finding.file_path
|
|
@@ -26,6 +26,7 @@ class BreakBuild:
|
|
|
26
26
|
report_list: "list[Report]",
|
|
27
27
|
all_report: "list[Report]",
|
|
28
28
|
threshold: any,
|
|
29
|
+
policy_excluded: int,
|
|
29
30
|
):
|
|
30
31
|
self.devops_platform_gateway = devops_platform_gateway
|
|
31
32
|
self.printer_table_gateway = printer_table_gateway
|
|
@@ -35,6 +36,7 @@ class BreakBuild:
|
|
|
35
36
|
self.report_list = report_list
|
|
36
37
|
self.all_report = all_report
|
|
37
38
|
self.threshold = threshold
|
|
39
|
+
self.policy_excluded = policy_excluded
|
|
38
40
|
self.break_build = False
|
|
39
41
|
self.warning_build = False
|
|
40
42
|
self.report_breaker = []
|
|
@@ -50,11 +52,9 @@ class BreakBuild:
|
|
|
50
52
|
}
|
|
51
53
|
|
|
52
54
|
def process(self):
|
|
53
|
-
self._remediation_rate_control(self.all_report)
|
|
54
55
|
new_report_list, applied_exclusions = self._apply_exclusions(self.report_list)
|
|
55
|
-
if self.break_build:
|
|
56
|
-
self.report_breaker.extend(copy.deepcopy(new_report_list))
|
|
57
56
|
self._tag_blacklist_control(new_report_list)
|
|
57
|
+
self._remediation_rate_control(self.all_report, new_report_list)
|
|
58
58
|
self._risk_score_control(new_report_list)
|
|
59
59
|
all_exclusions = list(self.vm_exclusions) + list(applied_exclusions)
|
|
60
60
|
self._print_exclusions(self._map_applied_exclusion(all_exclusions))
|
|
@@ -118,10 +118,19 @@ class BreakBuild:
|
|
|
118
118
|
else:
|
|
119
119
|
print(self.devops_platform_gateway.result_pipeline("succeeded"))
|
|
120
120
|
|
|
121
|
-
def _remediation_rate_control(
|
|
121
|
+
def _remediation_rate_control(
|
|
122
|
+
self, all_report: "list[Report]", new_report_list: "list[Report]"
|
|
123
|
+
):
|
|
122
124
|
mitigated = sum(1 for report in all_report if report.mitigated)
|
|
123
|
-
|
|
124
|
-
|
|
125
|
+
white_list = sum(
|
|
126
|
+
1
|
|
127
|
+
for report in all_report
|
|
128
|
+
if "white_list" in report.tags and not report.mitigated
|
|
129
|
+
)
|
|
130
|
+
total = len(all_report) - self.policy_excluded - white_list
|
|
131
|
+
print(
|
|
132
|
+
f"Mitigated count: {mitigated} Total count: {len(all_report)} Policy excluded: {self.policy_excluded + white_list}"
|
|
133
|
+
)
|
|
125
134
|
remediation_rate_value = self._get_percentage(mitigated / total)
|
|
126
135
|
|
|
127
136
|
risk_threshold = self._get_remediation_rate_threshold(total)
|
|
@@ -150,10 +159,18 @@ class BreakBuild:
|
|
|
150
159
|
)
|
|
151
160
|
)
|
|
152
161
|
self.break_build = True
|
|
162
|
+
[
|
|
163
|
+
setattr(report, "reason", "Remediation Rate")
|
|
164
|
+
for report in new_report_list
|
|
165
|
+
]
|
|
166
|
+
self.report_breaker.extend(copy.deepcopy(new_report_list))
|
|
153
167
|
|
|
154
168
|
def _get_remediation_rate_threshold(self, total):
|
|
155
169
|
remediation_rate = self.threshold["REMEDIATION_RATE"]
|
|
156
|
-
for key in sorted(
|
|
170
|
+
for key in sorted(
|
|
171
|
+
remediation_rate.keys(),
|
|
172
|
+
key=lambda x: int(x) if x.isdigit() else float("inf"),
|
|
173
|
+
):
|
|
157
174
|
if key.isdigit() and total <= int(key):
|
|
158
175
|
return remediation_rate[key]
|
|
159
176
|
return remediation_rate["other"]
|
|
@@ -209,7 +226,6 @@ class BreakBuild:
|
|
|
209
226
|
applied_exclusions.append(exclusion_copy)
|
|
210
227
|
break
|
|
211
228
|
if not exclude:
|
|
212
|
-
report.reason = "Remediation Rate"
|
|
213
229
|
filtered_reports.append(report)
|
|
214
230
|
|
|
215
231
|
return filtered_reports, applied_exclusions
|
|
@@ -217,21 +233,22 @@ class BreakBuild:
|
|
|
217
233
|
def _tag_blacklist_control(self, report_list: "list[Report]"):
|
|
218
234
|
remote_config = self.remote_config
|
|
219
235
|
if report_list:
|
|
220
|
-
tag_blacklist = set(remote_config["
|
|
221
|
-
tag_age_threshold = self.threshold["TAG_MAX_AGE"]
|
|
236
|
+
tag_blacklist = set(remote_config["TAG_BLACKLIST_EXCLUSION_DAYS"].keys())
|
|
222
237
|
|
|
223
238
|
filtered_reports_above_threshold = [
|
|
224
239
|
(report, tag)
|
|
225
240
|
for report in report_list
|
|
226
241
|
for tag in report.tags
|
|
227
|
-
if tag in tag_blacklist
|
|
242
|
+
if tag in tag_blacklist
|
|
243
|
+
and report.age >= remote_config["TAG_BLACKLIST_EXCLUSION_DAYS"][tag]
|
|
228
244
|
]
|
|
229
245
|
|
|
230
246
|
filtered_reports_below_threshold = [
|
|
231
247
|
(report, tag)
|
|
232
248
|
for report in report_list
|
|
233
249
|
for tag in report.tags
|
|
234
|
-
if tag in tag_blacklist
|
|
250
|
+
if tag in tag_blacklist
|
|
251
|
+
and report.age < remote_config["TAG_BLACKLIST_EXCLUSION_DAYS"][tag]
|
|
235
252
|
]
|
|
236
253
|
|
|
237
254
|
for report, tag in filtered_reports_above_threshold:
|
|
@@ -239,7 +256,7 @@ class BreakBuild:
|
|
|
239
256
|
print(
|
|
240
257
|
self.devops_platform_gateway.message(
|
|
241
258
|
"error",
|
|
242
|
-
f"Report {report.vm_id} with tag {tag} is blacklisted and age {report.age} is above threshold {
|
|
259
|
+
f"Report {report.vm_id} with tag '{tag}' is blacklisted and age {report.age} is above threshold {remote_config['TAG_BLACKLIST_EXCLUSION_DAYS'][tag]}",
|
|
243
260
|
)
|
|
244
261
|
)
|
|
245
262
|
|
|
@@ -247,9 +264,10 @@ class BreakBuild:
|
|
|
247
264
|
print(
|
|
248
265
|
self.devops_platform_gateway.message(
|
|
249
266
|
"warning",
|
|
250
|
-
f"Report {report.vm_id} with tag {tag} is blacklisted but age {report.age} is below threshold {
|
|
267
|
+
f"Report {report.vm_id} with tag '{tag}' is blacklisted but age {report.age} is below threshold {remote_config['TAG_BLACKLIST_EXCLUSION_DAYS'][tag]}",
|
|
251
268
|
)
|
|
252
269
|
)
|
|
270
|
+
self.policy_excluded += 1
|
|
253
271
|
|
|
254
272
|
if filtered_reports_above_threshold:
|
|
255
273
|
self.break_build = True
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
from devsecops_engine_tools.engine_core.src.domain.model.exclusions import (
|
|
2
2
|
Exclusions,
|
|
3
3
|
)
|
|
4
|
+
from datetime import datetime, timedelta
|
|
4
5
|
|
|
5
6
|
|
|
6
7
|
class GetExclusions:
|
|
@@ -12,6 +13,7 @@ class GetExclusions:
|
|
|
12
13
|
risk_config,
|
|
13
14
|
risk_exclusions,
|
|
14
15
|
services,
|
|
16
|
+
active_findings,
|
|
15
17
|
):
|
|
16
18
|
self.devops_platform_gateway = devops_platform_gateway
|
|
17
19
|
self.dict_args = dict_args
|
|
@@ -19,10 +21,13 @@ class GetExclusions:
|
|
|
19
21
|
self.risk_config = risk_config
|
|
20
22
|
self.risk_exclusions = risk_exclusions
|
|
21
23
|
self.services = services
|
|
24
|
+
self.active_findings = active_findings
|
|
22
25
|
|
|
23
26
|
def process(self):
|
|
24
27
|
core_config = self.devops_platform_gateway.get_remote_config(
|
|
25
|
-
self.dict_args["remote_config_repo"],
|
|
28
|
+
self.dict_args["remote_config_repo"],
|
|
29
|
+
"engine_core/ConfigTool.json",
|
|
30
|
+
self.dict_args["remote_config_branch"],
|
|
26
31
|
)
|
|
27
32
|
unique_tags = self._get_unique_tags()
|
|
28
33
|
exclusions = []
|
|
@@ -35,14 +40,19 @@ class GetExclusions:
|
|
|
35
40
|
)
|
|
36
41
|
)
|
|
37
42
|
|
|
38
|
-
|
|
43
|
+
new_vuln_exclusions, len_new_vuln_exclusions = self._get_exclusions_new_vuln()
|
|
44
|
+
exclusions.extend(new_vuln_exclusions)
|
|
45
|
+
|
|
46
|
+
return exclusions, len_new_vuln_exclusions
|
|
39
47
|
|
|
40
48
|
def _get_risk_exclusions(self):
|
|
41
49
|
return self._get_exclusions(self.risk_exclusions, "RISK")
|
|
42
50
|
|
|
43
51
|
def _get_exclusions_by_practice(self, core_config, practice, path):
|
|
44
52
|
exclusions_config = self.devops_platform_gateway.get_remote_config(
|
|
45
|
-
self.dict_args["remote_config_repo"],
|
|
53
|
+
self.dict_args["remote_config_repo"],
|
|
54
|
+
path,
|
|
55
|
+
self.dict_args["remote_config_branch"],
|
|
46
56
|
)
|
|
47
57
|
tool = core_config[practice.upper()]["TOOL"]
|
|
48
58
|
return self._get_exclusions(exclusions_config, tool)
|
|
@@ -69,3 +79,26 @@ class GetExclusions:
|
|
|
69
79
|
tags = finding.tags
|
|
70
80
|
unique_tags.update(tags)
|
|
71
81
|
return list(unique_tags)
|
|
82
|
+
|
|
83
|
+
def _get_exclusions_new_vuln(self):
|
|
84
|
+
cutoff_date = datetime.now() - timedelta(days=5)
|
|
85
|
+
exclusions = []
|
|
86
|
+
for finding in self.active_findings:
|
|
87
|
+
if finding.publish_date:
|
|
88
|
+
try:
|
|
89
|
+
finding_publish_date = datetime.strptime(
|
|
90
|
+
finding.publish_date, "%Y-%m-%d"
|
|
91
|
+
)
|
|
92
|
+
except ValueError:
|
|
93
|
+
continue
|
|
94
|
+
if finding_publish_date >= cutoff_date and hasattr(finding, "id"):
|
|
95
|
+
exclusion_data = finding.__dict__.copy()
|
|
96
|
+
exclusion_data["create_date"] = finding_publish_date.strftime(
|
|
97
|
+
"%d%m%Y"
|
|
98
|
+
)
|
|
99
|
+
exclusion_data["expired_date"] = (
|
|
100
|
+
finding_publish_date + timedelta(days=5)
|
|
101
|
+
).strftime("%d%m%Y")
|
|
102
|
+
exclusion_data["reason"] = "New vulnerability in the industry"
|
|
103
|
+
exclusions.append(Exclusions(**exclusion_data))
|
|
104
|
+
return exclusions, len(exclusions)
|
|
@@ -49,11 +49,13 @@ class HandleFilters:
|
|
|
49
49
|
def filter_tags_days(self, devops_platform_gateway, remote_config, findings):
|
|
50
50
|
tag_exclusion_days = remote_config["TAG_EXCLUSION_DAYS"]
|
|
51
51
|
filtered_findings = []
|
|
52
|
+
filtered = 0
|
|
52
53
|
|
|
53
54
|
for finding in findings:
|
|
54
55
|
exclude = False
|
|
55
56
|
for tag in finding.tags:
|
|
56
57
|
if tag in tag_exclusion_days and finding.age < tag_exclusion_days[tag]:
|
|
58
|
+
filtered += 1
|
|
57
59
|
exclude = True
|
|
58
60
|
print(
|
|
59
61
|
devops_platform_gateway.message(
|
|
@@ -65,7 +67,7 @@ class HandleFilters:
|
|
|
65
67
|
if not exclude:
|
|
66
68
|
filtered_findings.append(finding)
|
|
67
69
|
|
|
68
|
-
return filtered_findings
|
|
70
|
+
return filtered_findings, filtered
|
|
69
71
|
|
|
70
72
|
def _get_active_findings(self, findings):
|
|
71
73
|
return list(
|
|
@@ -31,10 +31,14 @@ def init_engine_risk(
|
|
|
31
31
|
vm_exclusions,
|
|
32
32
|
):
|
|
33
33
|
remote_config = devops_platform_gateway.get_remote_config(
|
|
34
|
-
dict_args["remote_config_repo"],
|
|
34
|
+
dict_args["remote_config_repo"],
|
|
35
|
+
"engine_risk/ConfigTool.json",
|
|
36
|
+
dict_args["remote_config_branch"],
|
|
35
37
|
)
|
|
36
38
|
risk_exclusions = devops_platform_gateway.get_remote_config(
|
|
37
|
-
dict_args["remote_config_repo"],
|
|
39
|
+
dict_args["remote_config_repo"],
|
|
40
|
+
"engine_risk/Exclusions.json",
|
|
41
|
+
dict_args["remote_config_branch"],
|
|
38
42
|
)
|
|
39
43
|
pipeline_name = devops_platform_gateway.get_variable("pipeline_name")
|
|
40
44
|
|
|
@@ -49,7 +53,7 @@ def init_engine_risk(
|
|
|
49
53
|
|
|
50
54
|
unique_findings = handle_filters.filter_duplicated(active_findings)
|
|
51
55
|
|
|
52
|
-
filtered_findings = handle_filters.filter_tags_days(
|
|
56
|
+
filtered_findings, len_tag_filtered = handle_filters.filter_tags_days(
|
|
53
57
|
devops_platform_gateway, remote_config, unique_findings
|
|
54
58
|
)
|
|
55
59
|
|
|
@@ -62,8 +66,11 @@ def init_engine_risk(
|
|
|
62
66
|
remote_config,
|
|
63
67
|
risk_exclusions,
|
|
64
68
|
services,
|
|
69
|
+
active_findings,
|
|
65
70
|
)
|
|
66
|
-
exclusions = get_exclusions.process()
|
|
71
|
+
exclusions, len_new_vuln = get_exclusions.process()
|
|
72
|
+
|
|
73
|
+
policy_excluded = len_tag_filtered + len_new_vuln
|
|
67
74
|
|
|
68
75
|
threshold = CheckThreshold(
|
|
69
76
|
pipeline_name, remote_config["THRESHOLD"], risk_exclusions
|
|
@@ -78,6 +85,7 @@ def init_engine_risk(
|
|
|
78
85
|
data_added,
|
|
79
86
|
findings,
|
|
80
87
|
threshold,
|
|
88
|
+
policy_excluded,
|
|
81
89
|
)
|
|
82
90
|
|
|
83
91
|
return break_build.process()
|
|
@@ -77,7 +77,7 @@ class Finding(FromDictMixin):
|
|
|
77
77
|
sast_source_line = None
|
|
78
78
|
sast_source_file_path = None
|
|
79
79
|
nb_occurences = None
|
|
80
|
-
publish_date =
|
|
80
|
+
publish_date: str = ""
|
|
81
81
|
planned_remediation_date = None
|
|
82
82
|
planned_remediation_version = None
|
|
83
83
|
effort_for_fixing = None
|
|
@@ -1,4 +1,5 @@
|
|
|
1
1
|
import dataclasses
|
|
2
|
+
from typing import List
|
|
2
3
|
|
|
3
4
|
|
|
4
5
|
@dataclasses.dataclass
|
|
@@ -20,7 +21,7 @@ class ImportScanRequest:
|
|
|
20
21
|
auto_create_context: str = ""
|
|
21
22
|
deduplication_on_engagement: str = ""
|
|
22
23
|
lead: str = ""
|
|
23
|
-
tags: str =
|
|
24
|
+
tags: List[str] = dataclasses.field(default_factory=list)
|
|
24
25
|
close_old_findings: str = ""
|
|
25
26
|
close_old_findings_product_scope: str = ""
|
|
26
27
|
push_to_jira: str = ""
|
|
@@ -124,4 +125,4 @@ class ImportScanRequest:
|
|
|
124
125
|
"api_scan_configuration": self.api_scan_configuration,
|
|
125
126
|
"build_id": self.build_id,
|
|
126
127
|
}
|
|
127
|
-
return r
|
|
128
|
+
return r
|
|
@@ -183,7 +183,7 @@ class ImportScanSerializer(Schema):
|
|
|
183
183
|
auto_create_context = fields.Str(required=False, load_default="true")
|
|
184
184
|
deduplication_on_engagement = fields.Str(required=False)
|
|
185
185
|
lead = fields.Str(required=False)
|
|
186
|
-
tags = fields.
|
|
186
|
+
tags = fields.List(fields.String(), required=True)
|
|
187
187
|
close_old_findings = fields.Str(required=False, load_default=True)
|
|
188
188
|
close_old_findings_product_scope = fields.Str(required=False)
|
|
189
189
|
push_to_jira = fields.Str(required=False)
|
|
@@ -224,4 +224,4 @@ class ImportScanSerializer(Schema):
|
|
|
224
224
|
|
|
225
225
|
@post_load
|
|
226
226
|
def make_cmdb(self, data, **kwargs):
|
|
227
|
-
return ImportScanRequest(**data)
|
|
227
|
+
return ImportScanRequest(**data)
|
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/import_scan.py
CHANGED
|
@@ -34,7 +34,7 @@ class ImportScanRestConsumer:
|
|
|
34
34
|
"auto_create_context": "false",
|
|
35
35
|
"deduplication_on_engagement": request.deduplication_on_engagement,
|
|
36
36
|
"lead": request.lead,
|
|
37
|
-
"tags": request.tags,
|
|
37
|
+
"tags": ",".join(request.tags) if request.tags else "",
|
|
38
38
|
"close_old_findings": str(request.close_old_findings),
|
|
39
39
|
"close_old_findings_product_scope": str(request.close_old_findings_product_scope),
|
|
40
40
|
"push_to_jira": str(request.push_to_jira),
|
|
@@ -112,4 +112,4 @@ class ImportScanRestConsumer:
|
|
|
112
112
|
except Exception as e:
|
|
113
113
|
logger.error(f"from dict import Scan: {response.json()}")
|
|
114
114
|
raise ApiError(e)
|
|
115
|
-
return response
|
|
115
|
+
return response
|
|
@@ -1 +1 @@
|
|
|
1
|
-
version = '1.
|
|
1
|
+
version = '1.41.0'
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
devsecops_engine_tools/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
2
|
-
devsecops_engine_tools/version.py,sha256
|
|
2
|
+
devsecops_engine_tools/version.py,sha256=-B41LzxW9MaDd_gk-GaUDRhpW1fsMeynOvaN5fZXPV4,19
|
|
3
3
|
devsecops_engine_tools/engine_core/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
4
4
|
devsecops_engine_tools/engine_core/src/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
5
5
|
devsecops_engine_tools/engine_core/src/applications/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
@@ -38,7 +38,7 @@ devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/aws/secret
|
|
|
38
38
|
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/azure/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
39
39
|
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/azure/azure_devops.py,sha256=lNjYo83p3lovwfW4BeBtHQZckZl9m-9jlcIB-DesqhY,5316
|
|
40
40
|
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/defect_dojo/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
41
|
-
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/defect_dojo/defect_dojo.py,sha256=
|
|
41
|
+
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/defect_dojo/defect_dojo.py,sha256=ptzqoY7BkNO4jlna7Uw30mreKZfspwBRqEZMAbhRka4,29969
|
|
42
42
|
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/github/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
43
43
|
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/github/github_actions.py,sha256=cn9VGDaD9gUnJrLn9vEkQvfqYHIJftGE9ZACHEUOUxo,4132
|
|
44
44
|
devsecops_engine_tools/engine_core/src/infrastructure/driven_adapters/printer_pretty_table/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
@@ -101,16 +101,16 @@ devsecops_engine_tools/engine_risk/src/domain/model/gateways/__init__.py,sha256=
|
|
|
101
101
|
devsecops_engine_tools/engine_risk/src/domain/model/gateways/add_epss_gateway.py,sha256=cTm4QSxiaUt7ETCdXWZxKEus8pmEDA3e9k5b39SLDDE,178
|
|
102
102
|
devsecops_engine_tools/engine_risk/src/domain/usecases/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
103
103
|
devsecops_engine_tools/engine_risk/src/domain/usecases/add_data.py,sha256=4wqDj-q7hJfJscvrbMDcy7tONqxdxl-CSl_TWTRUGKA,402
|
|
104
|
-
devsecops_engine_tools/engine_risk/src/domain/usecases/break_build.py,sha256=
|
|
104
|
+
devsecops_engine_tools/engine_risk/src/domain/usecases/break_build.py,sha256=k24X9gipSiFQNp4V8guW4hCWUtCzxyKq-eo2FwGW2b8,13216
|
|
105
105
|
devsecops_engine_tools/engine_risk/src/domain/usecases/check_threshold.py,sha256=VYdmcbAuNNvdHCegRfvza7YJ8FHbFNyDosrKJrMW93I,765
|
|
106
|
-
devsecops_engine_tools/engine_risk/src/domain/usecases/get_exclusions.py,sha256=
|
|
107
|
-
devsecops_engine_tools/engine_risk/src/domain/usecases/handle_filters.py,sha256=
|
|
106
|
+
devsecops_engine_tools/engine_risk/src/domain/usecases/get_exclusions.py,sha256=O6LoALXzQq0kB4TUuDdF1g5JUO0vtCeXF8txEkHYb6I,3850
|
|
107
|
+
devsecops_engine_tools/engine_risk/src/domain/usecases/handle_filters.py,sha256=R53fnuIQYfr7YbpMz1BGPJ1d5z9jY_Hnm7EmPt99wlE,3608
|
|
108
108
|
devsecops_engine_tools/engine_risk/src/infrastructure/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
109
109
|
devsecops_engine_tools/engine_risk/src/infrastructure/driven_adapters/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
110
110
|
devsecops_engine_tools/engine_risk/src/infrastructure/driven_adapters/first_csv/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
111
111
|
devsecops_engine_tools/engine_risk/src/infrastructure/driven_adapters/first_csv/first_epss_csv.py,sha256=pWaRmIwVyiB5mlmWySHIx-DUgN9vtKQc-MqyRNVlTJo,2150
|
|
112
112
|
devsecops_engine_tools/engine_risk/src/infrastructure/entry_points/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
113
|
-
devsecops_engine_tools/engine_risk/src/infrastructure/entry_points/entry_point_risk.py,sha256=
|
|
113
|
+
devsecops_engine_tools/engine_risk/src/infrastructure/entry_points/entry_point_risk.py,sha256=3SIhdvy0_fEuN-w2_KNvwklo5mL3rCr5Zb2SV6HY77k,2630
|
|
114
114
|
devsecops_engine_tools/engine_risk/src/infrastructure/helpers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
115
115
|
devsecops_engine_tools/engine_sast/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
116
116
|
devsecops_engine_tools/engine_sast/engine_code/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
@@ -267,7 +267,7 @@ devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/__init__.py,sh
|
|
|
267
267
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/cmdb.py,sha256=7EAzKzBJaDqP4Q57cyu_nCpl9WqcTZFjXydkYCh8h-k,320
|
|
268
268
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/component.py,sha256=KYyWMUQcPsraqRaw0KY9eBaZPfajfBiskgOuwTI8mnA,483
|
|
269
269
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/engagement.py,sha256=MXb7c526tz0zSDS8xGPC5IjTMF9g9qtzcEKLyfcY89c,1393
|
|
270
|
-
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/finding.py,sha256=
|
|
270
|
+
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/finding.py,sha256=fOlKeGPf9gMjz6RyRVWRyEZWxwm7XFE6eEQ5bIBmTBs,3204
|
|
271
271
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/finding_exclusion.py,sha256=mz6RDW3Xk3VHNQcUHm9cCMAyX6Ultcb-IZy9N59qPI4,530
|
|
272
272
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/product.py,sha256=KL5ue6icA8HH1xKkmAJzElAat3OOYU3_lt3xuNfo7Mc,1272
|
|
273
273
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/product_list.py,sha256=yFo8eYOGJiJMkU5pGpW0r1o5uVaNP5iA80-5w_MyWxU,664
|
|
@@ -276,10 +276,10 @@ devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/product_type_l
|
|
|
276
276
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/models/scan_configuration.py,sha256=-uVxaTkxnDmUUGQUdN9x_VKR8KJUagJKnGR6B1emoEU,577
|
|
277
277
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/request_objects/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
278
278
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/request_objects/finding.py,sha256=RinG3ISc-u_3VXVqntwdcQvZoQdmHPCvDHWSvnkCkcU,2619
|
|
279
|
-
devsecops_engine_tools/engine_utilities/defect_dojo/domain/request_objects/import_scan.py,sha256=
|
|
279
|
+
devsecops_engine_tools/engine_utilities/defect_dojo/domain/request_objects/import_scan.py,sha256=ACb9BH1HXIfdGhIte5__OshvsqPOHgWZ0syxwG5IP58,5151
|
|
280
280
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/serializers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
281
281
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/serializers/finding.py,sha256=4IQLjqgyImVdn8AxoU3UKgXnvU-F-x7Tm2bJdp6nHm4,5265
|
|
282
|
-
devsecops_engine_tools/engine_utilities/defect_dojo/domain/serializers/import_scan.py,sha256=
|
|
282
|
+
devsecops_engine_tools/engine_utilities/defect_dojo/domain/serializers/import_scan.py,sha256=pq1H0m9k056AMdUpC3ci2-x56pz8UlLGqmG0_PqfUPM,7391
|
|
283
283
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/user_case/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
284
284
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/user_case/cmdb.py,sha256=BUOdvP39bEMQ6Unr2hB28eljVGU2Uv8dDEkzRyEJgyQ,2650
|
|
285
285
|
devsecops_engine_tools/engine_utilities/defect_dojo/domain/user_case/component.py,sha256=_icc-ZAqw-aVgE5J4VH8Q7fSqpCgEGcfmurgRIN9NqM,448
|
|
@@ -295,7 +295,7 @@ devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapt
|
|
|
295
295
|
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/engagement.py,sha256=39qqmTxECRY5IoFvK_B_R0vfwfJwLbdhGt_pcdvdVIE,3571
|
|
296
296
|
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/finding.py,sha256=k-z2tg_NPKMni7rZgXMZa2-t8_8F35r8YtF1EcjMyDs,2355
|
|
297
297
|
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/finding_exclusion.py,sha256=BL4xf1FE5tMsBri0LetxBRUgOgLogdoHX97rQkHh10g,1524
|
|
298
|
-
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/import_scan.py,sha256=
|
|
298
|
+
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/import_scan.py,sha256=SwkW-2Znzs_RiCPPsIgZKSG_VSO2afoQH5DTTg-dKPQ,5929
|
|
299
299
|
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/product.py,sha256=DhiLPv8KyRhHBRhvF0ULhchhGAT8SQyn1ftiuou_aKw,2576
|
|
300
300
|
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/product_type.py,sha256=x-Gh2BEP6IZccS2m_DLB8xI6aEkS19J0ZUpP2mjY88o,3078
|
|
301
301
|
devsecops_engine_tools/engine_utilities/defect_dojo/infraestructure/driver_adapters/reimport_scan.py,sha256=6Wtg88p9WFdWjEAfNT2qjUcRGRg6wmruvuKcmajG3A8,3469
|
|
@@ -348,8 +348,8 @@ devsecops_engine_tools/engine_utilities/utils/name_conversion.py,sha256=ADJrRGax
|
|
|
348
348
|
devsecops_engine_tools/engine_utilities/utils/printers.py,sha256=amYAr9YQfYgR6jK9a2l26z3oovFPQ3FAKmhq6BKhEBA,623
|
|
349
349
|
devsecops_engine_tools/engine_utilities/utils/session_manager.py,sha256=Z0fdhB3r-dxU0nGSD9zW_B4r2Qol1rUnUCkhFR0U-HQ,487
|
|
350
350
|
devsecops_engine_tools/engine_utilities/utils/utils.py,sha256=XFap4yOK7ItLWsqbwDhvLd7NpDhs7i-UGJAMD6jjd7w,6687
|
|
351
|
-
devsecops_engine_tools-1.
|
|
352
|
-
devsecops_engine_tools-1.
|
|
353
|
-
devsecops_engine_tools-1.
|
|
354
|
-
devsecops_engine_tools-1.
|
|
355
|
-
devsecops_engine_tools-1.
|
|
351
|
+
devsecops_engine_tools-1.41.0.dist-info/METADATA,sha256=aYG37gdm8hbtdPKsGJpfQqcjO2rOldAfqfWhANIh5ps,11750
|
|
352
|
+
devsecops_engine_tools-1.41.0.dist-info/WHEEL,sha256=R0nc6qTxuoLk7ShA2_Y-UWkN8ZdfDBG2B6Eqpz2WXbs,91
|
|
353
|
+
devsecops_engine_tools-1.41.0.dist-info/entry_points.txt,sha256=MHCTFFs9bdNKo6YcWCcBW2_8X6yTisgLOlmVx-V8Rxc,276
|
|
354
|
+
devsecops_engine_tools-1.41.0.dist-info/top_level.txt,sha256=ge6y0X_xBAU1aG3EMWFtl9djbVyg5BxuSp2r2Lg6EQU,23
|
|
355
|
+
devsecops_engine_tools-1.41.0.dist-info/RECORD,,
|
|
File without changes
|
{devsecops_engine_tools-1.40.0.dist-info → devsecops_engine_tools-1.41.0.dist-info}/entry_points.txt
RENAMED
|
File without changes
|
{devsecops_engine_tools-1.40.0.dist-info → devsecops_engine_tools-1.41.0.dist-info}/top_level.txt
RENAMED
|
File without changes
|