-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #69 from GitGuardian/xblanchot/SCA-917/add_sca_models
feat(sca): move SCA models from ggshield to pygitguardian
- Loading branch information
Showing
10 changed files
with
855 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,127 @@ | ||
from dataclasses import dataclass, field | ||
from datetime import datetime | ||
from typing import List, Optional, cast | ||
|
||
import marshmallow_dataclass | ||
from typing_extensions import Literal | ||
|
||
from pygitguardian.models import Base, BaseSchema, FromDictMixin | ||
|
||
|
||
@dataclass | ||
class SCAIgnoredVulnerability(Base, FromDictMixin): | ||
""" | ||
A model of an ignored vulnerability for SCA. This allows to ignore all occurrences | ||
of a given vulnerability in a given dependency file. | ||
- identifier: identifier (currently: GHSA id) of the vulnerability to ignore | ||
- path: the path to the file in which ignore the vulnerability | ||
""" | ||
|
||
identifier: str | ||
path: str | ||
|
||
|
||
SCAIgnoredVulnerability.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema( | ||
SCAIgnoredVulnerability, base_schema=BaseSchema | ||
)(), | ||
) | ||
|
||
|
||
@dataclass | ||
class SCAScanParameters(Base, FromDictMixin): | ||
minimum_severity: Optional[str] = None | ||
ignored_vulnerabilities: List[SCAIgnoredVulnerability] = field(default_factory=list) | ||
|
||
|
||
SCAScanParameters.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema(SCAScanParameters, base_schema=BaseSchema)(), | ||
) | ||
|
||
|
||
@dataclass | ||
class ComputeSCAFilesResult(Base, FromDictMixin): | ||
sca_files: List[str] | ||
potential_siblings: List[str] | ||
|
||
|
||
ComputeSCAFilesResult.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema(ComputeSCAFilesResult, base_schema=BaseSchema)(), | ||
) | ||
|
||
|
||
@dataclass | ||
class SCAVulnerability(Base, FromDictMixin): | ||
severity: str | ||
summary: str | ||
identifier: str | ||
cve_ids: List[str] = field(default_factory=list) | ||
created_at: Optional[datetime] = None | ||
fixed_version: Optional[str] = None | ||
|
||
|
||
SCAVulnerability.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema(SCAVulnerability, base_schema=BaseSchema)(), | ||
) | ||
|
||
SCADependencyType = Literal["direct", "transitive"] | ||
|
||
|
||
@dataclass | ||
class SCAVulnerablePackageVersion(Base, FromDictMixin): | ||
package_full_name: str | ||
version: str | ||
ecosystem: str | ||
dependency_type: Optional[SCADependencyType] = None | ||
vulns: List[SCAVulnerability] = field(default_factory=list) | ||
|
||
|
||
SCAVulnerablePackageVersion.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema( | ||
SCAVulnerablePackageVersion, base_schema=BaseSchema | ||
)(), | ||
) | ||
|
||
|
||
@dataclass | ||
class SCALocationVulnerability(Base, FromDictMixin): | ||
location: str | ||
package_vulns: List[SCAVulnerablePackageVersion] = field(default_factory=list) | ||
|
||
|
||
SCALocationVulnerability.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema( | ||
SCALocationVulnerability, base_schema=BaseSchema | ||
)(), | ||
) | ||
|
||
|
||
@dataclass | ||
class SCAScanAllOutput(Base, FromDictMixin): | ||
scanned_files: List[str] = field(default_factory=list) | ||
found_package_vulns: List[SCALocationVulnerability] = field(default_factory=list) | ||
|
||
|
||
SCAScanAllOutput.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema(SCAScanAllOutput, base_schema=BaseSchema)(), | ||
) | ||
|
||
|
||
@dataclass | ||
class SCAScanDiffOutput(Base, FromDictMixin): | ||
scanned_files: List[str] = field(default_factory=list) | ||
added_vulns: List[SCALocationVulnerability] = field(default_factory=list) | ||
removed_vulns: List[SCALocationVulnerability] = field(default_factory=list) | ||
|
||
|
||
SCAScanDiffOutput.SCHEMA = cast( | ||
BaseSchema, | ||
marshmallow_dataclass.class_schema(SCAScanDiffOutput, base_schema=BaseSchema)(), | ||
) |
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,62 @@ | ||
interactions: | ||
- request: | ||
body: '{"files": ["Pipfile", "something_else"]}' | ||
headers: | ||
Accept: | ||
- '*/*' | ||
Accept-Encoding: | ||
- gzip, deflate | ||
Connection: | ||
- keep-alive | ||
Content-Length: | ||
- '40' | ||
Content-Type: | ||
- application/json | ||
User-Agent: | ||
- pygitguardian/1.9.0 (Linux;py3.10.12) | ||
method: POST | ||
uri: https://api.gitguardian.com/v1/sca/compute_sca_files/ | ||
response: | ||
body: | ||
string: '{"sca_files":["Pipfile"],"potential_siblings":["Pipfile.lock"]}' | ||
headers: | ||
access-control-expose-headers: | ||
- X-App-Version | ||
allow: | ||
- POST, OPTIONS | ||
content-length: | ||
- '63' | ||
content-type: | ||
- application/json | ||
cross-origin-opener-policy: | ||
- same-origin | ||
date: | ||
- Thu, 17 Aug 2023 08:43:29 GMT | ||
referrer-policy: | ||
- strict-origin-when-cross-origin | ||
server: | ||
- istio-envoy | ||
strict-transport-security: | ||
- max-age=31536000; includeSubDomains | ||
vary: | ||
- Cookie | ||
x-app-version: | ||
- v2.36.1 | ||
x-content-type-options: | ||
- nosniff | ||
- nosniff | ||
x-envoy-upstream-service-time: | ||
- '15' | ||
x-frame-options: | ||
- DENY | ||
- SAMEORIGIN | ||
x-sca-engine-version: | ||
- 1.16.1 | ||
x-secrets-engine-version: | ||
- 2.95.0 | ||
x-xss-protection: | ||
- 1; mode=block | ||
status: | ||
code: 200 | ||
message: OK | ||
version: 1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
interactions: | ||
- request: | ||
body: | ||
"--770ddecb25300ec91a085b90915fe8f1\r\nContent-Disposition: form-data; name=\"scan_parameters\"\r\n\r\n{\"minimum_severity\": | ||
null, \"ignored_vulnerabilities\": []}\r\n--770ddecb25300ec91a085b90915fe8f1\r\nContent-Disposition: | ||
form-data; name=\"directory\"; filename=\"directory\"\r\n\r\n\r\n--770ddecb25300ec91a085b90915fe8f1--\r\n" | ||
headers: | ||
Accept: | ||
- '*/*' | ||
Accept-Encoding: | ||
- gzip, deflate | ||
Connection: | ||
- keep-alive | ||
Content-Length: | ||
- '303' | ||
Content-Type: | ||
- multipart/form-data; boundary=770ddecb25300ec91a085b90915fe8f1 | ||
User-Agent: | ||
- pygitguardian/1.9.0 (Linux;py3.10.12) | ||
method: POST | ||
uri: https://api.gitguardian.com/v1/sca/sca_scan_all/ | ||
response: | ||
body: | ||
string: '{"detail":"Directory is not a valid tarfile"}' | ||
headers: | ||
access-control-expose-headers: | ||
- X-App-Version | ||
allow: | ||
- POST, OPTIONS | ||
content-length: | ||
- '45' | ||
content-type: | ||
- application/json | ||
cross-origin-opener-policy: | ||
- same-origin | ||
date: | ||
- Thu, 17 Aug 2023 08:43:30 GMT | ||
referrer-policy: | ||
- strict-origin-when-cross-origin | ||
server: | ||
- istio-envoy | ||
strict-transport-security: | ||
- max-age=31536000; includeSubDomains | ||
vary: | ||
- Cookie | ||
x-app-version: | ||
- v2.36.1 | ||
x-content-type-options: | ||
- nosniff | ||
- nosniff | ||
x-envoy-upstream-service-time: | ||
- '16' | ||
x-frame-options: | ||
- DENY | ||
x-sca-engine-version: | ||
- 1.16.1 | ||
x-secrets-engine-version: | ||
- 2.95.0 | ||
x-xss-protection: | ||
- 1; mode=block | ||
status: | ||
code: 400 | ||
message: Bad Request | ||
version: 1 |
Large diffs are not rendered by default.
Oops, something went wrong.
Oops, something went wrong.