mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-15 17:11:40 -08:00
* chore(app): change dir * feat(rpc): add a proto file and auto-generated files * chore(dep): add dependencies * fix(app): fix import path * fix(integration): fix import path * fix(protoc): use enum for severity * chore(Makefile): add fmt andd protoc * chore(clang): add .clang-format * refactor: split functions for client/server (#296) * refactor(db): split db.Download * refactor(standalone): create a different package * refactor(vulnerability): split FillAndFilter * fix(protoc): use enum for severity * chore(Makefile): add fmt andd protoc * chore(clang): add .clang-format * fix(db): remove an unused variable * fix(db): expose the github client as an argument of constructor * refactor(vulnerability): add the detail message * feat(rpc): add rpc client (#302) * fix(protoc): use enum for severity * chore(Makefile): add fmt andd protoc * chore(clang): add .clang-format * feat(rpc): convert types * feat(rpc): add rpc client * token: Refactor to handle bad headers being set Signed-off-by: Simarpreet Singh <simar@linux.com> * feat(rpc): add rpc server (#303) * feat(rpc): add rpc server * feat(utils): add CopyFile * feat(server/config): add config struct * feat(detector): add detector * feat(scanner): delegate procedures to detector * fix(scanner): fix the interface * test(mock): add mocks * test(rpc/server): add tests * test(rpc/ospkg/server): add tests * tets(os/detector): add tests * refactor(library): move directories * chore(dependency): add google/wire * refactor(library): introduce google/wire * refactor(ospkg/detector): move directory * feat(rpc): add eosl * refactor(ospkg): introduce google/wire * refactor(wire): bind an interface * refactor(client): use wire.Struct * chore(Makefile): fix wire * test(server): add AssertExpectations * test(server): add AssertExpectations * refactor(server): remove debug log * refactor(error): add more context messages * test(server): fix error message * refactor(test): create a constructor of mock * refactor(config): remove an unused variable * test(config): add an assertion to test the config struct * feat(client/server): add sub commands (#304) * feat(rpc): add rpc server * feat(utils): add CopyFile * feat(server/config): add config struct * feat(detector): add detector * feat(scanner): delegate procedures to detector * fix(scanner): fix the interface * feat(client/server): add sub commands * merge(server3) * test(scan): remove an unused mock * refactor(client): generate the constructor by wire * fix(cli): change the default port * fix(server): use auto-generated constructor * feat(ospkg): return eosl * test(integration): add integration tests for client/server (#306) * fix(server): remove unnecessary options * test(integration): add integration tests for client/server * fix(server): wrap an error * fix(server): change the update interval * fix(server): display the error detail * test(config): add an assertion to test the config struct * fix(client): returns an error when failing to initizlie a logger * test(ospkg/server): add eosl * Squashed commit of the following: * test(server): refactor and add tests (#307) * test(github): create a mock * test(db): create a mock * test(server): add tests for DB hot update * chore(db): add a log message * refactor(db): introduce google/wire * refactor(rpc): move directory * refactor(injector): fix import name * refactor(import): remove new lines * fix(server): display the error detail * fix(server): change the update interval * fix(server): wrap an error * test(integration): add integration tests for client/server * fix(server): remove unnecessary options * refactor(server): return an error when failing to initialize a logger * refactor(server): remove unused error * fix(client/server): fix default port * chore(README): add client/server * chore(README): update
103 lines
2.6 KiB
Go
103 lines
2.6 KiB
Go
package node
|
|
|
|
import (
|
|
"os"
|
|
"strings"
|
|
|
|
version "github.com/knqyf263/go-version"
|
|
"golang.org/x/xerrors"
|
|
|
|
"github.com/aquasecurity/go-dep-parser/pkg/npm"
|
|
ptypes "github.com/aquasecurity/go-dep-parser/pkg/types"
|
|
"github.com/aquasecurity/go-dep-parser/pkg/yarn"
|
|
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/node"
|
|
"github.com/aquasecurity/trivy/pkg/scanner/utils"
|
|
"github.com/aquasecurity/trivy/pkg/types"
|
|
)
|
|
|
|
const (
|
|
ScannerTypeNpm = "npm"
|
|
ScannerTypeYarn = "yarn"
|
|
)
|
|
|
|
type Scanner struct {
|
|
scannerType string
|
|
vs node.VulnSrc
|
|
}
|
|
|
|
func NewScanner(scannerType string) *Scanner {
|
|
return &Scanner{
|
|
scannerType: scannerType,
|
|
vs: node.NewVulnSrc(),
|
|
}
|
|
}
|
|
|
|
func (s *Scanner) Detect(pkgName string, pkgVer *version.Version) ([]types.DetectedVulnerability, error) {
|
|
replacer := strings.NewReplacer(".alpha", "-alpha", ".beta", "-beta", ".rc", "-rc", " <", ", <", " >", ", >")
|
|
advisories, err := s.vs.Get(pkgName)
|
|
if err != nil {
|
|
return nil, xerrors.Errorf("failed to get %s advisories: %w", s.Type(), err)
|
|
}
|
|
|
|
var vulns []types.DetectedVulnerability
|
|
for _, advisory := range advisories {
|
|
// e.g. <= 2.15.0 || >= 3.0.0 <= 3.8.2
|
|
// => {"<=2.15.0", ">= 3.0.0, <= 3.8.2"}
|
|
var vulnerableVersions []string
|
|
for _, version := range strings.Split(advisory.VulnerableVersions, " || ") {
|
|
version = strings.TrimSpace(version)
|
|
vulnerableVersions = append(vulnerableVersions, replacer.Replace(version))
|
|
}
|
|
|
|
if !utils.MatchVersions(pkgVer, vulnerableVersions) {
|
|
continue
|
|
}
|
|
|
|
var patchedVersions []string
|
|
for _, version := range strings.Split(advisory.PatchedVersions, " || ") {
|
|
version = strings.TrimSpace(version)
|
|
patchedVersions = append(patchedVersions, replacer.Replace(version))
|
|
}
|
|
|
|
if utils.MatchVersions(pkgVer, patchedVersions) {
|
|
continue
|
|
}
|
|
|
|
vuln := types.DetectedVulnerability{
|
|
VulnerabilityID: advisory.VulnerabilityID,
|
|
PkgName: pkgName,
|
|
InstalledVersion: pkgVer.String(),
|
|
FixedVersion: strings.Join(patchedVersions, ", "),
|
|
}
|
|
vulns = append(vulns, vuln)
|
|
}
|
|
return vulns, nil
|
|
}
|
|
|
|
func (s *Scanner) ParseLockfile(f *os.File) ([]ptypes.Library, error) {
|
|
if s.Type() == ScannerTypeNpm {
|
|
return s.parseNpm(f)
|
|
}
|
|
return s.parseYarn(f)
|
|
}
|
|
|
|
func (s *Scanner) parseNpm(f *os.File) ([]ptypes.Library, error) {
|
|
libs, err := npm.Parse(f)
|
|
if err != nil {
|
|
return nil, xerrors.Errorf("invalid package-lock.json format: %w", err)
|
|
}
|
|
return libs, nil
|
|
}
|
|
|
|
func (s *Scanner) parseYarn(f *os.File) ([]ptypes.Library, error) {
|
|
libs, err := yarn.Parse(f)
|
|
if err != nil {
|
|
return nil, xerrors.Errorf("invalid yarn.lock format: %w", err)
|
|
}
|
|
return libs, nil
|
|
}
|
|
|
|
func (s *Scanner) Type() string {
|
|
return s.scannerType
|
|
}
|