Source code for thoth.adviser.steps.security_indicators

#!/usr/bin/env python3
# thoth-adviser
# Copyright(C) 2020 Kevin Postlethwait
#
# This program is free software: you can redistribute it and / or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.

"""Score based on security indicators aggregated."""

from typing import Any
from typing import Dict
from typing import Generator
from typing import List
from typing import Optional
from typing import Set
from typing import Tuple
from typing import TYPE_CHECKING
import logging

import attr
from thoth.common import get_justification_link as jl
from thoth.python import PackageVersion
from thoth.storages.exceptions import NotFoundError
from voluptuous import Schema
from voluptuous import Required

from ..enums import RecommendationType
from ..exceptions import NotAcceptable
from ..state import State
from ..step import Step


if TYPE_CHECKING:
    from ..pipeline_builder import PipelineBuilderContext


_LOGGER = logging.getLogger(__name__)


[docs]@attr.s(slots=True) class SecurityIndicatorStep(Step): """A step that scores a state based on security info aggregated.""" _logged_packages = attr.ib(type=Set[Tuple[str, str, str]], default=attr.Factory(set), init=False) CONFIGURATION_DEFAULT = { "high_confidence_weight": 1.0, "high_severity_weight": 100.0, "low_confidence_weight": 0.1, "low_severity_weight": 1.0, "medium_confidence_weight": 0.5, "medium_severity_weight": 10.0, "multi_package_resolution": False, "package_name": None, "si_score_weight": 0.5, "function_scaling": 1 / 1000, } CONFIGURATION_SCHEMA: Schema = Schema( { Required("high_confidence_weight"): float, Required("high_severity_weight"): float, Required("low_confidence_weight"): float, Required("low_severity_weight"): float, Required("medium_confidence_weight"): float, Required("medium_severity_weight"): float, Required("multi_package_resolution"): bool, Required("package_name"): None, Required("si_score_weight"): float, Required("function_scaling"): float, } ) _JUSTIFICATION_LINK_SECURITY = jl("security") _JUSTIFICATION_LINK_BANDIT = jl("si_bandit")
[docs] @classmethod def should_include(cls, builder_context: "PipelineBuilderContext") -> Generator[Dict[str, Any], None, None]: """Register only if we are explicitly recommending secure stacks.""" if builder_context.recommendation_type not in (RecommendationType.SECURITY, RecommendationType.STABLE): yield from () return None if builder_context.is_included(cls): yield from () return None yield {} return None
@classmethod def _generate_justification(cls, name: str, version: str, index: str) -> List[Dict[str, Any]]: return [ { "type": "WARNING", "message": f"{name}==={version} on {index} has no gathered information regarding security.", "link": cls._JUSTIFICATION_LINK_SECURITY, "package_name": name, "version_range": f"==={version}", } ]
[docs] def pre_run(self) -> None: """Initialize this pipeline step before running the pipeline.""" self._logged_packages.clear() super().pre_run()
[docs] def run( self, state: State, package_version: PackageVersion ) -> Optional[Tuple[Optional[float], Optional[List[Dict[str, str]]]]]: """Score package based on security indicators gathered, do not include if not analyzed.""" package_version_tuple = package_version.to_tuple_locked() justification = [] try: s_info = self.context.graph.get_si_aggregated_python_package_version( package_name=package_version.name, package_version=package_version.locked_version, index_url=package_version.index.url, ) msg = ( f"Thoth has security info for {package_version.name}==={package_version.locked_version} " f"on {package_version.index.url}" ) justification.append( { "type": "INFO", "message": msg, "link": self._JUSTIFICATION_LINK_SECURITY, "package_name": package_version.name, "version_range": f"==={package_version.locked_version}", } ) except NotFoundError: if self.context.recommendation_type == RecommendationType.SECURITY: if package_version_tuple not in self._logged_packages: self._logged_packages.add(package_version_tuple) msg = ( f"No security info for {package_version.name}==={package_version.locked_version} " f"on {package_version.index.url}" ) self.context.stack_info.append( { "type": "WARNING", "message": msg, "link": self._JUSTIFICATION_LINK_SECURITY, "package_name": package_version.name, "version_range": f"==={package_version.locked_version}", } ) _LOGGER.warning("%s - see %s", msg, self._JUSTIFICATION_LINK_SECURITY) raise NotAcceptable return ( 0, self._generate_justification( name=package_version.name, version=package_version.locked_version, index=package_version.index.url ), ) if ( self.context.recommendation_type == RecommendationType.SECURITY and s_info["severity_high_confidence_high"] != 0 ): if package_version_tuple not in self._logged_packages: self._logged_packages.add(package_version_tuple) msg = ( f"Skipping including package {package_version_tuple} because bandit found " f"high severity high confidence issue(s)." ) _LOGGER.warning("%s - %s", msg, self._JUSTIFICATION_LINK_BANDIT) self.context.stack_info.append( {"type": "WARNING", "message": msg, "link": self._JUSTIFICATION_LINK_BANDIT} ) raise NotAcceptable else: msg = f"bandit found no high severity, high confidence issues for {package_version_tuple}" justification.append({"type": "INFO", "message": msg, "link": self._JUSTIFICATION_LINK_BANDIT}) s_score = ( ( s_info["severity_high_confidence_high"] * self.configuration["high_confidence_weight"] + s_info["severity_high_confidence_medium"] * self.configuration["medium_confidence_weight"] + s_info["severity_high_confidence_low"] * self.configuration["low_confidence_weight"] ) * self.configuration["high_severity_weight"] + ( s_info["severity_medium_confidence_high"] * self.configuration["high_confidence_weight"] + s_info["severity_medium_confidence_medium"] * self.configuration["medium_confidence_weight"] + s_info["severity_medium_confidence_low"] * self.configuration["low_confidence_weight"] ) * self.configuration["medium_severity_weight"] + ( s_info["severity_low_confidence_high"] * self.configuration["high_confidence_weight"] + s_info["severity_low_confidence_medium"] * self.configuration["medium_confidence_weight"] + s_info["severity_low_confidence_low"] * self.configuration["low_confidence_weight"] ) * self.configuration["low_severity_weight"] ) s_score = ( (s_score / (s_info["number_of_lines_with_code_in_python_files"] or 1)) ** 2 * self.configuration["function_scaling"] * -1 ) s_score = max(s_score, -1) * self.configuration["si_score_weight"] return s_score, justification or None