Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(vuln): include pkg identifier on detected vulnerabilities #5439

Merged
merged 69 commits into from
Dec 27, 2023

Conversation

juan131
Copy link
Contributor

@juan131 juan131 commented Oct 24, 2023

Description

This PR attempt to ensure we include a package identifier on every detected vulnerability using a generated pURL when there's no package reference.

It deprecates the Results[].Vulnerabilities[].PkgRef (string) field on scan reports in favor of Results[].Vulnerabilities[].PkgIdentifier which is now an object following the struct below:

// PkgIdentifier represents a software identifiers in one of more of the supported formats.
type PkgIdentifier struct {
	// Software identifier in PURL format
	PURL string `json:",omitempty"`
	// Software identifier in CPE format
	CPE string `json:",omitempty"`
}

... and it enhances the detector so pkg identifiers are generated when there's no package reference.

Before :

$ trivy -q i --scanners vuln library/redis:7.2.1-bookworm -f json | jq .Results[].Vulnerabilities[].PkgRef
null
null
null
(...)

After:

$ trivy -q i --scanners vuln library/redis:7.2.1-bookworm -f json | jq .Results[].Vulnerabilities[].PkgIdentifier
{
  "PURL": "pkg:dpkg/[email protected]"
}
{
  "PURL": "pkg:dpkg/bsdutils@1%3A2.38.1-5%2Bb1"
}
{
  "PURL": "pkg:dpkg/[email protected]"
}
(...)

Related issues

Checklist

  • I've read the guidelines for contributing to this repository.
  • I've followed the conventions in the PR title.
  • I've added tests that prove my fix is effective or that my feature works.
  • I've updated the documentation with the relevant information (if needed).
  • I've added usage information (if the PR introduces new options)
  • I've included a "before" and "after" example to the description (if the PR is a user interface change).

Copy link
Collaborator

@knqyf263 knqyf263 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for your great contribution! I think we should add Identifier in Package as well as DetectedVulnerability since it is an attribute of the package. What do you think? It means PURLs should be generated in the analysis part.

type Package struct {
ID string `json:",omitempty"`
Name string `json:",omitempty"`
Version string `json:",omitempty"`
Release string `json:",omitempty"`
Epoch int `json:",omitempty"`
Arch string `json:",omitempty"`
Dev bool `json:",omitempty"`
SrcName string `json:",omitempty"`
SrcVersion string `json:",omitempty"`
SrcRelease string `json:",omitempty"`
SrcEpoch int `json:",omitempty"`
Licenses []string `json:",omitempty"`
Maintainer string `json:",omitempty"`
Modularitylabel string `json:",omitempty"` // only for Red Hat based distributions
BuildInfo *BuildInfo `json:",omitempty"` // only for Red Hat
Ref string `json:",omitempty"` // identifier which can be used to reference the component elsewhere
Indirect bool `json:",omitempty"` // this package is direct dependency of the project or not
// Dependencies of this package
// Note: it may have interdependencies, which may lead to infinite loops.
DependsOn []string `json:",omitempty"`
Layer Layer `json:",omitempty"`
// Each package metadata have the file path, while the package from lock files does not have.
FilePath string `json:",omitempty"`
// This is required when using SPDX formats. Otherwise, it will be empty.
Digest digest.Digest `json:",omitempty"`
// lines from the lock file where the dependency is written
Locations []Location `json:",omitempty"`
// Files installed by the package
InstalledFiles []string `json:",omitempty"`
}

PURL can be generated here for language-specific packages.

pkgs = append(pkgs, types.Package{
ID: lib.ID,
Name: lib.Name,
Version: lib.Version,
Dev: lib.Dev,
FilePath: libPath,
Indirect: lib.Indirect,
Licenses: licenses,
DependsOn: deps[lib.ID],
Locations: locs,
Digest: d,
})

OS packages may need to generate PURLs in each analyzer.

if !pkg.Empty() {
pkgs = append(pkgs, pkg)
}

@DmitriyLewen Please let me know if you have any comments.

pkg/types/identifier.go Outdated Show resolved Hide resolved
pkg/types/vulnerability.go Outdated Show resolved Hide resolved
@DmitriyLewen
Copy link
Contributor

Agree with you @knqyf263
purl/cpe is one of the package parameters.

If the package contains PkgIdentifier, we can simply add it to DetectedVulnerability:
e.g. for alpine packages:

vulns = append(vulns, types.DetectedVulnerability{
VulnerabilityID: adv.VulnerabilityID,
PkgID: pkg.ID,
PkgName: pkg.Name,
InstalledVersion: utils.FormatVersion(pkg),
FixedVersion: adv.FixedVersion,
Layer: pkg.Layer,
PkgRef: pkg.Ref,
Custom: adv.Custom,
DataSource: adv.DataSource,
})

@juan131
Copy link
Contributor Author

juan131 commented Nov 8, 2023

Thanks for your comments @DmitriyLewen @knqyf263 ! I'll update the PR moving PkgIdentifier as part of the Package identity and generate pURL(s) at analysis.

@juan131 juan131 requested a review from knqyf263 November 9, 2023 12:14
@juan131
Copy link
Contributor Author

juan131 commented Nov 10, 2023

I need advice on how to update pkg/fanal/test/integration/testdata/goldens data automatically to fix integration tests @knqyf263

@DmitriyLewen
Copy link
Contributor

mage test:updateGolden command should update golden files for integration tests.

@juan131 juan131 marked this pull request as ready for review November 10, 2023 10:17
@juan131
Copy link
Contributor Author

juan131 commented Nov 15, 2023

I'm still finding issues with integration tests and recreating golden images (mage test:updateGolden threw some unauthorized errors). Could you help me with this @DmitriyLewen ?

@DmitriyLewen
Copy link
Contributor

Hello @juan131
I have fixed containerd tests (you may be using macOS or a non-AMD64 processor. In this case, we are skipping containerd tests -

//go:build integration && linux
,
if runtime.GOARCH != "amd64" {
)

About ClientServer tests:
you need to update rpc package -

message Vulnerability {

Looks like your changes don't work in client-server mode.

@juan131
Copy link
Contributor Author

juan131 commented Dec 14, 2023

Thanks for implementing the missing changes @DmitriyLewen ! I think with this the PR is ready, am I right?

@DmitriyLewen
Copy link
Contributor

This is a big PR and i realized that I’m already confusing myself 😄

I think the PR is ready. But perhaps this code requires refactoring.

I want to double check this with a clear head.
I'll do it tomorrow or Monday.

@DmitriyLewen
Copy link
Contributor

DmitriyLewen commented Dec 19, 2023

Hello @juan131
PR looks good.

We merged #5764
Can you merge main branch into this PR and update goldenfiles, please?

@juan131
Copy link
Contributor Author

juan131 commented Dec 19, 2023

Thanks @DmitriyLewen !! PR was updated

@DmitriyLewen
Copy link
Contributor

@juan131 there is conflict.
I'm also confused - GitHub marked go.mod and go.sum files as modified - https://github.com/aquasecurity/trivy/pull/5439/files#diff-33ef32bf6c23acb95f5902d7097b7a1d5128ca061167ec0716715b0b9eeaa5f6R16

@juan131
Copy link
Contributor Author

juan131 commented Dec 19, 2023

Conflict solved @DmitriyLewen

@knqyf263
Copy link
Collaborator

I'm slowly starting to work this week and will review this PR shortly.

Copy link
Collaborator

@knqyf263 knqyf263 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! I changed the PURL field from string to the PURL struct, but the rest looks good.

@knqyf263 knqyf263 added this pull request to the merge queue Dec 27, 2023
Merged via the queue into aquasecurity:main with commit 1f0d629 Dec 27, 2023
12 checks passed
@juan131 juan131 deleted the feat/pkg-identifier branch January 2, 2024 08:21
@juan131
Copy link
Contributor Author

juan131 commented Jan 2, 2024

Awesome! Thanks so much @knqyf263 @DmitriyLewen

carsongee pushed a commit to datarobot/trivy that referenced this pull request Feb 15, 2024
…ecurity#5439)

Signed-off-by: juan131 <[email protected]>
Signed-off-by: knqyf263 <[email protected]>
Co-authored-by: DmitriyLewen <[email protected]>
Co-authored-by: DmitriyLewen <[email protected]>
Co-authored-by: Nikita Pivkin <[email protected]>
Co-authored-by: knqyf263 <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants