-
Notifications
You must be signed in to change notification settings - Fork 109
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #623 from actions/fix-advisory-filters
Fix GHSA Filtering
- Loading branch information
Showing
5 changed files
with
156 additions
and
54 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -19,7 +19,7 @@ const npmChange: Change = { | |
vulnerabilities: [ | ||
{ | ||
severity: 'critical', | ||
advisory_ghsa_id: 'first-random_string', | ||
advisory_ghsa_id: 'vulnerable-ghsa-id', | ||
advisory_summary: 'very dangerous', | ||
advisory_url: 'github.com/future-funk' | ||
} | ||
|
@@ -39,13 +39,13 @@ const rubyChange: Change = { | |
vulnerabilities: [ | ||
{ | ||
severity: 'moderate', | ||
advisory_ghsa_id: 'second-random_string', | ||
advisory_ghsa_id: 'moderate-ghsa-id', | ||
advisory_summary: 'not so dangerous', | ||
advisory_url: 'github.com/future-funk' | ||
}, | ||
{ | ||
severity: 'low', | ||
advisory_ghsa_id: 'third-random_string', | ||
advisory_ghsa_id: 'low-ghsa-id', | ||
advisory_summary: 'dont page me', | ||
advisory_url: 'github.com/future-funk' | ||
} | ||
|
@@ -65,6 +65,64 @@ const noVulnNpmChange: Change = { | |
vulnerabilities: [] | ||
} | ||
|
||
const lodashChange: Change = { | ||
change_type: 'added', | ||
manifest: 'package.json', | ||
ecosystem: 'npm', | ||
name: 'lodash', | ||
version: '4.17.0', | ||
package_url: 'pkg:npm/[email protected]', | ||
license: 'MIT', | ||
source_repository_url: 'https://github.com/lodash/lodash', | ||
scope: 'runtime', | ||
vulnerabilities: [ | ||
{ | ||
severity: 'critical', | ||
advisory_ghsa_id: 'GHSA-jf85-cpcp-j695', | ||
advisory_summary: 'Prototype Pollution in lodash', | ||
advisory_url: 'https://github.com/advisories/GHSA-jf85-cpcp-j695' | ||
}, | ||
{ | ||
severity: 'high', | ||
advisory_ghsa_id: 'GHSA-4xc9-xhrj-v574', | ||
advisory_summary: 'Prototype Pollution in lodash', | ||
advisory_url: 'https://github.com/advisories/GHSA-4xc9-xhrj-v574' | ||
}, | ||
{ | ||
severity: 'high', | ||
advisory_ghsa_id: 'GHSA-35jh-r3h4-6jhm', | ||
advisory_summary: 'Command Injection in lodash', | ||
advisory_url: 'https://github.com/advisories/GHSA-35jh-r3h4-6jhm' | ||
}, | ||
{ | ||
severity: 'high', | ||
advisory_ghsa_id: 'GHSA-p6mc-m468-83gw', | ||
advisory_summary: 'Prototype Pollution in lodash', | ||
advisory_url: 'https://github.com/advisories/GHSA-p6mc-m468-83gw' | ||
}, | ||
{ | ||
severity: 'moderate', | ||
advisory_ghsa_id: 'GHSA-x5rq-j2xg-h7qm', | ||
advisory_summary: | ||
'Regular Expression Denial of Service (ReDoS) in lodash', | ||
advisory_url: 'https://github.com/advisories/GHSA-x5rq-j2xg-h7qm' | ||
}, | ||
{ | ||
severity: 'moderate', | ||
advisory_ghsa_id: 'GHSA-29mw-wpgm-hmr9', | ||
advisory_summary: | ||
'Regular Expression Denial of Service (ReDoS) in lodash', | ||
advisory_url: 'https://github.com/advisories/GHSA-29mw-wpgm-hmr9' | ||
}, | ||
{ | ||
severity: 'low', | ||
advisory_ghsa_id: 'GHSA-fvqr-27wr-82fm', | ||
advisory_summary: 'Prototype Pollution in lodash', | ||
advisory_url: 'https://github.com/advisories/GHSA-fvqr-27wr-82fm' | ||
} | ||
] | ||
} | ||
|
||
test('it properly filters changes by severity', async () => { | ||
const changes = [npmChange, rubyChange] | ||
let result = filterChangesBySeverity('high', changes) | ||
|
@@ -99,25 +157,61 @@ test('it properly handles undefined advisory IDs', async () => { | |
test('it properly filters changes with allowed vulnerabilities', async () => { | ||
const changes = [npmChange, rubyChange, noVulnNpmChange] | ||
|
||
let result = filterAllowedAdvisories(['notrealGHSAID'], changes) | ||
expect(result).toEqual([npmChange, rubyChange, noVulnNpmChange]) | ||
const fakeGHSAChanges = filterAllowedAdvisories(['notrealGHSAID'], changes) | ||
expect(fakeGHSAChanges).toEqual([npmChange, rubyChange, noVulnNpmChange]) | ||
}) | ||
|
||
test('it properly filters only allowed vulnerabilities', async () => { | ||
const changes = [npmChange, rubyChange, noVulnNpmChange] | ||
const oldVulns = [ | ||
...npmChange.vulnerabilities, | ||
...rubyChange.vulnerabilities, | ||
...noVulnNpmChange.vulnerabilities | ||
] | ||
|
||
result = filterAllowedAdvisories(['first-random_string'], changes) | ||
expect(result).toEqual([rubyChange, noVulnNpmChange]) | ||
const vulnerable = filterAllowedAdvisories(['vulnerable-ghsa-id'], changes) | ||
|
||
result = filterAllowedAdvisories( | ||
['second-random_string', 'third-random_string'], | ||
changes | ||
const newVulns = vulnerable.map(change => change.vulnerabilities).flat() | ||
|
||
expect(newVulns.length).toEqual(oldVulns.length - 1) | ||
expect(newVulns).not.toContainEqual( | ||
expect.objectContaining({advisory_ghsa_id: 'vulnerable-ghsa-id'}) | ||
) | ||
expect(result).toEqual([npmChange, noVulnNpmChange]) | ||
}) | ||
|
||
result = filterAllowedAdvisories( | ||
['first-random_string', 'second-random_string', 'third-random_string'], | ||
test('does not drop dependencies when filtering by GHSA', async () => { | ||
const changes = [npmChange, rubyChange, noVulnNpmChange] | ||
const result = filterAllowedAdvisories( | ||
['moderate-ghsa-id', 'low-ghsa-id', 'GHSA-jf85-cpcp-j695'], | ||
changes | ||
) | ||
expect(result).toEqual([noVulnNpmChange]) | ||
|
||
// if we have a change with multiple vulnerabilities but only one is allowed, we still should not filter out that change | ||
result = filterAllowedAdvisories(['second-random_string'], changes) | ||
expect(result).toEqual([npmChange, rubyChange, noVulnNpmChange]) | ||
expect(result.map(change => change.name)).toEqual( | ||
changes.map(change => change.name) | ||
) | ||
}) | ||
|
||
test('it properly filters multiple GHSAs', async () => { | ||
const allowedGHSAs = ['vulnerable-ghsa-id', 'moderate-ghsa-id', 'low-ghsa-id'] | ||
const changes = [npmChange, rubyChange, noVulnNpmChange] | ||
const oldVulns = changes.map(change => change.vulnerabilities).flat() | ||
|
||
const result = filterAllowedAdvisories(allowedGHSAs, changes) | ||
|
||
const newVulns = result.map(change => change.vulnerabilities).flat() | ||
|
||
expect(newVulns.length).toEqual(oldVulns.length - 3) | ||
}) | ||
|
||
test('it filters out GHSA dependencies', async () => { | ||
const lodash = filterAllowedAdvisories( | ||
['GHSA-jf85-cpcp-j695'], | ||
[lodashChange] | ||
)[0] | ||
// the filter should have removed a single GHSA from the list | ||
const expected = lodashChange.vulnerabilities.filter( | ||
vuln => vuln.advisory_ghsa_id !== 'GHSA-jf85-cpcp-j695' | ||
) | ||
expect(expected.length).toEqual(lodashChange.vulnerabilities.length - 1) | ||
expect(lodash.vulnerabilities).toEqual(expected) | ||
}) |
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters