Skip to content
代码片段 群组 项目
未验证 提交 804d1a55 编辑于 作者: Brian Williams's avatar Brian Williams 提交者: Michał Zając
浏览文件

Auto-resolve vulnerabilities based on vulnerability management policy

Automatically resolve vulnerabilities if a vulnerability management
policy is configured.
上级 8f541317
No related branches found
No related tags found
无相关合并请求
显示 215 个添加45 个删除
...@@ -11,5 +11,15 @@ def active_vulnerability_management_policies ...@@ -11,5 +11,15 @@ def active_vulnerability_management_policies
def vulnerability_management_policy def vulnerability_management_policy
policy_by_type(:vulnerability_management_policy) policy_by_type(:vulnerability_management_policy)
end end
def match?(vulnerability)
no_longer_detected_rules.any? { |rule| rule.match?(vulnerability) }
end
def no_longer_detected_rules
vulnerability_management_policy_rules
.undeleted
.no_longer_detected
end
end end
end end
...@@ -3,6 +3,7 @@ ...@@ -3,6 +3,7 @@
module Security module Security
class Policy < ApplicationRecord class Policy < ApplicationRecord
include EachBatch include EachBatch
include Security::VulnerabilityManagementPolicy
self.table_name = 'security_policies' self.table_name = 'security_policies'
self.inheritance_column = :_type_disabled self.inheritance_column = :_type_disabled
......
...@@ -11,5 +11,25 @@ class VulnerabilityManagementPolicyRule < ApplicationRecord ...@@ -11,5 +11,25 @@ class VulnerabilityManagementPolicyRule < ApplicationRecord
belongs_to :security_policy, class_name: 'Security::Policy', inverse_of: :vulnerability_management_policy_rules belongs_to :security_policy, class_name: 'Security::Policy', inverse_of: :vulnerability_management_policy_rules
validates :typed_content, json_schema: { filename: "vulnerability_management_policy_rule_content" } validates :typed_content, json_schema: { filename: "vulnerability_management_policy_rule_content" }
scope :no_longer_detected, -> { where(type: :no_longer_detected) }
def match?(vulnerability)
scanners.include?(vulnerability.report_type) && severity_levels.include?(vulnerability.severity)
end
private
def scanners
return ::Enums::Vulnerability.report_types.keys if content['scanners'].blank?
content['scanners']
end
def severity_levels
return ::Enums::Vulnerability.severity_levels.keys if content['severity_levels'].blank?
content['severity_levels']
end
end end
end end
...@@ -8,6 +8,7 @@ module Ingestion ...@@ -8,6 +8,7 @@ module Ingestion
# on the default branch if they were not detected again. # on the default branch if they were not detected again.
class MarkAsResolvedService class MarkAsResolvedService
include Gitlab::InternalEventsTracking include Gitlab::InternalEventsTracking
include Gitlab::Utils::StrongMemoize
CVS_SCANNER_EXTERNAL_ID = 'gitlab-sbom-vulnerability-scanner' CVS_SCANNER_EXTERNAL_ID = 'gitlab-sbom-vulnerability-scanner'
CS_SCANNERS_EXTERNAL_IDS = %w[trivy].freeze CS_SCANNERS_EXTERNAL_IDS = %w[trivy].freeze
...@@ -44,10 +45,13 @@ def execute ...@@ -44,10 +45,13 @@ def execute
delegate :vulnerability_reads, to: :project, private: true delegate :vulnerability_reads, to: :project, private: true
def process_batch(batch) def process_batch(batch)
(batch.pluck_primary_key - ingested_ids).then { |missing_ids| mark_as_resolved(missing_ids) } (batch.pluck_primary_key - ingested_ids).then do |missing_ids|
mark_as_no_longer_detected(missing_ids)
auto_resolve(missing_ids)
end
end end
def mark_as_resolved(missing_ids) def mark_as_no_longer_detected(missing_ids)
return if missing_ids.blank? return if missing_ids.blank?
resolved_count = Vulnerability.id_in(missing_ids) resolved_count = Vulnerability.id_in(missing_ids)
...@@ -58,6 +62,17 @@ def mark_as_resolved(missing_ids) ...@@ -58,6 +62,17 @@ def mark_as_resolved(missing_ids)
track_no_longer_detected_vulnerabilities(resolved_count) track_no_longer_detected_vulnerabilities(resolved_count)
end end
def auto_resolve(missing_ids)
return unless auto_resolve_enabled?
Vulnerabilities::AutoResolveService.new(project, missing_ids).execute
end
def auto_resolve_enabled?
::Feature.enabled?(:auto_resolve_vulnerabilities, project)
end
strong_memoize_attr :auto_resolve_enabled?
def process_existing_cvs_vulnerabilities_for_container_scanning def process_existing_cvs_vulnerabilities_for_container_scanning
vulnerability_reads vulnerability_reads
.by_scanner_ids(cvs_scanner_id) .by_scanner_ids(cvs_scanner_id)
......
...@@ -2,20 +2,20 @@ ...@@ -2,20 +2,20 @@
module Vulnerabilities module Vulnerabilities
class AutoResolveService class AutoResolveService
include Gitlab::Utils::StrongMemoize
MAX_BATCH = 100 MAX_BATCH = 100
def initialize(project, vulnerability_ids, security_policy_name) def initialize(project, vulnerability_ids)
@project = project @project = project
@vulnerability_ids = vulnerability_ids @vulnerabilities = Vulnerability.id_in(vulnerability_ids.first(MAX_BATCH))
@security_policy_name = security_policy_name
end end
def execute def execute
return ServiceResponse.success if policies.blank?
return error_response unless can_create_state_transitions? return error_response unless can_create_state_transitions?
vulnerability_ids.each_slice(MAX_BATCH).each do |ids| resolve_vulnerabilities
resolve(Vulnerability.id_in(ids))
end
refresh_statistics refresh_statistics
ServiceResponse.success ServiceResponse.success
...@@ -25,24 +25,37 @@ def execute ...@@ -25,24 +25,37 @@ def execute
private private
attr_reader :project, :vulnerability_ids, :security_policy_name attr_reader :project, :vulnerabilities
def resolve(vulnerabilities) def vulnerabilities_to_resolve
# rubocop:disable CodeReuse/ActiveRecord -- context specific policies_by_vulnerability.keys
# rubocop:disable Database/AvoidUsingPluckWithoutLimit -- Caller limits to 100 records end
vulnerability_attrs = vulnerabilities.pluck(:id, :state)
# rubocop:enable CodeReuse/ActiveRecord
# rubocop:enable Database/AvoidUsingPluckWithoutLimit
return if vulnerability_attrs.empty? def policies_by_vulnerability
policies.each_with_object({}) do |policy, memo|
vulnerabilities.each do |vulnerability|
if policy.match?(vulnerability)
memo[vulnerability] ||= []
memo[vulnerability].push(policy)
end
end
end
end
strong_memoize_attr :policies_by_vulnerability
def policies
# TODO: This should only include policies that have a `no_longer_detected` rule
# and an `auto_resolve` action
project.security_policies.type_vulnerability_management_policy
end
state_transitions = transition_attributes_for(vulnerability_attrs) def resolve_vulnerabilities
system_notes = system_note_attributes_for(vulnerability_attrs) return if vulnerabilities_to_resolve.empty?
Vulnerability.transaction do Vulnerability.transaction do
Vulnerabilities::StateTransition.insert_all!(state_transitions) Vulnerabilities::StateTransition.insert_all!(state_transition_attrs)
vulnerabilities.update_all( Vulnerability.id_in(vulnerabilities_to_resolve.map(&:id)).update_all(
state: :resolved, state: :resolved,
auto_resolved: true, auto_resolved: true,
resolved_by_id: user.id, resolved_by_id: user.id,
...@@ -50,28 +63,28 @@ def resolve(vulnerabilities) ...@@ -50,28 +63,28 @@ def resolve(vulnerabilities)
updated_at: now updated_at: now
) )
end end
Note.insert_all!(system_notes) Note.insert_all!(system_note_attrs)
end end
def transition_attributes_for(attrs) def state_transition_attrs
attrs.map do |id, state| vulnerabilities_to_resolve.map do |vulnerability|
{ {
vulnerability_id: id, vulnerability_id: vulnerability.id,
from_state: state, from_state: vulnerability.state,
to_state: :resolved, to_state: :resolved,
author_id: user.id, author_id: user.id,
comment: comment, comment: comment(vulnerability),
created_at: now, created_at: now,
updated_at: now updated_at: now
} }
end end
end end
def system_note_attributes_for(attrs) def system_note_attrs
attrs.map do |id, _| vulnerabilities_to_resolve.map do |vulnerability|
{ {
noteable_type: "Vulnerability", noteable_type: "Vulnerability",
noteable_id: id, noteable_id: vulnerability.id,
project_id: project.id, project_id: project.id,
namespace_id: project.project_namespace_id, namespace_id: project.project_namespace_id,
system: true, system: true,
...@@ -79,7 +92,7 @@ def system_note_attributes_for(attrs) ...@@ -79,7 +92,7 @@ def system_note_attributes_for(attrs)
'changed', 'changed',
:resolved, :resolved,
nil, nil,
comment comment(vulnerability)
), ),
author_id: user.id, author_id: user.id,
created_at: now, created_at: now,
...@@ -88,8 +101,9 @@ def system_note_attributes_for(attrs) ...@@ -88,8 +101,9 @@ def system_note_attributes_for(attrs)
end end
end end
def comment def comment(vulnerability)
_("Auto-resolved by vulnerability management policy") + " #{security_policy_name}" policy_names = policies_by_vulnerability[vulnerability].map(&:name)
_("Auto-resolved by vulnerability management policy") + " #{policy_names.join(', ')}"
end end
def user def user
......
---
name: auto_resolve_vulnerabilities
feature_issue_url: https://gitlab.com/groups/gitlab-org/-/epics/5708
introduced_by_url: https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173437
rollout_issue_url: https://gitlab.com/gitlab-org/gitlab/-/issues/505711
milestone: '17.7'
group: group::security insights
type: beta
default_enabled: false
...@@ -37,6 +37,16 @@ ...@@ -37,6 +37,16 @@
end end
require_approval require_approval
transient do
linked_projects { [] }
end
after(:create) do |policy, evaluator|
evaluator.linked_projects.each do |project|
create(:security_policy_project_link, project: project, security_policy: policy)
end
end
trait :deleted do trait :deleted do
policy_index { -1 } policy_index { -1 }
end end
......
...@@ -23,4 +23,58 @@ ...@@ -23,4 +23,58 @@
end end
end end
end end
describe '#match?' do
def severity_wildcard_should_match_all_severities
::Enums::Vulnerability.severity_levels.keys.map do |severity|
[['sast'], [], :sast, severity, true]
end
end
def scanner_wildcard_should_match_all_scanners
::Enums::Vulnerability.report_types.keys.map do |report_type|
[[], ['critical'], report_type, 'critical', true]
end
end
def should_match_if_partials_match
[
[%w[dependency_scanning container_scanning], %w[info low], :dependency_scanning, :info, true],
[%w[dependency_scanning container_scanning], %w[info low], :dependency_scanning, :low, true],
[%w[dependency_scanning container_scanning], %w[info low], :container_scanning, :info, true],
[%w[dependency_scanning container_scanning], %w[info low], :container_scanning, :low, true]
]
end
def should_not_match_if_partials_dont_match
[
[%w[dependency_scanning container_scanning], %w[info low], :sast, :info, false],
[%w[dependency_scanning container_scanning], %w[info low], :dependency_scanning, :critical, false],
[%w[dependency_scanning container_scanning], %w[info low], :sast, :critical, false]
]
end
where(:policy_scanners, :policy_severities, :vulnerability_report_type, :vulnerability_severity, :expected) do
severity_wildcard_should_match_all_severities +
scanner_wildcard_should_match_all_scanners +
should_match_if_partials_match +
should_not_match_if_partials_dont_match
end
with_them do
specify do
rule = build_stubbed(:vulnerability_management_policy_rule,
type: :no_longer_detected,
content: { 'scanners' => policy_scanners, 'severity_levels' => policy_severities }
)
vulnerability = build_stubbed(:vulnerability,
report_type: vulnerability_report_type,
severity: vulnerability_severity
)
expect(rule.match?(vulnerability)).to eq(expected)
end
end
end
end end
...@@ -11,17 +11,41 @@ ...@@ -11,17 +11,41 @@
let(:ingested_ids) { [] } let(:ingested_ids) { [] }
let_it_be(:scanner) { create(:vulnerabilities_scanner, project: project) } let_it_be(:scanner) { create(:vulnerabilities_scanner, project: project) }
it 'resolves non-generic vulnerabilities detected by the scanner' do context 'when there is a vulnerability to be resolved' do
vulnerability = create(:vulnerability, :sast, let_it_be(:vulnerability) do
project: project, create(:vulnerability, :sast,
present_on_default_branch: true, project: project,
resolved_on_default_branch: false, present_on_default_branch: true,
findings: [create(:vulnerabilities_finding, project: project, scanner: scanner)] resolved_on_default_branch: false,
) findings: [create(:vulnerabilities_finding, project: project, scanner: scanner)]
)
end
command.execute it 'resolves non-generic vulnerabilities detected by the scanner' do
command.execute
expect(vulnerability.reload).to be_resolved_on_default_branch
end
it 'calls AutoResolveService on missing_ids' do
expect_next_instance_of(Vulnerabilities::AutoResolveService, project, [vulnerability.id]) do |service|
expect(service).to receive(:execute)
end
expect(vulnerability.reload).to be_resolved_on_default_branch command.execute
end
context 'when auto_resolve_vulnerabilities feature flag is disabled' do
before do
stub_feature_flags(auto_resolve_vulnerabilities: false)
end
it 'does not call AutoResolveService' do
expect(Vulnerabilities::AutoResolveService).not_to receive(:new)
command.execute
end
end
end end
context 'with multiple vulnerabilities' do context 'with multiple vulnerabilities' do
......
...@@ -7,11 +7,24 @@ ...@@ -7,11 +7,24 @@
let_it_be(:namespace) { create(:namespace) } let_it_be(:namespace) { create(:namespace) }
let_it_be_with_reload(:project) { create(:project, namespace: namespace) } let_it_be_with_reload(:project) { create(:project, namespace: namespace) }
let_it_be(:vulnerability) { create(:vulnerability, :with_findings, :detected, :high_severity, project: project) } let_it_be(:vulnerability) { create(:vulnerability, :with_findings, :detected, :high_severity, project: project) }
let_it_be(:policy) { create(:security_policy, :vulnerability_management_policy, linked_projects: [project]) }
let_it_be(:policy_rule) do
create(:vulnerability_management_policy_rule,
security_policy: policy,
content: {
type: 'no_longer_detected',
scanners: [],
severity_levels: []
}
)
end
let(:vulnerability_ids) { [vulnerability.id] } let(:vulnerability_ids) { [vulnerability.id] }
let(:comment) { _("Auto-resolved by vulnerability management policy") + " #{security_policy_name}" } let(:comment) { _("Auto-resolved by vulnerability management policy") + " #{security_policy_name}" }
let(:security_policy_name) { 'resolve_low_severity_vulnerabilities' } let(:security_policy_name) { policy.name }
subject(:service) { described_class.new(project, vulnerability_ids, security_policy_name) } subject(:service) { described_class.new(project, vulnerability_ids) }
before_all do before_all do
project.add_guest(user) project.add_guest(user)
...@@ -128,14 +141,14 @@ ...@@ -128,14 +141,14 @@
it 'does not introduce N+1 queries' do it 'does not introduce N+1 queries' do
control = ActiveRecord::QueryRecorder.new do control = ActiveRecord::QueryRecorder.new do
described_class.new(project, vulnerability_ids, security_policy_name).execute described_class.new(project, vulnerability_ids).execute
end end
new_vulnerability = create(:vulnerability, :with_findings, project: project) new_vulnerability = create(:vulnerability, :with_findings, project: project)
vulnerability_ids << new_vulnerability.id vulnerability_ids << new_vulnerability.id
expect do expect do
described_class.new(project, vulnerability_ids, security_policy_name).execute described_class.new(project, vulnerability_ids).execute
end.not_to exceed_query_limit(control) end.not_to exceed_query_limit(control)
end end
end end
......
0% 加载中 .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册