mirror of
https://github.com/zama-ai/concrete.git
synced 2026-02-08 19:44:57 -05:00
66
script/actions_utils/parse_pip_audit_vulns.py
Normal file
66
script/actions_utils/parse_pip_audit_vulns.py
Normal file
@@ -0,0 +1,66 @@
|
||||
"""Script to parse output of pip-audit"""
|
||||
|
||||
import argparse
|
||||
import json
|
||||
import sys
|
||||
from pathlib import Path
|
||||
from typing import List
|
||||
|
||||
|
||||
def format_vulnerability(pkg_name, pkg_version, vuln_info: dict) -> List[str]:
|
||||
"""Format a vulnerability info."""
|
||||
|
||||
vuln_strs = [
|
||||
f"{pkg_name}({pkg_version}) - ID: {vuln['id']} "
|
||||
f"fixed in {', '.join(vuln['fix_versions'])}"
|
||||
for vuln in vuln_info
|
||||
]
|
||||
return vuln_strs
|
||||
|
||||
|
||||
# Cannot have a backslash in f-string, so create a constant for newline
|
||||
NEW_LINE = "\n"
|
||||
|
||||
|
||||
def main(args):
|
||||
"""Entry point"""
|
||||
|
||||
vulns_json_path = Path(args.vulns_json).resolve()
|
||||
json_content = []
|
||||
with open(vulns_json_path, "r", encoding="utf-8") as f:
|
||||
json_content.extend(f.readlines())
|
||||
|
||||
report_path = Path(args.vulns_report).resolve()
|
||||
with open(report_path, "w", encoding="utf-8") as report:
|
||||
if json_content:
|
||||
report.write("Found the following vulnerabilities:\n")
|
||||
assert len(json_content) == 1
|
||||
json_data = json.loads(json_content[0])
|
||||
# print(json.dumps(json_data, indent=4))
|
||||
for entry in json_data:
|
||||
vuln_entries = entry.get("vulns", [])
|
||||
if vuln_entries:
|
||||
formatted_vulns = format_vulnerability(
|
||||
entry["name"], entry["version"], vuln_entries
|
||||
)
|
||||
report.write(f"- {f'{NEW_LINE}- '.join(formatted_vulns)}\n")
|
||||
sys.exit(1)
|
||||
else:
|
||||
report.write("No vulnerabilities found.\n")
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
parser = argparse.ArgumentParser("pip-audit output parser", allow_abbrev=False)
|
||||
|
||||
parser.add_argument(
|
||||
"--vulns-json", type=str, required=True, help="The path to the pip-audit json output"
|
||||
)
|
||||
parser.add_argument(
|
||||
"--vulns-report",
|
||||
type=str,
|
||||
required=True,
|
||||
help="Path to the file to which to write the vulneratbility report",
|
||||
)
|
||||
|
||||
cli_args = parser.parse_args()
|
||||
main(cli_args)
|
||||
Reference in New Issue
Block a user