Skip to content

Commit 3a51fca

Browse files
🎉 Add fix_available to TrivyOperator (#13056)
1 parent 64e1754 commit 3a51fca

File tree

6 files changed

+9
-0
lines changed

6 files changed

+9
-0
lines changed

dojo/tools/trivy_operator/checks_handler.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ def handle_checks(self, labels, checks, test):
4545
static_finding=True,
4646
dynamic_finding=False,
4747
service=service,
48+
fix_available=True,
4849
)
4950
if resource_namespace != "":
5051
finding.tags = resource_namespace

dojo/tools/trivy_operator/clustercompliance_handler.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ def handle_clustercompliance(self, controls, clustercompliance, test):
3737
severity=severity,
3838
static_finding=False,
3939
dynamic_finding=True,
40+
fix_available=True,
4041
)
4142
if vulnerabilityids != []:
4243
finding.unsaved_vulnerability_ids = vulnerabilityids

dojo/tools/trivy_operator/compliance_handler.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ def handle_compliance(self, benchmarkreport, test):
5353
description=description,
5454
static_finding=False,
5555
dynamic_finding=True,
56+
fix_available=True,
5657
)
5758
if check_checkID:
5859
finding.unsaved_vulnerability_ids = [UniformTrivyVulnID().return_uniformed_vulnid(check_checkID)]

dojo/tools/trivy_operator/secrets_handler.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ def handle_secrets(self, labels, secrets, test):
5353
static_finding=True,
5454
dynamic_finding=False,
5555
service=service,
56+
fix_available=True,
5657
)
5758
if resource_namespace != "":
5859
finding.tags = resource_namespace

dojo/tools/trivy_operator/vulnerability_handler.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ def handle_vulns(self, labels, vulnerabilities, test):
2929
severity = TRIVY_SEVERITIES[vulnerability.get("severity")]
3030
references = vulnerability.get("primaryLink")
3131
mitigation = vulnerability.get("fixedVersion")
32+
fix_available = True
33+
if vulnerability.get("fixedVersion") == "":
34+
fix_available = False
3235
package_name = vulnerability.get("resource")
3336
package_version = vulnerability.get("installedVersion")
3437
cvssv3_score = vulnerability.get("score")
@@ -84,6 +87,7 @@ def handle_vulns(self, labels, vulnerabilities, test):
8487
service=service,
8588
file_path=file_path,
8689
tags=[tag for tag in finding_tags if tag != ""],
90+
fix_available=fix_available,
8791
)
8892
if vuln_id:
8993
finding.unsaved_vulnerability_ids = [UniformTrivyVulnID().return_uniformed_vulnid(vuln_id)]

unittests/tools/test_trivy_operator_parser.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,7 @@ def test_vulnerabilityreport_single_vulns(self):
6161
self.assertEqual("CVE-2023-23914 curl 7.87.0-r1", finding.title)
6262
self.assertEqual("7.87.0-r2", finding.mitigation)
6363
self.assertEqual(4.2, finding.cvssv3_score)
64+
self.assertEqual(True, finding.fix_available)
6465

6566
def test_vulnerabilityreport_many(self):
6667
with sample_path("vulnerabilityreport_many.json").open(encoding="utf-8") as test_file:

0 commit comments

Comments
 (0)