5
5
"fmt"
6
6
"io"
7
7
"io/fs"
8
+ "maps"
9
+ "slices"
8
10
"strings"
9
11
10
12
"github.com/open-policy-agent/opa/v1/ast"
@@ -13,6 +15,7 @@ import (
13
15
14
16
"github.com/aquasecurity/trivy/pkg/log"
15
17
"github.com/aquasecurity/trivy/pkg/set"
18
+ "github.com/aquasecurity/trivy/pkg/version/doc"
16
19
)
17
20
18
21
var builtinNamespaces = set .New ("builtin" , "defsec" , "appshield" )
@@ -27,6 +30,10 @@ func IsBuiltinNamespace(namespace string) bool {
27
30
})
28
31
}
29
32
33
+ func getModuleNamespace (module * ast.Module ) string {
34
+ return strings .TrimPrefix (module .Package .Path .String (), "data." )
35
+ }
36
+
30
37
func IsRegoFile (name string ) bool {
31
38
return strings .HasSuffix (name , bundle .RegoExt ) && ! strings .HasSuffix (name , "_test" + bundle .RegoExt )
32
39
}
@@ -99,9 +106,7 @@ func (s *Scanner) LoadPolicies(srcFS fs.FS) error {
99
106
if err != nil {
100
107
return fmt .Errorf ("failed to load rego checks from %s: %w" , s .policyDirs , err )
101
108
}
102
- for name , policy := range loaded {
103
- s .policies [name ] = policy
104
- }
109
+ maps .Copy (s .policies , loaded )
105
110
s .logger .Debug ("Checks from disk are loaded" , log .Int ("count" , len (loaded )))
106
111
}
107
112
@@ -110,9 +115,7 @@ func (s *Scanner) LoadPolicies(srcFS fs.FS) error {
110
115
if err != nil {
111
116
return fmt .Errorf ("failed to load rego checks from reader(s): %w" , err )
112
117
}
113
- for name , policy := range loaded {
114
- s .policies [name ] = policy
115
- }
118
+ maps .Copy (s .policies , loaded )
116
119
s .logger .Debug ("Checks from readers are loaded" , log .Int ("count" , len (loaded )))
117
120
}
118
121
@@ -193,13 +196,13 @@ func (s *Scanner) findMatchedEmbeddedCheck(badPolicy *ast.Module) *ast.Module {
193
196
}
194
197
}
195
198
196
- badPolicyMeta , err := metadataFromRegoModule (badPolicy )
199
+ badPolicyMeta , err := MetadataFromAnnotations (badPolicy )
197
200
if err != nil {
198
201
return nil
199
202
}
200
203
201
204
for _ , embeddedCheck := range s .embeddedChecks {
202
- meta , err := metadataFromRegoModule (embeddedCheck )
205
+ meta , err := MetadataFromAnnotations (embeddedCheck )
203
206
if err != nil {
204
207
continue
205
208
}
@@ -230,6 +233,9 @@ func (s *Scanner) prunePoliciesWithError(compiler *ast.Compiler) error {
230
233
}
231
234
232
235
func (s * Scanner ) compilePolicies (srcFS fs.FS , paths []string ) error {
236
+ for path , module := range s .policies {
237
+ s .handleModulesMetadata (path , module )
238
+ }
233
239
234
240
schemaSet , err := BuildSchemaSetFromPolicies (s .policies , paths , srcFS , s .customSchemas )
235
241
if err != nil {
@@ -249,54 +255,106 @@ func (s *Scanner) compilePolicies(srcFS fs.FS, paths []string) error {
249
255
}
250
256
return s .compilePolicies (srcFS , paths )
251
257
}
252
- retriever := NewMetadataRetriever (compiler )
253
258
254
- if err := s .filterModules (retriever ); err != nil {
255
- return err
259
+ s .retriever = NewMetadataRetriever (compiler )
260
+
261
+ if err := s .filterModules (); err != nil {
262
+ return fmt .Errorf ("filter modules: %w" , err )
256
263
}
257
264
s .compiler = compiler
258
- s .retriever = retriever
259
265
return nil
260
266
}
261
267
262
- func (s * Scanner ) filterModules (retriever * MetadataRetriever ) error {
268
+ func (s * Scanner ) handleModulesMetadata (path string , module * ast.Module ) {
269
+ if moduleHasLegacyInputFormat (module ) {
270
+ s .logger .Warn (
271
+ "Module has legacy input format - please update to use annotations" ,
272
+ log .FilePath (module .Package .Location .File ),
273
+ log .String ("details" , doc .URL ("/docs/scanner/misconfiguration/custom" , "input" )),
274
+ )
275
+ }
276
+
277
+ if moduleHasLegacyMetadataFormat (module ) {
278
+ s .logger .Warn (
279
+ "Module has legacy metadata format - please update to use annotations" ,
280
+ log .FilePath (module .Package .Location .File ),
281
+ log .String ("details" , doc .URL ("/docs/scanner/misconfiguration/custom" , "metadata" )),
282
+ )
283
+ return
284
+ }
285
+
286
+ metadata , err := MetadataFromAnnotations (module )
287
+ if err != nil {
288
+ s .logger .Error (
289
+ "Failed to retrieve metadata from annotations" ,
290
+ log .FilePath (module .Package .Location .File ),
291
+ log .Err (err ),
292
+ )
293
+ return
294
+ }
263
295
296
+ if metadata != nil {
297
+ s .moduleMetadata [path ] = metadata
298
+ }
299
+ }
300
+
301
+ // moduleHasLegacyMetadataFormat checks if the module has a legacy metadata format.
302
+ // Returns true if the metadata is represented as a “__rego_metadata__” rule,
303
+ // which was used before annotations were introduced.
304
+ func moduleHasLegacyMetadataFormat (module * ast.Module ) bool {
305
+ return slices .ContainsFunc (module .Rules , func (rule * ast.Rule ) bool {
306
+ return rule .Head .Name .Equal (ast .Var ("__rego_metadata__" ))
307
+ })
308
+ }
309
+
310
+ // moduleHasLegacyInputFormat checks if the module has a legacy input format.
311
+ // Returns true if the input is represented as a “__rego_input__” rule,
312
+ // which was used before annotations were introduced.
313
+ func moduleHasLegacyInputFormat (module * ast.Module ) bool {
314
+ return slices .ContainsFunc (module .Rules , func (rule * ast.Rule ) bool {
315
+ return rule .Head .Name .Equal (ast .Var ("__rego_input__" ))
316
+ })
317
+ }
318
+
319
+ // filterModules filters the Rego modules based on metadata.
320
+ func (s * Scanner ) filterModules () error {
264
321
filtered := make (map [string ]* ast.Module )
265
322
for name , module := range s .policies {
266
- meta , err := retriever . RetrieveMetadata (context .TODO (), module )
323
+ metadata , err := s . metadataForModule (context .Background (), name , module , nil )
267
324
if err != nil {
268
- return err
325
+ return fmt . Errorf ( "retrieve metadata for module %s: %w" , name , err )
269
326
}
270
327
271
- if ! meta .hasAnyFramework (s .frameworks ) {
272
- continue
273
- }
274
-
275
- if IsBuiltinNamespace (getModuleNamespace (module )) {
276
- if s .disabledCheckIDs .Contains (meta .ID ) { // ignore builtin disabled checks
277
- continue
278
- }
279
- }
280
-
281
- if len (meta .InputOptions .Selectors ) == 0 {
282
- if ! meta .Library {
283
- s .logger .Warn (
284
- "Module has no input selectors - it will be loaded for all inputs!" ,
285
- log .FilePath (module .Package .Location .File ),
286
- log .String ("module" , name ),
287
- )
288
- }
328
+ if s .isModuleApplicable (module , metadata , name ) {
289
329
filtered [name ] = module
290
- continue
291
330
}
292
-
293
- filtered [name ] = module
294
331
}
295
332
296
333
s .policies = filtered
297
334
return nil
298
335
}
299
336
337
+ func (s * Scanner ) isModuleApplicable (module * ast.Module , metadata * StaticMetadata , name string ) bool {
338
+ if ! metadata .hasAnyFramework (s .frameworks ) {
339
+ return false
340
+ }
341
+
342
+ // ignore disabled built-in checks
343
+ if IsBuiltinNamespace (getModuleNamespace (module )) && s .disabledCheckIDs .Contains (metadata .ID ) {
344
+ return false
345
+ }
346
+
347
+ if len (metadata .InputOptions .Selectors ) == 0 && ! metadata .Library {
348
+ s .logger .Warn (
349
+ "Module has no input selectors - it will be loaded for all inputs" ,
350
+ log .FilePath (module .Package .Location .File ),
351
+ log .String ("module" , name ),
352
+ )
353
+ }
354
+
355
+ return true
356
+ }
357
+
300
358
func ParseRegoModule (name , input string ) (* ast.Module , error ) {
301
359
return ast .ParseModuleWithOpts (name , input , ast.ParserOptions {
302
360
ProcessAnnotation : true ,
0 commit comments