Current File : //usr/lib/python3/dist-packages/uaclient/api/u/pro/security/cves/_common/v1.py
import abc
import datetime
import enum
import json
import os
from collections import defaultdict
from functools import lru_cache
from typing import Any, Dict, List, NamedTuple, Optional
from urllib.parse import urljoin

from uaclient import apt, exceptions, http, system, util
from uaclient.api.u.pro.security.fix._common import (
    query_installed_source_pkg_versions,
)
from uaclient.api.u.pro.status.enabled_services.v1 import _enabled_services
from uaclient.config import UAConfig
from uaclient.data_types import (
    DataObject,
    Field,
    FloatDataValue,
    StringDataValue,
)
from uaclient.defaults import (
    VULNERABILITY_CACHE_PATH,
    VULNERABILITY_DATA_CACHE,
    VULNERABILITY_DATA_TMPL,
    VULNERABILITY_DPKG_STATUS_DATE_CACHE,
    VULNERABILITY_ETAG_CACHE,
    VULNERABILITY_RESULT_CACHE,
)
from uaclient.entitlements.fips import FIPSEntitlement, FIPSUpdatesEntitlement
from uaclient.files.data_types import DataObjectFile
from uaclient.files.files import UAFile


class VulnerabilityCacheETag(DataObject):
    fields = [Field("etag", StringDataValue)]

    def __init__(self, etag):
        self.etag = etag


class VulnerabilityDpkgCacheDate(DataObject):
    fields = [Field("dpkg_status_date", FloatDataValue)]

    def __init__(self, dpkg_status_date: float):
        self.dpkg_status_date = dpkg_status_date


@enum.unique
class VulnerabilityStatus(enum.Enum):
    """
    An enum to represent the status of a vulnerability
    """

    NO_FIX_AVAILABLE = "no"
    PARTIAL_FIX_AVAILABLE = "partial"
    FULL_FIX_AVAILABLE = "yes"


class VulnerabilityData:

    def __init__(
        self,
        cfg: UAConfig,
        series: Optional[str] = None,
    ):
        self.cfg = cfg
        self.series = series or system.get_release_info().series
        self._etag = None  # type: Optional[str]
        self._refreshed = False

    @property
    def refreshed(self):
        return self._refreshed

    def _get_cache_data_path(self):
        return os.path.join(
            VULNERABILITY_CACHE_PATH, self.series, VULNERABILITY_DATA_CACHE
        )

    def _get_etag_cache_file(self):
        return DataObjectFile(
            data_object_cls=VulnerabilityCacheETag,
            ua_file=UAFile(
                name=VULNERABILITY_ETAG_CACHE,
                directory=os.path.join(VULNERABILITY_CACHE_PATH, self.series),
                private=False,
            ),
        )

    def _save_cache_data(self, json_data: Dict[str, Any]):
        system.write_file(self._get_cache_data_path(), json.dumps(json_data))

    def _save_etag_cache(self, cache_etag_file: DataObjectFile, etag: str):
        cache_etag_file.write(VulnerabilityCacheETag(etag=etag))

    def _get_etag(self):
        if not self._etag:
            etag_file = self._get_etag_cache_file()
            etag_data = etag_file.read()

            if etag_data:
                self._etag = etag_data.etag

        return self._etag

    def _get_cache_data(self):
        return json.loads(system.load_file(self._get_cache_data_path()))

    def _get_data_url(self):
        data_name = self.series

        enabled_services_names = [
            s.name for s in _enabled_services(self.cfg).enabled_services
        ]
        if FIPSEntitlement.name in enabled_services_names:
            data_name = "fips_{}".format(self.series)
        elif FIPSUpdatesEntitlement.name in enabled_services_names:
            data_name = "fips-updates_{}".format(self.series)

        data_file = VULNERABILITY_DATA_TMPL.format(series=data_name)
        return urljoin(self.cfg.vulnerability_data_url_prefix, data_file)

    def get_published_date(self):
        vulnerability_json_data = self.get()
        return vulnerability_json_data["published_at"]

    def get(self):
        last_etag = self._get_etag()

        try:
            data, etag = http.download_xz_file_from_url(
                cfg=self.cfg, url=self._get_data_url(), etag=last_etag
            )
            self._refreshed = True
        except exceptions.ETagUnchanged:
            return self._get_cache_data()

        json_data = json.loads(data.decode("utf-8"))

        if util.we_are_currently_root():
            self._save_cache_data(json_data)
            if etag:
                self._save_etag_cache(self._get_etag_cache_file(), etag)

        return json_data


def _get_vulnerability_fix_status(
    affected_packages: List[Dict[str, Optional[str]]],
) -> VulnerabilityStatus:
    vulnerability_status = VulnerabilityStatus.NO_FIX_AVAILABLE
    num_fixes = 0
    for pkg in affected_packages:
        if pkg.get("fix_version") is not None:
            num_fixes += 1

    if num_fixes == len(affected_packages):
        vulnerability_status = VulnerabilityStatus.FULL_FIX_AVAILABLE
    elif num_fixes != 0:
        vulnerability_status = VulnerabilityStatus.PARTIAL_FIX_AVAILABLE

    return vulnerability_status


VulnerabilityParserResult = NamedTuple(
    "VulnerabilityParserResult",
    [
        ("vulnerability_data_published_at", Optional[datetime.datetime]),
        ("vulnerabilities_info", Dict[str, Dict[str, Any]]),
    ],
)


class VulnerabilitiesAlreadyFixed:
    def __init__(self):
        self._vulns = defaultdict(set)
        self.priority_counter = defaultdict(
            lambda: defaultdict(int)
        )  # type: Dict[str, Dict[str, int]]

    def add_vulnerability(
        self,
        vuln_name: str,
        vuln_pocket: str,
        vuln_priority: Optional[str] = None,
    ):
        if vuln_name not in self._vulns[vuln_pocket]:
            self._vulns[vuln_pocket].add(vuln_name)

            if vuln_priority:
                self.priority_counter[vuln_pocket][vuln_priority] += 1

    def to_dict(self):
        dict_repr = {
            "count": {},
            "info": {},
        }  # type: Dict[str, Dict[str, Any]]
        for pocket, vulns in self._vulns.items():
            dict_repr["count"][pocket] = len(vulns)
            dict_repr["info"][pocket] = dict(self.priority_counter[pocket])

        return dict_repr


class VulnerabilityParser(metaclass=abc.ABCMeta):
    vulnerability_type = None  # type: str

    @abc.abstractmethod
    def get_package_vulnerabilities(
        self, affected_pkg: Dict[str, Any]
    ) -> Dict[str, Any]:
        pass

    @abc.abstractmethod
    def _post_process_vulnerability_info(
        self,
        vulnerability_info: Dict[str, Any],
        vulnerabilities_data: Dict[str, Any],
    ) -> Dict[str, Any]:
        pass

    def _add_new_vulnerability(
        self,
        packages: Dict[str, Any],
        bin_pkg_name: str,
        bin_pkg_version: str,
        vuln_name: str,
    ):
        packages[bin_pkg_name] = {
            "current_version": bin_pkg_version,
            self.vulnerability_type: [],
        }

    def _add_unfixable_vulnerability(
        self,
        packages: Dict[str, Any],
        bin_pkg_name: str,
        bin_pkg_version: str,
        vuln_name: str,
        vuln_pkg_status: str,
    ):
        if bin_pkg_name not in packages:
            self._add_new_vulnerability(
                packages=packages,
                bin_pkg_name=bin_pkg_name,
                bin_pkg_version=bin_pkg_version,
                vuln_name=vuln_name,
            )

        packages[bin_pkg_name][self.vulnerability_type].append(
            {
                "name": vuln_name,
                "fix_version": None,
                "fix_status": vuln_pkg_status,
                "fix_origin": None,
            }
        )

    def _add_fixable_vulnerability(
        self,
        packages: Dict[str, Any],
        bin_pkg_name: str,
        bin_pkg_version: str,
        vuln_name: str,
        vuln_pkg_status: str,
        vuln_bin_fix_version: str,
        vuln_pocket: str,
    ):
        if bin_pkg_name not in packages:
            self._add_new_vulnerability(
                packages=packages,
                bin_pkg_name=bin_pkg_name,
                bin_pkg_version=bin_pkg_version,
                vuln_name=vuln_name,
            )

        packages[bin_pkg_name][self.vulnerability_type].append(
            {
                "name": vuln_name,
                "fix_version": vuln_bin_fix_version,
                "fix_status": vuln_pkg_status,
                "fix_origin": vuln_pocket,
            }
        )

    def _add_vulnerability_info(
        self,
        vuln_name: str,
        vulnerabilities: Dict[str, Any],
        vuln_info: Dict[str, Any],
        vulns_data: Dict[str, Any],
    ):
        if vuln_name not in vulnerabilities:
            vulnerabilities[vuln_name] = self._post_process_vulnerability_info(
                vulnerability_info=vuln_info,
                vulnerabilities_data=vulns_data,
            )

    def is_vulnerability_not_fixable(
        self,
        vuln_source_fixed_version: str,
        vuln_pkg_status: str,
    ):
        # if the vulnerability fixed version is None,
        # that means that no fix has been published
        # yet.
        if vuln_source_fixed_version is None:
            if vuln_pkg_status != "not-vulnerable":
                return True

        return False

    @lru_cache(maxsize=None)
    def _get_installed_source_pkg_version(self, binary_pkg_name: str):
        out, _ = system.subp(
            [
                "dpkg-query",
                "-W",
                "-f=${source:Version}",
                binary_pkg_name,
            ]
        )

        return out

    def is_vulnerability_valid_but_not_fixable(
        self,
        vuln_bin_fix_version: Optional[str],
        bin_pkg_name: str,
        vuln_source_fixed_version: str,
    ):
        """
        This method checks if we can detect that a vulnerability
        affects a binary package but can't be fixed. This
        situation can happen during a package transition.

        For example, suppose we have this entry for pkg1:

        "pkg1": {
          "source_version": {
            "1.0": {
              "bin-pkg1": "1.0",
              "bin-pkg2": "1.1",
            },
            "1.1": {
              "bin-pkg1": "1.2"
            }
          }
        }

        Notice that version 1.1 doesn't produce bin-pkg2 anymore.
        Therefore, if we detect that a vulnerability is fixable
        by version 1.1, we won't find the binary fixable bersion for
        the bin-pkg2 package.

        If we detect that, we will:

        1. Check if versions of the source package associated with the
           binary package is higher than the vulnerability source fix
           version. If it is, we can say that the system is not vulnerable.
        2. If it is not, then the binary package is affected by the issue, but
           we can't say what the user needs to do to fix it.
        """

        if vuln_bin_fix_version is None:
            installed_source_pkg_version = (
                self._get_installed_source_pkg_version(bin_pkg_name)
            )

            if (
                apt.version_compare(
                    installed_source_pkg_version, vuln_source_fixed_version
                )
                > 0
            ):
                return False
            else:
                return True

        return False

    def vulnerability_affects_system(
        self,
        bin_version: str,
        vuln_bin_fix_version: str,
    ):
        return apt.version_compare(vuln_bin_fix_version, bin_version) > 0

    def _list_binary_packages(self, installed_pkgs_by_source: Dict[str, Any]):
        for source_pkg, binary_pkgs in installed_pkgs_by_source.items():
            for (
                binary_pkg_name,
                binary_installed_version,
            ) in sorted(binary_pkgs.items()):
                yield source_pkg, binary_pkg_name, binary_installed_version

    def get_vulnerabilities_for_installed_pkgs(
        self,
        vulnerabilities_data: Dict[str, Any],
        installed_pkgs_by_source: Dict[str, Dict[str, str]],
    ):
        packages = {}  # type: Dict[str, Any]
        vulnerabilities = {}  # type: Dict[str, Any]

        affected_pkgs = vulnerabilities_data.get("packages", {})
        vulns_info = vulnerabilities_data.get("security_issues", {}).get(
            self.vulnerability_type, {}
        )

        for (
            source_pkg,
            bin_pkg_name,
            bin_pkg_version,
        ) in self._list_binary_packages(installed_pkgs_by_source):
            affected_pkg = affected_pkgs.get(source_pkg, {})
            vuln_source_versions = affected_pkg.get("source_versions", {})

            for vuln_name, vuln in sorted(
                self.get_package_vulnerabilities(affected_pkg).items(),
                key=lambda x: x[0],
            ):
                vuln_info = vulns_info.get(vuln_name, "")
                vuln_source_fixed_version = vuln.get("source_fixed_version")
                vuln_pkg_status = vuln.get("status")

                if self.is_vulnerability_not_fixable(
                    vuln_pkg_status=vuln_pkg_status,
                    vuln_source_fixed_version=vuln_source_fixed_version,
                ):
                    self._add_unfixable_vulnerability(
                        packages=packages,
                        bin_pkg_name=bin_pkg_name,
                        bin_pkg_version=bin_pkg_version,
                        vuln_name=vuln_name,
                        vuln_pkg_status=vuln_pkg_status,
                    )
                    self._add_vulnerability_info(
                        vuln_name=vuln_name,
                        vulnerabilities=vulnerabilities,
                        vuln_info=vuln_info,
                        vulns_data=vulnerabilities_data,
                    )
                    continue

                try:
                    pocket = vuln_source_versions[
                        vuln_source_fixed_version
                    ].get("pocket")
                    vuln_bin_fix_version = (
                        vuln_source_versions[vuln_source_fixed_version]
                        .get("binary_packages", {})
                        .get(bin_pkg_name)
                    )
                except KeyError:
                    # There is bug in the data where some sources are
                    # not present. The Security team is already aware
                    # of this issue and they are handling it
                    continue

                if self.is_vulnerability_valid_but_not_fixable(
                    vuln_bin_fix_version,
                    bin_pkg_name,
                    vuln_source_fixed_version,
                ):
                    self._add_unfixable_vulnerability(
                        packages=packages,
                        bin_pkg_name=bin_pkg_name,
                        bin_pkg_version=bin_pkg_version,
                        vuln_name=vuln_name,
                        vuln_pkg_status="unknown",
                    )
                    self._add_vulnerability_info(
                        vuln_name=vuln_name,
                        vulnerabilities=vulnerabilities,
                        vuln_info=vuln_info,
                        vulns_data=vulnerabilities_data,
                    )

                if vuln_bin_fix_version is None:
                    continue

                if self.vulnerability_affects_system(
                    bin_pkg_version,
                    vuln_bin_fix_version,
                ):
                    self._add_fixable_vulnerability(
                        packages=packages,
                        bin_pkg_name=bin_pkg_name,
                        bin_pkg_version=bin_pkg_version,
                        vuln_name=vuln_name,
                        vuln_pkg_status=vuln_pkg_status,
                        vuln_bin_fix_version=vuln_bin_fix_version,
                        vuln_pocket=pocket,
                    )
                    self._add_vulnerability_info(
                        vuln_name=vuln_name,
                        vulnerabilities=vulnerabilities,
                        vuln_info=vuln_info,
                        vulns_data=vulnerabilities_data,
                    )

        return VulnerabilityParserResult(
            vulnerability_data_published_at=vulnerabilities_data.get(
                "published_at"
            ),
            vulnerabilities_info={
                "packages": packages,
                "vulnerabilities": vulnerabilities,
            },
        )


class VulnerabilityResultCache:

    def __init__(self, vulnerability_type: str, series: Optional[str] = None):
        self.series = series or system.get_release_info().series
        self.vulnerability_type = vulnerability_type
        self.dpkg_status_cache = DataObjectFile(
            data_object_cls=VulnerabilityDpkgCacheDate,
            ua_file=UAFile(
                name=VULNERABILITY_DPKG_STATUS_DATE_CACHE,
                directory=VULNERABILITY_CACHE_PATH,
                private=False,
            ),
        )

    def _get_result_cache_path(self):
        return os.path.join(
            VULNERABILITY_CACHE_PATH,
            self.series,
            self.vulnerability_type,
            VULNERABILITY_RESULT_CACHE,
        )

    def save_result_cache(self, vulnerability_data: Dict[str, Any]):
        if util.we_are_currently_root():
            latest_dpkg_status_time = apt.get_dpkg_status_time() or 0
            self.dpkg_status_cache.write(
                VulnerabilityDpkgCacheDate(
                    dpkg_status_date=latest_dpkg_status_time
                )
            )
            system.write_file(
                self._get_result_cache_path(),
                json.dumps(vulnerability_data),
            )

    def _has_apt_state_changed(self):
        latest_dpkg_status_time = apt.get_dpkg_status_time() or 0
        dpkg_status_cache_obj = self.dpkg_status_cache.read()
        if not dpkg_status_cache_obj:
            return True

        return latest_dpkg_status_time > dpkg_status_cache_obj.dpkg_status_date

    def _cache_result_exists(self):
        return os.path.exists(self._get_result_cache_path())

    def _is_cache_result_valid(self):
        if not self._cache_result_exists():
            return False

        if self._has_apt_state_changed():
            return False

        return True

    def is_cache_valid(self):
        return self._is_cache_result_valid()

    def get_result_cache(self):
        return json.loads(system.load_file(self._get_result_cache_path()))


def get_vulnerabilities(
    parser: VulnerabilityParser,
    cfg: UAConfig,
    series: Optional[str],
):
    vulnerabilities_data = VulnerabilityData(
        cfg=cfg,
        series=series,
    )
    vulnerabilities_result = VulnerabilityResultCache(
        series=series,
        vulnerability_type=parser.vulnerability_type,
    )

    vulnerabilities_json_data = vulnerabilities_data.get()

    if not vulnerabilities_data.refreshed:
        if vulnerabilities_result.is_cache_valid():
            return VulnerabilityParserResult(
                vulnerability_data_published_at=vulnerabilities_data.get_published_date(),  # noqa
                vulnerabilities_info=vulnerabilities_result.get_result_cache(),  # noqa
            )

    installed_pkgs_by_source = query_installed_source_pkg_versions()

    vulnerabilities_parser_result = (
        parser.get_vulnerabilities_for_installed_pkgs(
            vulnerabilities_data=vulnerabilities_json_data,
            installed_pkgs_by_source=installed_pkgs_by_source,
        )
    )

    vulnerabilities_result.save_result_cache(
        vulnerabilities_parser_result.vulnerabilities_info
    )

    return vulnerabilities_parser_result