proj_name stringclasses 131
values | relative_path stringlengths 30 228 | class_name stringlengths 1 68 | func_name stringlengths 1 48 | masked_class stringlengths 78 9.82k | func_body stringlengths 46 9.61k | len_input int64 29 2.01k | len_output int64 14 1.94k | total int64 55 2.05k | relevant_context stringlengths 0 38.4k |
|---|---|---|---|---|---|---|---|---|---|
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/CoordinatesPolicyEvaluator.java | CoordinatesPolicyEvaluator | parseCoordinatesDefinition | class CoordinatesPolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(CoordinatesPolicyEvaluator.class);
private static final Pattern VERSION_OPERATOR_PATTERN = Pattern.compile("^(?<operator>[<>]=?|[!=]=)\\s*");
/**
* {@inheritDoc}
*/
@Overr... |
if (condition.getValue() == null) {
return new Coordinates(null, null, null);
}
final JSONObject def = new JSONObject(condition.getValue());
return new Coordinates(
def.optString("group", null),
def.optString("name", null),
def... | 1,197 | 89 | 1,286 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/CpePolicyEvaluator.java | CpePolicyEvaluator | evaluate | class CpePolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(CpePolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.CPE;
}
/**
* {... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
for (final PolicyCondition condition: super.extractSupportedConditions(policy)) {
LOGGER.debug("Evaluating component (" + component.getUuid() + ") against policy condition (" + condition.getUuid() + ")");
if (P... | 139 | 214 | 353 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/CwePolicyEvaluator.java | CwePolicyEvaluator | evaluate | class CwePolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(CwePolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.CWE;
}
/**
* {... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
final List<PolicyCondition> policyConditions = super.extractSupportedConditions(policy);
if (policyConditions.isEmpty()) {
return violations;
}
for (final Vulnerability vulnerability : qm.getAllVu... | 444 | 200 | 644 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/LicenseGroupPolicyEvaluator.java | TemporaryLicenseGroup | evaluate | class TemporaryLicenseGroup extends LicenseGroup {
private static final long serialVersionUID = -1268650463377651000L;
}
/**
* Whether a condition provides a positive list or negative list of licenses.
*
* <p>
* Configuring a LicenseGroupPolicy allows the user to specify conditions... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
final List<PolicyCondition> policyConditions = super.extractSupportedConditions(policy);
if (policyConditions.isEmpty()) {
return violations;
}
final SpdxExpression expression = getSpdxExpressionF... | 457 | 254 | 711 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/LicensePolicyEvaluator.java | LicensePolicyEvaluator | evaluate | class LicensePolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(LicensePolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.LICENSE;
}
... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
final List<PolicyCondition> policyConditions = super.extractSupportedConditions(policy);
if (policyConditions.isEmpty()) {
return violations;
}
// use spdx expression checking logic from the licen... | 137 | 340 | 477 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/Matcher.java | Matcher | matches | class Matcher {
private Matcher() {
// Utility-class should not be instantiated
}
/**
* Check if the given value matches with the conditionString. If the
* conditionString is not a regular expression, turn it into one.
*
* @param value The value to match against
*... |
if (value == null && conditionString == null) {
return true;
}
if (value == null ^ conditionString == null) {
return false;
}
conditionString = conditionString.replace("*", ".*").replace("..*", ".*");
if (!conditionString.startsWith("^") && !condi... | 155 | 155 | 310 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/PackageURLPolicyEvaluator.java | PackageURLPolicyEvaluator | evaluate | class PackageURLPolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(PackageURLPolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.PACKAGE_URL;
... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
for (final PolicyCondition condition: super.extractSupportedConditions(policy)) {
LOGGER.debug("Evaluating component (" + component.getUuid() + ") against policy condition (" + condition.getUuid() + ")");
final... | 142 | 241 | 383 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/PolicyEngine.java | PolicyEngine | createPolicyViolations | class PolicyEngine {
private static final Logger LOGGER = Logger.getLogger(PolicyEngine.class);
private final List<PolicyEvaluator> evaluators = new ArrayList<>();
public PolicyEngine() {
evaluators.add(new SeverityPolicyEvaluator());
evaluators.add(new CoordinatesPolicyEvaluator());
... |
final List<PolicyViolation> policyViolations = new ArrayList<>();
for (PolicyConditionViolation pcv : pcvList) {
final PolicyViolation pv = new PolicyViolation();
pv.setComponent(pcv.getComponent());
pv.setPolicyCondition(pcv.getPolicyCondition());
pv.set... | 1,602 | 157 | 1,759 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/SeverityPolicyEvaluator.java | SeverityPolicyEvaluator | evaluate | class SeverityPolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(SeverityPolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.SEVERITY;
}
... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
final List<PolicyCondition> policyConditions = super.extractSupportedConditions(policy);
if (policyConditions.isEmpty()) {
return violations;
}
//final Component component = qm.getObjectById(Compone... | 142 | 301 | 443 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/SwidTagIdPolicyEvaluator.java | SwidTagIdPolicyEvaluator | evaluate | class SwidTagIdPolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(SwidTagIdPolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.SWID_TAGID;
... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
for (final PolicyCondition condition: super.extractSupportedConditions(policy)) {
LOGGER.debug("Evaluating component (" + component.getUuid() + ") against policy condition (" + condition.getUuid() + ")");
if (P... | 146 | 218 | 364 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/VersionDistancePolicyEvaluator.java | VersionDistancePolicyEvaluator | evaluate | class VersionDistancePolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(VersionDistancePolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.VERS... |
final var violations = new ArrayList<PolicyConditionViolation>();
if (component.getPurl() == null || component.getVersion() == null) {
return violations;
}
final List<PolicyCondition> conditions = super.extractSupportedConditions(policy);
if (conditions.isEmpty()) ... | 915 | 441 | 1,356 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/VersionPolicyEvaluator.java | VersionPolicyEvaluator | evaluate | class VersionPolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(VersionPolicyEvaluator.class);
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.VERSION;
}
@Override
public List<PolicyCondi... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
final List<PolicyCondition> policyConditions = super.extractSupportedConditions(policy);
if (policyConditions.isEmpty()) {
return violations;
}
final var componentVersion = new ComponentVersion(co... | 345 | 252 | 597 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/policy/VulnerabilityIdPolicyEvaluator.java | VulnerabilityIdPolicyEvaluator | evaluate | class VulnerabilityIdPolicyEvaluator extends AbstractPolicyEvaluator {
private static final Logger LOGGER = Logger.getLogger(VulnerabilityIdPolicyEvaluator.class);
/**
* {@inheritDoc}
*/
@Override
public PolicyCondition.Subject supportedSubject() {
return PolicyCondition.Subject.VULN... |
final List<PolicyConditionViolation> violations = new ArrayList<>();
final List<PolicyCondition> policyConditions = super.extractSupportedConditions(policy);
if (policyConditions.isEmpty()) {
return violations;
}
for (final Vulnerability vulnerability : qm.getAllVuln... | 149 | 277 | 426 | <methods>public non-sealed void <init>() ,public void setQueryManager(org.dependencytrack.persistence.QueryManager) <variables>protected org.dependencytrack.persistence.QueryManager qm |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/AbstractConfigPropertyResource.java | AbstractConfigPropertyResource | updatePropertyValueInternal | class AbstractConfigPropertyResource extends AlpineResource {
private final Logger LOGGER = Logger.getLogger(this.getClass()); // Use the classes that extend this, not this class itself
static final String ENCRYPTED_PLACEHOLDER = "HiddenDecryptedPropertyPlaceholder";
Response updatePropertyValue(QueryMana... |
if (property.getPropertyType() == IConfigProperty.PropertyType.BOOLEAN) {
property.setPropertyValue(String.valueOf(BooleanUtil.valueOf(json.getPropertyValue())));
} else if (property.getPropertyType() == IConfigProperty.PropertyType.INTEGER) {
try {
int propertyV... | 310 | 1,147 | 1,457 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/AccessControlResource.java | AccessControlResource | addMapping | class AccessControlResource extends AlpineResource {
private static final Logger LOGGER = Logger.getLogger(AccessControlResource.class);
@GET
@Path("/team/{uuid}")
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns the projects assigned to the specified team",
... |
final Validator validator = super.getValidator();
failOnValidationError(
validator.validateProperty(request, "team"),
validator.validateProperty(request, "project")
);
try (QueryManager qm = new QueryManager()) {
final Team team = qm.getObject... | 1,242 | 272 | 1,514 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/AnalysisResource.java | AnalysisResource | retrieveAnalysis | class AnalysisResource extends AlpineResource {
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Retrieves an analysis trail",
response = Analysis.class,
notes = "<p>Requires permission <strong>VIEW_VULNERABILITY</strong></p>"
)
@ApiResponses(va... |
failOnValidationError(
new ValidationTask(RegexSequence.Pattern.UUID, projectUuid, "Project is not a valid UUID", false), // this is optional
new ValidationTask(RegexSequence.Pattern.UUID, componentUuid, "Component is not a valid UUID"),
new ValidationTask(RegexS... | 1,366 | 414 | 1,780 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/BadgeResource.java | BadgeResource | getProjectPolicyViolationsBadge | class BadgeResource extends AlpineResource {
private static final String SVG_MEDIA_TYPE = "image/svg+xml";
private boolean isBadgeSupportEnabled(final QueryManager qm) {
ConfigProperty property = qm.getConfigProperty(
GENERAL_BADGE_ENABLED.getGroupName(), GENERAL_BADGE_ENABLED.getPrope... |
try (QueryManager qm = new QueryManager()) {
if (isBadgeSupportEnabled(qm)) {
final Project project = qm.getProject(name, version);
if (project != null) {
final ProjectMetrics metrics = qm.getMostRecentProjectMetrics(project);
... | 1,560 | 172 | 1,732 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/CalculatorResource.java | CalculatorResource | getOwaspRRScores | class CalculatorResource extends AlpineResource {
@GET
@Path("/cvss")
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns the CVSS base score, impact sub-score and exploitability sub-score",
response = Score.class
)
@ApiResponses(value = {
@... |
try {
final OwaspRiskRating owaspRiskRating = OwaspRiskRating.fromVector(vector);
final us.springett.owasp.riskrating.Score score = owaspRiskRating.calculateScore();
return Response.ok(score).build();
} catch (IllegalArgumentException | MissingFactorException e) {
... | 454 | 123 | 577 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/ComponentPropertyResource.java | ComponentPropertyResource | getProperties | class ComponentPropertyResource extends AbstractConfigPropertyResource {
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns a list of all ComponentProperties for the specified component",
response = ComponentProperty.class,
responseContainer = "Li... |
try (QueryManager qm = new QueryManager(getAlpineRequest())) {
final Component component = qm.getObjectByUuid(Component.class, uuid);
if (component != null) {
if (qm.hasAccess(super.getPrincipal(), component.getProject())) {
final List<ComponentProper... | 1,625 | 329 | 1,954 | <methods><variables>static final java.lang.String ENCRYPTED_PLACEHOLDER,private final Logger LOGGER |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/ConfigPropertyResource.java | ConfigPropertyResource | updateConfigProperty | class ConfigPropertyResource extends AbstractConfigPropertyResource {
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns a list of all ConfigProperties for the specified groupName",
response = ConfigProperty.class,
responseContainer = "List",
... |
final Validator validator = super.getValidator();
for (ConfigProperty item: list) {
failOnValidationError(
validator.validateProperty(item, "groupName"),
validator.validateProperty(item, "propertyName"),
validator.validateProperty(... | 891 | 184 | 1,075 | <methods><variables>static final java.lang.String ENCRYPTED_PLACEHOLDER,private final Logger LOGGER |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/CweResource.java | CweResource | getCwe | class CweResource extends AlpineResource {
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns a list of all CWEs",
response = Cwe.class,
responseContainer = "List",
responseHeaders = @ResponseHeader(name = TOTAL_COUNT_HEADER, response ... |
final Cwe cwe = CweResolver.getInstance().lookup(cweId);
if (cwe != null) {
return Response.ok(cwe).build();
} else {
return Response.status(Response.Status.NOT_FOUND).entity("The CWE could not be found.").build();
}
| 403 | 84 | 487 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/EventResource.java | EventResource | isTokenBeingProcessed | class EventResource extends AlpineResource {
@GET
@Path("/token/{uuid}")
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Determines if there are any tasks associated with the token that are being processed, or in the queue to be processed.",
response = IsTokenBeing... |
final boolean value = Event.isEventBeingProcessed(UUID.fromString(uuid));
IsTokenBeingProcessedResponse response = new IsTokenBeingProcessedResponse();
response.setProcessing(value);
return Response.ok(response).build();
| 352 | 63 | 415 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/IntegrationResource.java | IntegrationResource | getAllEcosystems | class IntegrationResource extends AlpineResource {
@GET
@Path("/osv/ecosystem")
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns a list of all ecosystems in OSV",
response = String.class,
responseContainer = "List",
notes = "<p>Requir... |
OsvDownloadTask osvDownloadTask = new OsvDownloadTask();
final List<String> ecosystems = osvDownloadTask.getEcosystems();
return Response.ok(ecosystems).build();
| 466 | 54 | 520 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/LdapResource.java | LdapResource | retrieveLdapGroups | class LdapResource extends AlpineResource {
private static final Logger LOGGER = Logger.getLogger(LdapResource.class);
@GET
@Path("/groups")
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns the DNs of all accessible groups within the directory",
respons... |
if (!LdapConnectionWrapper.LDAP_CONFIGURED) {
return Response.ok().build();
}
if (getAlpineRequest().getFilter() == null) {
return Response.status(Response.Status.NO_CONTENT).build();
}
List<String> groups = CacheManager.getInstance().get(ArrayList.class,... | 1,463 | 458 | 1,921 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/LicenseResource.java | LicenseResource | createLicense | class LicenseResource extends AlpineResource {
private static final Logger LOGGER = Logger.getLogger(LicenseResource.class);
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns a list of all licenses with complete metadata for each license",
response = Li... |
final Validator validator = super.getValidator();
failOnValidationError(
validator.validateProperty(jsonLicense, "name"),
validator.validateProperty(jsonLicense, "licenseId")
);
try (QueryManager qm = new QueryManager()) {
License license = qm... | 1,273 | 200 | 1,473 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/PolicyConditionResource.java | PolicyConditionResource | createPolicyCondition | class PolicyConditionResource extends AlpineResource {
@PUT
@Path("/{uuid}/condition")
@Consumes(MediaType.APPLICATION_JSON)
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Creates a new policy condition",
response = PolicyCondition.class,
code = 20... |
final Validator validator = super.getValidator();
failOnValidationError(
validator.validateProperty(jsonPolicyCondition, "value")
);
try (QueryManager qm = new QueryManager()) {
Policy policy = qm.getObjectByUuid(Policy.class, uuid);
if (policy !=... | 1,003 | 193 | 1,196 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/PolicyViolationResource.java | PolicyViolationResource | getViolations | class PolicyViolationResource extends AlpineResource {
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns a list of all policy violations for the entire portfolio",
response = PolicyViolation.class,
responseContainer = "List",
response... |
try (QueryManager qm = new QueryManager(getAlpineRequest())) {
final PaginatedResult result = qm.getPolicyViolations(suppressed);
return Response.ok(detachViolations(qm, result.getList(PolicyViolation.class)))
.header(TOTAL_COUNT_HEADER, result.getTotal())
... | 1,688 | 99 | 1,787 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/SearchResource.java | SearchResource | aggregateSearch | class SearchResource extends AlpineResource {
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Processes and returns search results",
response = SearchResult.class,
notes = "<p>Requires permission <strong>VIEW_PORTFOLIO</strong></p>"
)
@ApiRespo... |
final SearchManager searchManager = new SearchManager();
final SearchResult searchResult = searchManager.searchIndices(query, 1000);
return Response.ok(searchResult).build();
| 1,837 | 50 | 1,887 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/TagResource.java | TagResource | getTags | class TagResource extends AlpineResource {
@GET
@Path("/{policyUuid}")
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Returns a list of all tags associated with a given policy",
response = Tag.class,
responseContainer = "List",
responseHead... |
try (QueryManager qm = new QueryManager(getAlpineRequest())) {
final PaginatedResult result = qm.getTags(policyUuid);
return Response.ok(result.getObjects()).header(TOTAL_COUNT_HEADER, result.getTotal()).build();
}
| 260 | 75 | 335 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/ViolationAnalysisResource.java | ViolationAnalysisResource | updateAnalysis | class ViolationAnalysisResource extends AlpineResource {
@GET
@Produces(MediaType.APPLICATION_JSON)
@ApiOperation(
value = "Retrieves a violation analysis trail",
response = ViolationAnalysis.class,
notes = "<p>Requires permission <strong>VIEW_POLICY_VIOLATION</strong></... |
final Validator validator = getValidator();
failOnValidationError(
validator.validateProperty(request, "component"),
validator.validateProperty(request, "policyViolation"),
validator.validateProperty(request, "analysisState"),
validator.va... | 746 | 766 | 1,512 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/exception/ConstraintViolationExceptionMapper.java | ConstraintViolationExceptionMapper | mapToValidationErrors | class ConstraintViolationExceptionMapper implements ExceptionMapper<ConstraintViolationException> {
@Override
public Response toResponse(final ConstraintViolationException exception) {
final List<ValidationError> errors = mapToValidationErrors(exception.getConstraintViolations());
return Respo... |
final List<ValidationError> errors = new ArrayList<>(violations.size());
for (final ConstraintViolation<?> violation : violations) {
if (violation.getPropertyPath().iterator().next().getName() != null) {
final String path = violation.getPropertyPath() != null ? violation.ge... | 327 | 207 | 534 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/exception/JsonMappingExceptionMapper.java | JsonMappingExceptionMapper | createDetail | class JsonMappingExceptionMapper implements ExceptionMapper<JsonMappingException> {
@Override
public Response toResponse(final JsonMappingException exception) {
final var problemDetails = new ProblemDetails();
problemDetails.setStatus(400);
problemDetails.setTitle("The provided JSON pay... |
if (!(exception.getCause() instanceof StreamConstraintsException)) {
return exception.getMessage();
}
final JsonMappingException.Reference reference = exception.getPath().get(0);
if (Objects.equals(reference.getFrom(), BomSubmitRequest.class)
&& "bom".equals(ref... | 170 | 282 | 452 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/misc/Badger.java | Badger | generateViolations | class Badger {
private static final PebbleEngine ENGINE = new PebbleEngine.Builder().newLineTrimming(false).build();
private static final PebbleTemplate PROJECT_VULNS_TEMPLATE = ENGINE.getTemplate("templates/badge/project-vulns.peb");
private static final PebbleTemplate PROJECT_VULNS_NONE_TEMPLATE = ENGINE... |
final Map<String, Object> context = new HashMap<>();
context.put("roundedPixels", "3");
if (metrics == null) {
return writeSvg(PROJECT_VIOLATIONS_NO_METRICS_TEMPLATE, context);
} else if (metrics.getPolicyViolationsTotal() > 0) {
context.put("fail", String.valueO... | 720 | 218 | 938 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/serializers/CweDeserializer.java | CweDeserializer | deserialize | class CweDeserializer extends JsonDeserializer<List<Integer>> {
@Override
public List<Integer> deserialize(JsonParser jsonParser, DeserializationContext ctx) throws IOException {<FILL_FUNCTION_BODY>}
} |
if (jsonParser.getCurrentToken() == JsonToken.START_ARRAY) {
final List<Integer> cweIds = new ArrayList<>();
while(jsonParser.nextToken() != JsonToken.END_ARRAY) {
if (jsonParser.getCurrentToken() == JsonToken.START_OBJECT) {
final Cwe cwe = jsonParse... | 62 | 157 | 219 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/serializers/CweSerializer.java | CweSerializer | serialize | class CweSerializer extends JsonSerializer<List<Integer>> {
@Override
public void serialize(List<Integer> cweIds, JsonGenerator jsonGenerator, SerializerProvider serializerProvider)
throws IOException, JsonProcessingException {<FILL_FUNCTION_BODY>}
} |
jsonGenerator.writeStartArray();
for (final Integer cweId: cweIds) {
final Cwe cwe = CweResolver.getInstance().lookup(cweId);
if (cwe != null) {
jsonGenerator.writeObject(cwe);
}
}
jsonGenerator.writeEndArray();
| 70 | 86 | 156 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/vo/AnalysisRequest.java | AnalysisRequest | getAnalysisJustification | class AnalysisRequest {
@Pattern(regexp = "^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$", message = "The project must be a valid 36 character UUID")
private final String project;
@NotNull
@Pattern(regexp = "^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$", message = "T... |
if (analysisJustification == null) {
return AnalysisJustification.NOT_SET;
} else {
return analysisJustification;
}
| 954 | 40 | 994 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/resources/v1/vo/ViolationAnalysisRequest.java | ViolationAnalysisRequest | getAnalysisState | class ViolationAnalysisRequest {
@NotNull
@Pattern(regexp = "^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$", message = "The component must be a valid 36 character UUID")
private final String component;
@NotNull
@Pattern(regexp = "^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0... |
if (analysisState == null) {
return ViolationAnalysisState.NOT_SET;
} else {
return analysisState;
}
| 563 | 40 | 603 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/ComponentIndexer.java | ComponentIndexer | reindex | class ComponentIndexer extends IndexManager implements ObjectIndexer<ComponentDocument> {
private static final Logger LOGGER = Logger.getLogger(ComponentIndexer.class);
private static final ComponentIndexer INSTANCE = new ComponentIndexer();
static ComponentIndexer getInstance() {
return INSTANCE;... |
LOGGER.info("Starting reindex task. This may take some time.");
super.reindex();
long docsIndexed = 0;
final long startTimeNs = System.nanoTime();
try (final QueryManager qm = new QueryManager()) {
List<ComponentDocument> docs = fetchNext(qm, null);
whil... | 900 | 206 | 1,106 | <methods>public void addDocument(Document) ,public static void checkIndexesConsistency() ,public void close() ,public void commit() ,public static void delete(org.dependencytrack.search.IndexManager.IndexType) ,public void deleteDocuments(Term) ,public static void ensureIndexesExists() ,public org.dependencytrack.searc... |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/FuzzyVulnerableSoftwareSearchManager.java | SearchTerm | fuzzyAnalysis | class SearchTerm {
private String product;
private String vendor;
public SearchTerm(String vendor,String product) {
this.product = product;
this.vendor = StringUtils.isBlank(vendor) ? "*" : vendor;
}
@Override
public boolean equals(Object o) {
... |
List<VulnerableSoftware> fuzzyList = Collections.emptyList();
if (component.getPurl() == null || !excludeComponentsWithPurl || "deb".equals(component.getPurl().getType())) {
Set<SearchTerm> searches = new LinkedHashSet<>();
try {
boolean attemptLuceneFuzzing = t... | 271 | 846 | 1,117 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/IndexManagerFactory.java | IndexManagerFactory | getIndexManager | class IndexManagerFactory {
public static ObjectIndexer<? extends SearchDocument> getIndexManager(final IndexEvent event) {
if (Config.isUnitTestsEnabled()) {
return new ObjectIndexer<DummyDocument>() {
@Override
public String[] getSearchFields() { return new Str... |
if (Project.class == clazz) {
return ProjectIndexer.getInstance();
} else if (Component.class == clazz) {
return ComponentIndexer.getInstance();
} else if (ServiceComponent.class == clazz) {
return ServiceComponentIndexer.getInstance();
} else if (Vul... | 457 | 173 | 630 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/IndexSubsystemInitializer.java | IndexSubsystemInitializer | contextInitialized | class IndexSubsystemInitializer implements ServletContextListener {
private static final Logger LOGGER = Logger.getLogger(IndexSubsystemInitializer.class);
/**
* {@inheritDoc}
*/
@Override
public void contextInitialized(final ServletContextEvent event) {<FILL_FUNCTION_BODY>}
/**
* ... |
LOGGER.info("Building lucene indexes if required");
if (RequirementsVerifier.failedValidation()) {
return;
}
IndexManager.ensureIndexesExists();
| 190 | 49 | 239 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/LicenseIndexer.java | LicenseIndexer | reindex | class LicenseIndexer extends IndexManager implements ObjectIndexer<LicenseDocument> {
private static final Logger LOGGER = Logger.getLogger(LicenseIndexer.class);
private static final LicenseIndexer INSTANCE = new LicenseIndexer();
static LicenseIndexer getInstance() {
return INSTANCE;
}
... |
LOGGER.info("Starting reindex task. This may take some time.");
super.reindex();
long docsIndexed = 0;
final long startTimeNs = System.nanoTime();
try (QueryManager qm = new QueryManager()) {
List<LicenseDocument> docs = fetchNext(qm, null);
while (!docs... | 721 | 206 | 927 | <methods>public void addDocument(Document) ,public static void checkIndexesConsistency() ,public void close() ,public void commit() ,public static void delete(org.dependencytrack.search.IndexManager.IndexType) ,public void deleteDocuments(Term) ,public static void ensureIndexesExists() ,public org.dependencytrack.searc... |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/ProjectIndexer.java | ProjectIndexer | convertToDocument | class ProjectIndexer extends IndexManager implements ObjectIndexer<ProjectDocument> {
private static final Logger LOGGER = Logger.getLogger(ProjectIndexer.class);
private static final ProjectIndexer INSTANCE = new ProjectIndexer();
static ProjectIndexer getInstance() {
return INSTANCE;
}
... |
final var doc = new Document();
addField(doc, IndexConstants.PROJECT_UUID, project.uuid().toString(), Field.Store.YES, false);
addField(doc, IndexConstants.PROJECT_NAME, project.name(), Field.Store.YES, true);
addField(doc, IndexConstants.PROJECT_VERSION, project.version(), Field.Store.... | 892 | 251 | 1,143 | <methods>public void addDocument(Document) ,public static void checkIndexesConsistency() ,public void close() ,public void commit() ,public static void delete(org.dependencytrack.search.IndexManager.IndexType) ,public void deleteDocuments(Term) ,public static void ensureIndexesExists() ,public org.dependencytrack.searc... |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/SearchManager.java | SearchManager | searchIndices | class SearchManager {
private static final Logger LOGGER = Logger.getLogger(SearchManager.class);
public SearchResult searchIndices(final String queryString, final int limit) {<FILL_FUNCTION_BODY>}
public SearchResult searchIndex(final IndexManager indexManager, final String queryString, final int limit)... |
final SearchResult searchResult = new SearchResult();
final IndexManager[] indexManagers = {
ProjectIndexer.getInstance(),
ComponentIndexer.getInstance(),
ServiceComponentIndexer.getInstance(),
VulnerabilityIndexer.getInstance(),
... | 1,698 | 143 | 1,841 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/ServiceComponentIndexer.java | ServiceComponentIndexer | reindex | class ServiceComponentIndexer extends IndexManager implements ObjectIndexer<ServiceComponentDocument> {
private static final Logger LOGGER = Logger.getLogger(ServiceComponentIndexer.class);
private static final ServiceComponentIndexer INSTANCE = new ServiceComponentIndexer();
static ServiceComponentIndexe... |
LOGGER.info("Starting reindex task. This may take some time.");
super.reindex();
long docsIndexed = 0;
final long startTimeNs = System.nanoTime();
try (QueryManager qm = new QueryManager()) {
List<ServiceComponentDocument> docs = fetchNext(qm, null);
whi... | 860 | 206 | 1,066 | <methods>public void addDocument(Document) ,public static void checkIndexesConsistency() ,public void close() ,public void commit() ,public static void delete(org.dependencytrack.search.IndexManager.IndexType) ,public void deleteDocuments(Term) ,public static void ensureIndexesExists() ,public org.dependencytrack.searc... |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/VulnerabilityIndexer.java | VulnerabilityIndexer | convertToDocument | class VulnerabilityIndexer extends IndexManager implements ObjectIndexer<VulnerabilityDocument> {
private static final Logger LOGGER = Logger.getLogger(VulnerabilityIndexer.class);
private static final VulnerabilityIndexer INSTANCE = new VulnerabilityIndexer();
static VulnerabilityIndexer getInstance() {
... |
final var doc = new Document();
addField(doc, IndexConstants.VULNERABILITY_UUID, vuln.uuid().toString(), Field.Store.YES, false);
addField(doc, IndexConstants.VULNERABILITY_VULNID, vuln.vulnId(), Field.Store.YES, true);
addField(doc, IndexConstants.VULNERABILITY_DESCRIPTION, vuln.descri... | 929 | 156 | 1,085 | <methods>public void addDocument(Document) ,public static void checkIndexesConsistency() ,public void close() ,public void commit() ,public static void delete(org.dependencytrack.search.IndexManager.IndexType) ,public void deleteDocuments(Term) ,public static void ensureIndexesExists() ,public org.dependencytrack.searc... |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/search/VulnerableSoftwareIndexer.java | VulnerableSoftwareIndexer | reindex | class VulnerableSoftwareIndexer extends IndexManager implements ObjectIndexer<VulnerableSoftwareDocument> {
private static final Logger LOGGER = Logger.getLogger(VulnerableSoftwareIndexer.class);
private static final VulnerableSoftwareIndexer INSTANCE = new VulnerableSoftwareIndexer();
static VulnerableSo... |
LOGGER.info("Starting reindex task. This may take some time.");
super.reindex();
long indexedDocs = 0;
final long startTimeNs = System.nanoTime();
try (QueryManager qm = new QueryManager()) {
List<VulnerableSoftwareDocument> docs = fetchNext(qm, null);
w... | 993 | 217 | 1,210 | <methods>public void addDocument(Document) ,public static void checkIndexesConsistency() ,public void close() ,public void commit() ,public static void delete(org.dependencytrack.search.IndexManager.IndexType) ,public void deleteDocuments(Term) ,public static void ensureIndexesExists() ,public org.dependencytrack.searc... |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/CallbackTask.java | CallbackTask | inform | class CallbackTask implements Subscriber {
@Override
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof final CallbackEvent event) {
event.getCallback().run();
}
| 41 | 28 | 69 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/ClearComponentAnalysisCacheTask.java | ClearComponentAnalysisCacheTask | inform | class ClearComponentAnalysisCacheTask implements LoggableSubscriber {
private static final Logger LOGGER = Logger.getLogger(ClearComponentAnalysisCacheTask.class);
/**
* {@inheritDoc}
*/
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof ClearComponentAnalysisCacheEvent) {
LOGGER.info("Clearing ComponentAnalysisCache");
try (QueryManager qm = new QueryManager()) {
ConfigProperty cacheClearPeriod = qm.getConfigProperty(ConfigPropertyConstants.SCANNER_ANALYSIS_CACHE_VALIDITY_PERIOD.getGrou... | 79 | 215 | 294 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/CloneProjectTask.java | CloneProjectTask | inform | class CloneProjectTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(CloneProjectTask.class);
/**
* {@inheritDoc}
*/
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof CloneProjectEvent) {
final CloneProjectEvent event = (CloneProjectEvent)e;
final CloneProjectRequest request = event.getRequest();
LOGGER.info("Cloning project: " + request.getProject());
try (QueryManager qm = new QueryManager()) {
... | 74 | 186 | 260 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/DefectDojoUploadTask.java | DefectDojoUploadTask | inform | class DefectDojoUploadTask extends VulnerabilityManagementUploadTask {
private static final Logger LOGGER = Logger.getLogger(DefectDojoUploadTask.class);
/**
* {@inheritDoc}
*/
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof DefectDojoUploadEventAbstract) {
final DefectDojoUploadEventAbstract event = (DefectDojoUploadEventAbstract) e;
LOGGER.debug("Starting DefectDojo upload task");
super.inform(event, new DefectDojoUploader());
LOGGER.debug("DefectDojo upload comple... | 82 | 90 | 172 | <methods>public non-sealed void <init>() <variables>private static final Logger LOGGER |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/FortifySscUploadTask.java | FortifySscUploadTask | inform | class FortifySscUploadTask extends VulnerabilityManagementUploadTask {
private static final Logger LOGGER = Logger.getLogger(FortifySscUploadTask.class);
/**
* {@inheritDoc}
*/
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof FortifySscUploadEventAbstract) {
final FortifySscUploadEventAbstract event = (FortifySscUploadEventAbstract) e;
LOGGER.debug("Starting Fortify Software Security Center upload task");
super.inform(event, new FortifySscUploader());
LOGGER.debug("Fo... | 82 | 92 | 174 | <methods>public non-sealed void <init>() <variables>private static final Logger LOGGER |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/IndexTask.java | IndexTask | inform | class IndexTask implements Subscriber {
/**
* {@inheritDoc}
*/
@SuppressWarnings("unchecked")
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof final IndexEvent event) {
if (IndexEvent.Action.CHECK == event.getAction()) {
IndexManager.checkIndexesConsistency();
return;
}
final ObjectIndexer indexManager = IndexManagerFactory.getIndexManager(event);
if (... | 60 | 306 | 366 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/InternalComponentIdentificationTask.java | InternalComponentIdentificationTask | analyze | class InternalComponentIdentificationTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(InternalComponentIdentificationTask.class);
@Override
public void inform(final Event e) {
if (e instanceof InternalComponentIdentificationEvent) {
LOGGER.info("Starti... |
try (final var qm = new QueryManager()) {
final PersistenceManager pm = qm.getPersistenceManager();
// Disable the DataNucleus L2 cache for this persistence manager.
// The cache will hold references to the queried objects, preventing them
// from being garbage ... | 514 | 511 | 1,025 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/KennaSecurityUploadTask.java | KennaSecurityUploadTask | inform | class KennaSecurityUploadTask extends VulnerabilityManagementUploadTask {
private static final Logger LOGGER = Logger.getLogger(KennaSecurityUploadTask.class);
/**
* {@inheritDoc}
*/
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof KennaSecurityUploadEventAbstract) {
final KennaSecurityUploadEventAbstract event = (KennaSecurityUploadEventAbstract) e;
LOGGER.debug("Starting Kenna Security upload task");
super.inform(event, new KennaSecurityUploader());
LOGGER.debug("Kenna Se... | 81 | 86 | 167 | <methods>public non-sealed void <init>() <variables>private static final Logger LOGGER |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/NewVulnerableDependencyAnalysisTask.java | NewVulnerableDependencyAnalysisTask | inform | class NewVulnerableDependencyAnalysisTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(NewVulnerableDependencyAnalysisTask.class);
@Override
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof final NewVulnerableDependencyAnalysisEvent event) {
for (Component component : event.components()) {
try (final var qm = new QueryManager()) {
component = qm.getObjectById(Component.class, component.getId());
LOGGER.debug("Ana... | 74 | 150 | 224 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/PolicyEvaluationTask.java | PolicyEvaluationTask | inform | class PolicyEvaluationTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(PolicyEvaluationTask.class);
/**
* {@inheritDoc}
*/
@Override
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
private void performPolicyEvaluation(Project project, List<Comp... |
if (e instanceof PolicyEvaluationEvent event) {
if (event.getProject() != null) {
if (event.getComponents() != null && !event.getComponents().isEmpty()) {
performPolicyEvaluation(event.getProject(), event.getComponents());
} else {
... | 169 | 102 | 271 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/TaskScheduler.java | TaskScheduler | getCadenceConfigPropertyValueInMilliseconds | class TaskScheduler extends AlpineTaskScheduler {
// Holds an instance of TaskScheduler
private static final TaskScheduler INSTANCE = new TaskScheduler();
/**
* Private constructor.
*/
private TaskScheduler() {
try (QueryManager qm = new QueryManager()) {
// Creates a new... |
long result = 0;
ConfigProperty property = qm.getConfigProperty(configProperty.getGroupName(), configProperty.getPropertyName());
if(PropertyType.INTEGER.equals(property.getPropertyType()) && property.getPropertyValue() != null) {
result = Long.valueOf(property.getPropertyValue()) *... | 1,771 | 103 | 1,874 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/VexUploadProcessingTask.java | VexUploadProcessingTask | inform | class VexUploadProcessingTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(VexUploadProcessingTask.class);
/**
* {@inheritDoc}
*/
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
} |
if (e instanceof VexUploadEvent) {
final VexUploadEvent event = (VexUploadEvent) e;
final byte[] vexBytes = CompressUtil.optionallyDecompress(event.getVex());
try(final QueryManager qm = new QueryManager()) {
final Project project = qm.getObjectByUuid(Project... | 78 | 984 | 1,062 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/VulnDbSyncTask.java | VulnDbSyncTask | inform | class VulnDbSyncTask implements LoggableSubscriber {
private static final Logger LOGGER = Logger.getLogger(VulnDbSyncTask.class);
private boolean successful = true;
/**
* {@inheritDoc}
*/
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
/**
* Synchronizes the VulnDB vulner... |
if (e instanceof VulnDbSyncEvent) {
LOGGER.info("Starting VulnDB mirror synchronization task");
final File vulndbDir = new File(Config.getInstance().getDataDirectorty(), "vulndb");
if (!vulndbDir.exists()) {
LOGGER.info("VulnDB mirror directory does not exist... | 1,373 | 558 | 1,931 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/VulnerabilityAnalysisTask.java | VulnerabilityAnalysisTask | analyzeComponents | class VulnerabilityAnalysisTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(VulnerabilityAnalysisTask.class);
/**
* {@inheritDoc}
*/
@Override
public void inform(final Event e) {
if (e instanceof VulnerabilityAnalysisEvent event) {
if (ev... |
/*
When this task is processing events that specify the components to scan,
separate them out into 'candidates' so that we can fire off multiple events
in hopes of perform parallel analysis using different analyzers.
*/
final InternalAnalysisTask internalAnalysisTa... | 1,181 | 614 | 1,795 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/VulnerabilityManagementUploadTask.java | VulnerabilityManagementUploadTask | processProjectFindings | class VulnerabilityManagementUploadTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(VulnerabilityManagementUploadTask.class);
protected void inform(final Event e, final FindingUploader findingsUploader) {
if (e instanceof AbstractVulnerabilityManagementUploadEvent) {
... |
if (uploader.isProjectConfigured(project)) {
LOGGER.debug("Initializing integration point: " + uploader.name() + " for project: " + project.getUuid());
final List<Finding> findings = qm.getFindings(project);
final InputStream payload = uploader.process(project, findings);
... | 320 | 131 | 451 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/metrics/PortfolioMetricsUpdateTask.java | PortfolioMetricsUpdateTask | updateMetrics | class PortfolioMetricsUpdateTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(PortfolioMetricsUpdateTask.class);
private static final long BATCH_SIZE = SystemUtil.getCpuCores();
@Override
public void inform(final Event e) {
if (e instanceof PortfolioMetricsUpda... |
LOGGER.info("Executing portfolio metrics update");
final var counters = new Counters();
try (final var qm = new QueryManager()) {
final PersistenceManager pm = qm.getPersistenceManager();
LOGGER.debug("Fetching first " + BATCH_SIZE + " projects");
List<Proj... | 346 | 1,505 | 1,851 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/metrics/ProjectMetricsUpdateTask.java | ProjectMetricsUpdateTask | inform | class ProjectMetricsUpdateTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(ProjectMetricsUpdateTask.class);
@Override
public void inform(final Event e) {<FILL_FUNCTION_BODY>}
private void updateMetrics(final UUID uuid) throws Exception {
final var counters = ... |
if (e instanceof final ProjectMetricsUpdateEvent event) {
try {
final UUID uuid = event.getUuid();
LOGGER.info("Executing metrics update for project " + uuid);
updateMetrics(uuid);
} catch (Exception ex) {
LOGGER.error("An ... | 1,629 | 100 | 1,729 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/metrics/VulnerabilityMetricsUpdateTask.java | VulnerabilityMetricsUpdateTask | updateMetrics | class VulnerabilityMetricsUpdateTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(VulnerabilityMetricsUpdateTask.class);
@Override
public void inform(final Event e) {
if (e instanceof VulnerabilityMetricsUpdateEvent) {
try {
updateMetric... |
LOGGER.info("Executing metrics update on vulnerability database");
final var measuredAt = new Date();
try (final var qm = new QueryManager()) {
final PersistenceManager pm = qm.getPersistenceManager();
/**
*
* The created field has priotiy o... | 472 | 648 | 1,120 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/AbstractMetaAnalyzer.java | AbstractMetaAnalyzer | setRepositoryBaseUrl | class AbstractMetaAnalyzer implements IMetaAnalyzer {
protected String baseUrl;
protected String username;
protected String password;
/**
* {@inheritDoc}
*/
public void setRepositoryBaseUrl(String baseUrl) {<FILL_FUNCTION_BODY>}
public void setRepositoryUsernameAndPassword(String ... |
baseUrl = StringUtils.trimToNull(baseUrl);
if (baseUrl == null) {
return;
}
if (baseUrl.endsWith("/")) {
baseUrl = baseUrl.substring(0, baseUrl.length() - 1);
}
this.baseUrl = baseUrl;
| 683 | 82 | 765 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/CargoMetaAnalyzer.java | CargoMetaAnalyzer | analyze | class CargoMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(CargoMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://crates.io";
private static final String API_URL = "/api/v1/crates/%s";
CargoMetaAnalyzer() {
this.baseU... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
final String url = String.format(baseUrl + API_URL, component.getPurl().getName());
try (final CloseableHttpResponse response = processHttpRequest(url)) {
if (response.getStatusLi... | 251 | 491 | 742 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/ComposerMetaAnalyzer.java | ComposerMetaAnalyzer | analyze | class ComposerMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(ComposerMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://repo.packagist.org";
/**
* @see <a href="https://packagist.org/apidoc#get-package-metadata-v1">Packagist... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() == null) {
return meta;
}
final String url = String.format(baseUrl + API_URL, component.getPurl().getNamespace(), component.getPurl().getName());
try (final CloseableHttpResponse response = pro... | 370 | 786 | 1,156 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/CpanMetaAnalyzer.java | CpanMetaAnalyzer | analyze | class CpanMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(CpanMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://fastapi.metacpan.org/v1";
private static final String API_URL = "/module/%s";
CpanMetaAnalyzer() {
this.b... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
final String packageName;
if (component.getPurl().getNamespace() != null) {
packageName = component.getPurl().getNamespace() + "%2F" + component.getPurl().getName();
... | 246 | 436 | 682 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/GemMetaAnalyzer.java | GemMetaAnalyzer | analyze | class GemMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(GemMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://rubygems.org";
private static final String API_URL = "/api/v1/versions/%s/latest.json";
GemMetaAnalyzer() {
... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
final String url = String.format(baseUrl + API_URL, component.getPurl().getName());
try (final CloseableHttpResponse response = processHttpRequest(url)) {
if (response.getStatusLi... | 253 | 265 | 518 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/GithubMetaAnalyzer.java | GithubMetaAnalyzer | analyze | class GithubMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(GithubMetaAnalyzer.class);
private enum VersionType {
RELEASE,
COMMIT;
}
private static final VersionType DEFAULT_VERSION_TYPE = VersionType.RELEASE;
private static final S... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
try {
final GitHub github;
if (isNotBlank(repositoryUser) && isNotBlank(repositoryPassword)) {
github = GitHub.connect(repositoryUser, repositoryPassword);... | 620 | 633 | 1,253 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/GoModulesMetaAnalyzer.java | GoModulesMetaAnalyzer | analyze | class GoModulesMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(GoModulesMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://proxy.golang.org";
private static final String API_URL = "/%s/%s/@latest";
GoModulesMetaAnalyzer() {
... |
final var meta = new MetaModel(component);
if (component.getPurl() == null || component.getPurl().getNamespace() == null) {
return meta;
}
final String url = String.format(baseUrl + API_URL, caseEncode(component.getPurl().getNamespace()), caseEncode(component.getPurl().getN... | 358 | 523 | 881 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/HackageMetaAnalyzer.java | HackageMetaAnalyzer | analyze | class HackageMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(HackageMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://hackage.haskell.org/";
HackageMetaAnalyzer() {
this.baseUrl = DEFAULT_BASE_URL;
}
/**
* {@... |
final var meta = new MetaModel(component);
final var purl = component.getPurl();
if (purl != null) {
final var url = baseUrl + "/package/" + purl.getName() + "/preferred";
try (final CloseableHttpResponse response = processHttpRequest(url)) {
if (response... | 237 | 381 | 618 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/HexMetaAnalyzer.java | HexMetaAnalyzer | analyze | class HexMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(HexMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://hex.pm";
private static final String API_URL = "/api/packages/%s";
HexMetaAnalyzer() {
this.baseUrl = DEFAU... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
final String packageName;
if (component.getPurl().getNamespace() != null) {
packageName = component.getPurl().getNamespace().replace("@", "%40") + "%2F" + component.getPurl().get... | 245 | 535 | 780 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/MavenMetaAnalyzer.java | MavenMetaAnalyzer | analyze | class MavenMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(MavenMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://repo1.maven.org/maven2";
private static final String REPO_METADATA_URL = "/%s/maven-metadata.xml";
MavenMetaAna... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
final String mavenGavUrl = component.getPurl().getNamespace().replaceAll("\\.", "/") + "/" + component.getPurl().getName();
final String url = String.format(baseUrl + REPO_METADATA_URL, mavenGavU... | 260 | 533 | 793 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/NixpkgsMetaAnalyzer.java | NixpkgsMetaAnalyzer | analyze | class NixpkgsMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(NixpkgsMetaAnalyzer.class);
private static final String DEFAULT_CHANNEL_URL = "https://channels.nixos.org/nixpkgs-unstable/packages.json.br";
private static final Cache<String, Map<String, String>>... |
Map<String, String> latestVersions = CACHE.get("nixpkgs", cacheKey -> {
final var versions = new HashMap<String, String>();
try (final CloseableHttpClient client = HttpClients.createDefault()) {
try (final CloseableHttpResponse packagesResponse = processHttpRequest5(clie... | 435 | 435 | 870 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/NpmMetaAnalyzer.java | NpmMetaAnalyzer | analyze | class NpmMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(NpmMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://registry.npmjs.org";
private static final String API_URL = "/-/package/%s/dist-tags";
NpmMetaAnalyzer() {
t... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
final String packageName;
if (component.getPurl().getNamespace() != null) {
packageName = "%s/%s".formatted(component.getPurl().getNamespace(), component.getPurl().getName());
... | 253 | 359 | 612 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/NugetMetaAnalyzer.java | NugetMetaAnalyzer | parseUpdateTime | class NugetMetaAnalyzer extends AbstractMetaAnalyzer {
public static final DateFormat[] SUPPORTED_DATE_FORMATS = new DateFormat[]{
new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss.SSSXXX"),
new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'")
};
private static final Logger LOGGER = Logger.ge... |
if (updateTime == null) {
return null;
}
// NuGet repositories may use differing date formats, so we try a few date formats that are commonly used until the right one is found.
for (DateFormat dateFormat : SUPPORTED_DATE_FORMATS) {
try {
return d... | 1,736 | 142 | 1,878 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/repositories/PypiMetaAnalyzer.java | PypiMetaAnalyzer | analyze | class PypiMetaAnalyzer extends AbstractMetaAnalyzer {
private static final Logger LOGGER = Logger.getLogger(PypiMetaAnalyzer.class);
private static final String DEFAULT_BASE_URL = "https://pypi.org";
private static final String API_URL = "/pypi/%s/json";
PypiMetaAnalyzer() {
this.baseUrl = DEF... |
final MetaModel meta = new MetaModel(component);
if (component.getPurl() != null) {
final String url = String.format(baseUrl + API_URL, component.getPurl().getName());
try (final CloseableHttpResponse response = processHttpRequest(url)) {
if (response.getStatusLi... | 251 | 483 | 734 | <methods>public non-sealed void <init>() ,public void setRepositoryBaseUrl(java.lang.String) ,public void setRepositoryUsernameAndPassword(java.lang.String, java.lang.String) <variables>protected java.lang.String baseUrl,protected java.lang.String password,protected java.lang.String username |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/scanners/AbstractVulnerableSoftwareAnalysisTask.java | AbstractVulnerableSoftwareAnalysisTask | compareVersions | class AbstractVulnerableSoftwareAnalysisTask extends BaseComponentAnalyzerTask {
/**
* Analyzes the targetVersion against a list of VulnerableSoftware objects which may contain
* specific versions or version ranges. For every match, every vulnerability associated with
* the VulnerableSoftware object... |
//if any of the four conditions will be evaluated - then true;
boolean result = (vs.getVersionEndExcluding() != null && !vs.getVersionEndExcluding().isEmpty())
|| (vs.getVersionStartExcluding() != null && !vs.getVersionStartExcluding().isEmpty())
|| (vs.getVersionEndIncl... | 1,107 | 542 | 1,649 | <methods>public non-sealed void <init>() <variables>private final Logger LOGGER |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/scanners/BaseComponentAnalyzerTask.java | BaseComponentAnalyzerTask | isCacheCurrent | class BaseComponentAnalyzerTask implements ScanTask {
private final Logger LOGGER = Logger.getLogger(this.getClass()); // We dont want this class reporting the logger
protected boolean isEnabled(final ConfigPropertyConstants configPropertyConstants) {
try (QueryManager qm = new QueryManager()) {
... |
try (QueryManager qm = new QueryManager()) {
boolean isCacheCurrent = false;
ConfigProperty cacheClearPeriod = qm.getConfigProperty(ConfigPropertyConstants.SCANNER_ANALYSIS_CACHE_VALIDITY_PERIOD.getGroupName(), ConfigPropertyConstants.SCANNER_ANALYSIS_CACHE_VALIDITY_PERIOD.getPropertyNa... | 1,193 | 349 | 1,542 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/scanners/InternalAnalysisTask.java | InternalAnalysisTask | versionRangeAnalysis | class InternalAnalysisTask extends AbstractVulnerableSoftwareAnalysisTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(InternalAnalysisTask.class);
public AnalyzerIdentity getAnalyzerIdentity() {
return AnalyzerIdentity.INTERNAL_ANALYZER;
}
private Vulnerabili... |
final boolean fuzzyEnabled = super.isEnabled(ConfigPropertyConstants.SCANNER_INTERNAL_FUZZY_ENABLED) &&
(!component.isInternal() || !super.isEnabled(ConfigPropertyConstants.SCANNER_INTERNAL_FUZZY_EXCLUDE_INTERNAL));
final boolean excludeComponentsWithPurl = super.isEnabled(ConfigPropert... | 537 | 900 | 1,437 | <methods>public non-sealed void <init>() <variables> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/tasks/scanners/VulnDbAnalysisTask.java | VulnDbAnalysisTask | inform | class VulnDbAnalysisTask extends BaseComponentAnalyzerTask implements Subscriber {
private static final Logger LOGGER = Logger.getLogger(VulnDbAnalysisTask.class);
private static final int PAGE_SIZE = 100;
private VulnerabilityAnalysisLevel vulnerabilityAnalysisLevel;
private String apiConsumerKey;
... |
if (e instanceof VulnDbAnalysisEvent) {
if (!super.isEnabled(ConfigPropertyConstants.SCANNER_VULNDB_ENABLED)) {
return;
}
try (QueryManager qm = new QueryManager()) {
final ConfigProperty apiConsumerKey = qm.getConfigProperty(
... | 1,220 | 569 | 1,789 | <methods>public non-sealed void <init>() <variables>private final Logger LOGGER |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/UpgradeInitializer.java | UpgradeInitializer | contextInitialized | class UpgradeInitializer implements ServletContextListener {
private static final Logger LOGGER = Logger.getLogger(UpgradeInitializer.class);
/**
* {@inheritDoc}
*/
@Override
public void contextInitialized(final ServletContextEvent event) {<FILL_FUNCTION_BODY>}
/**
* {@inheritDoc}
... |
LOGGER.info("Initializing upgrade framework");
try {
final UpgradeMetaProcessor ump = new UpgradeMetaProcessor();
final VersionComparator currentVersion = ump.getSchemaVersion();
ump.close();
if (currentVersion != null && currentVersion.isOlderThan(new Ve... | 677 | 471 | 1,148 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v410/v410Updater.java | v410Updater | executeUpgrade | class v410Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v410Updater.class);
@Override
public String getSchemaVersion() {
return "4.1.0";
}
@Override
public void executeUpgrade(final AlpineQueryManager alpineQueryManager, final Connection c... |
LOGGER.info("Deleting index directory");
try {
final String INDEX_ROOT_DIR = Config.getInstance().getDataDirectorty().getAbsolutePath() + File.separator + "index";
FileDeleteStrategy.FORCE.delete(new File(INDEX_ROOT_DIR));
} catch (IOException e) {
LOGGER.err... | 115 | 105 | 220 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v4100/v4100Updater.java | v4100Updater | authRequiredForInternalReposWithCredentials | class v4100Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v4100Updater.class);
@Override
public String getSchemaVersion() {
return "4.10.0";
}
@Override
public void executeUpgrade(final AlpineQueryManager qm, final Connection connection) th... |
LOGGER.info("Marking internal repositories with credentials as \"requires authentication\"");
try (final PreparedStatement ps = connection.prepareStatement("""
UPDATE "REPOSITORY"
SET "AUTHENTICATIONREQUIRED" = ?
WHERE "INTERNAL" = ? AND ("USERNAME" IS NO... | 233 | 193 | 426 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v4110/v4110Updater.java | v4110Updater | dropCweTable | class v4110Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v4110Updater.class);
@Override
public String getSchemaVersion() {
return "4.11.0";
}
@Override
public void executeUpgrade(final AlpineQueryManager qm, final Connection connection) th... |
final boolean shouldReEnableAutoCommit = connection.getAutoCommit();
connection.setAutoCommit(false);
try {
// In DT v4.4.x and older, the VULNERABILITY table had a foreign key constraint
// on the CWE table. Drop the constraint, the index on the CWE column, as well as
... | 1,439 | 528 | 1,967 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v420/v420Updater.java | v420Updater | executeUpgrade | class v420Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v420Updater.class);
private static final String STMT_1 = "DELETE FROM \"CONFIGPROPERTY\" WHERE \"GROUPNAME\" = 'integrations' AND \"PROPERTYNAME\" = 'fortify.ssc.username'";
private static final String ST... |
LOGGER.info("Removing legacy Fortify SSC configuration settings");
DbUtil.executeUpdate(connection, STMT_1);
DbUtil.executeUpdate(connection, STMT_2);
| 214 | 52 | 266 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v440/v440Updater.java | v440Updater | executeUpgrade | class v440Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v440Updater.class);
private static final String STMT_1 = "INSERT INTO \"PERMISSION\" (\"NAME\", \"DESCRIPTION\") VALUES (?, ?)";
private static final String STMT_2 = "SELECT \"ID\" FROM \"PERMISSION\" WHER... |
LOGGER.info("Creating VIEW_VULNERABILITY permission");
PreparedStatement ps = connection.prepareStatement(STMT_1);
ps.setString(1, Permissions.VIEW_VULNERABILITY.name());
ps.setString(2, Permissions.VIEW_VULNERABILITY.getDescription());
ps.executeUpdate();
final long vi... | 832 | 757 | 1,589 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v460/v460Updater.java | v460Updater | executeUpgrade | class v460Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v460Updater.class);
@Override
public String getSchemaVersion() {
return "4.6.0";
}
@Override
public void executeUpgrade(final AlpineQueryManager qm, final Connection connection) throw... |
// Fixes https://github.com/DependencyTrack/dependency-track/issues/1661
// The JDBC type "CLOB" is mapped to the type CLOB for H2, MEDIUMTEXT for MySQL, and TEXT for PostgreSQL and SQL Server.
// - https://github.com/datanucleus/datanucleus-rdbms/blob/datanucleus-rdbms-5.2.11/src/main/java/org... | 112 | 1,149 | 1,261 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v463/v463Updater.java | v463Updater | executeUpgrade | class v463Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v463Updater.class);
@Override
public String getSchemaVersion() {
return "4.6.3";
}
@Override
public void executeUpgrade(final AlpineQueryManager qm, final Connection connection) throw... |
LOGGER.info("Resetting scanner cache validity period to 12h");
final PreparedStatement ps = connection.prepareStatement("""
UPDATE "CONFIGPROPERTY" SET "PROPERTYVALUE" = ?
WHERE "GROUPNAME" = ? AND "PROPERTYNAME" = ?
""");
ps.setString(1, SCANNER_... | 113 | 183 | 296 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v470/v470Updater.java | v470Updater | executeUpgrade | class v470Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v470Updater.class);
@Override
public String getSchemaVersion() {
return "4.7.0";
}
@Override
public void executeUpgrade(final AlpineQueryManager qm, final Connection connection) throw... |
LOGGER.info("Setting component analysis cache clear cadence to 24H");
final PreparedStatement ps = connection.prepareStatement("""
UPDATE "CONFIGPROPERTY" SET "PROPERTYVALUE" = ?
WHERE "GROUPNAME" = ? AND "PROPERTYNAME" = ?
""");
ps.setString(1, T... | 113 | 213 | 326 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v480/v480Updater.java | v480Updater | changeJdbcTypeOfComponentAuthorColumn | class v480Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v480Updater.class);
@Override
public String getSchemaVersion() {
return "4.8.0";
}
@Override
public void executeUpgrade(final AlpineQueryManager qm, final Connection connection) throw... |
// Fixes https://github.com/DependencyTrack/dependency-track/issues/2488
// The JDBC type "CLOB" is mapped to the type CLOB for H2, MEDIUMTEXT for MySQL, and TEXT for PostgreSQL and SQL Server.
LOGGER.info("Changing JDBC type of \"COMPONENT\".\"AUTHOR\" from VARCHAR to CLOB");
if (DbUti... | 296 | 489 | 785 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/upgrade/v490/v490Updater.java | v490Updater | updateDefaultSnykApiVersion | class v490Updater extends AbstractUpgradeItem {
private static final Logger LOGGER = Logger.getLogger(v490Updater.class);
@Override
public String getSchemaVersion() {
return "4.9.0";
}
@Override
public void executeUpgrade(final AlpineQueryManager qm, final Connection connection) throw... |
LOGGER.info("Updating Snyk API version from 2022-11-14 to %s"
.formatted(SCANNER_SNYK_API_VERSION.getDefaultPropertyValue()));
try (final PreparedStatement ps = connection.prepareStatement("""
UPDATE "CONFIGPROPERTY" SET "PROPERTYVALUE" = ?
WHERE "GROUPNA... | 222 | 185 | 407 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/util/AnalysisCommentUtil.java | AnalysisCommentUtil | makeJustificationComment | class AnalysisCommentUtil {
private AnalysisCommentUtil() { }
public static boolean makeStateComment(final QueryManager qm, final Analysis analysis, final AnalysisState analysisState, final String commenter) {
boolean analysisStateChange = false;
if (analysisState != null && analysisState != a... |
if (analysisJustification != null) {
if (analysis.getAnalysisJustification() == null && AnalysisJustification.NOT_SET != analysisJustification) {
qm.makeAnalysisComment(analysis, String.format("Justification: %s → %s", AnalysisJustification.NOT_SET, analysisJustification), commenter... | 580 | 158 | 738 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/util/ComponentIdentificationUtil.java | ComponentIdentificationUtil | doesIdentityMatch | class ComponentIdentificationUtil {
private ComponentIdentificationUtil() { }
@SuppressWarnings("deprecation")
public static boolean doesIdentityMatch(final Component a, final org.cyclonedx.model.Component b) {
if (a == null || b == null) {
return false;
}
if (isMatch(a... |
if (a == null || b == null) {
return false;
}
if (isMatch(a.getPurl(), b.getPurl())) {
return true;
}
if (isMatch(a.getPurlCoordinates(), b.getPurlCoordinates())) {
return true;
}
if (isMatch(a.getSwidTagId(), b.getSwidTagId())... | 584 | 245 | 829 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/util/CompressUtil.java | CompressUtil | optionallyDecompress | class CompressUtil {
private CompressUtil() { }
/**
* Helper method that attempts to automatically identify an archive and its type,
* extract the contents as a byte array. If this fails, it will gracefully return
* the original input byte array without exception. If the input was not an archiv... |
try (final ByteArrayInputStream bis = new ByteArrayInputStream(input);
final ArchiveInputStream ais = new ArchiveStreamFactory().createArchiveInputStream(bis)) {
final ArchiveEntry entry = ais.getNextEntry();
if (ais.canReadEntryData(entry)) {
return IOUtils... | 140 | 120 | 260 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/util/DateUtil.java | DateUtil | toISO8601 | class DateUtil {
private DateUtil() {
}
/**
* Convenience method that parses a date in yyyyMMdd format and
* returns a Date object. If the parsing fails, null is returned.
* @param yyyyMMdd the date string to parse
* @return a Date object
* @since 3.0.0
*/
public static D... |
final TimeZone tz = TimeZone.getTimeZone("UTC");
final DateFormat df = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'"); // Quoted "Z" to indicate UTC, no timezone offset
df.setTimeZone(tz);
return df.format(date);
| 618 | 84 | 702 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/util/HashUtil.java | HashUtil | sha256 | class HashUtil {
private HashUtil() { }
public static String md5(final File file) {
try (InputStream fis = Files.newInputStream(file.toPath())) {
return org.apache.commons.codec.digest.DigestUtils.md5Hex(fis);
} catch (IOException e){
return null;
}
}
p... |
try (InputStream fis = Files.newInputStream(file.toPath())) {
return org.apache.commons.codec.digest.DigestUtils.sha256Hex(fis);
} catch (IOException e){
return null;
}
| 280 | 65 | 345 | <no_super_class> |
DependencyTrack_dependency-track | dependency-track/src/main/java/org/dependencytrack/util/HttpUtil.java | HttpUtil | basicAuthHeaderValue | class HttpUtil {
/**
* Private constructor.
*/
private HttpUtil() {
}
public static String basicAuthHeader(final String username, final String password) {
return AUTHORIZATION + ": " + basicAuthHeaderValue(username, password);
}
public static String basicAuthHeaderValue(fina... |
return "Basic " +
Base64.getEncoder().encodeToString(
String.format("%s:%s", Objects.toString(username, ""), Objects.toString(password, ""))
.getBytes()
);
| 106 | 61 | 167 | <no_super_class> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.