Skip to content

Commit 609b024

Browse files
Add test_type mismatch validation during reimport (#10219) (#13975)
* Fix test_type mismatch validation during reimport (#10219) - Add validation in consolidate_dynamic_tests to detect test_type mismatches during reimport - Raise ValidationError with descriptive message when test_type doesn't match - Validation occurs before any findings are processed or deduplication starts - Add test cases for matching test_type, mismatched test_type, and initial import scenarios - Create test data files for generic parser with different test types Fixes #10219 * fixes * add docs
1 parent ed6390b commit 609b024

7 files changed

Lines changed: 345 additions & 10 deletions

File tree

docs/content/en/working_with_findings/organizing_engagements_tests/product_hierarchy.md

Lines changed: 30 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ Product Types can have Role\-Based Access Control rules applied, which limit tea
2525

2626
#### What can a Product Type represent?
2727

28-
* If a particular software project has many distinct deployments or versions, it may be worth creating a single Product Type which covers the scope of the entire project, and having each version exist as individual Products.
28+
* If a particular software project has many distinct deployments or versions, it may be worth creating a single Product Type which covers the scope of the entire project, and having each version exist as individual Products.
2929
30-
* You also might consider using Product Types to represent stages in your software development process: one Product Type for 'In Development', one Product Type for 'In Production', etc.
30+
* You also might consider using Product Types to represent stages in your software development process: one Product Type for 'In Development', one Product Type for 'In Production', etc.
3131
3232
* Ultimately, it's your decision how you wish to organize your Products, and what you Product Type to represent. Your DefectDojo hierarchy may need to change to fit your security teams' needs.
3333

@@ -58,11 +58,11 @@ The following scenarios are good reasons to consider creating a separate DefectD
5858
* "**ExampleProduct 1\.0**" uses completely different software components from "**ExampleProduct 2\.0**", and both versions are actively supported by your company.
5959
* The team assigned to work on "**ExampleProduct version A**" is different than the product team assigned to work on "**ExampleProduct version B**", and needs to have different security permissions assigned as a result.
6060

61-
These variations within a single Product can also be handled at the Engagement level. Note that Engagements don't have access control in the way Products and Product Types do.
61+
These variations within a single Product can also be handled at the Engagement level. Note that Engagements don't have access control in the way Products and Product Types do.
6262

6363
## **Engagements**
6464

65-
Once a Product is set up, you can begin creating and scheduling Engagements. Engagements are meant to represent moments in time when testing is taking place, and contain one or more **Tests**.
65+
Once a Product is set up, you can begin creating and scheduling Engagements. Engagements are meant to represent moments in time when testing is taking place, and contain one or more **Tests**.
6666

6767
Engagements always have:
6868

@@ -72,12 +72,12 @@ Engagements always have:
7272
* an assigned **Testing Lead**
7373
* an associated **Product**
7474

75-
There are two types of Engagement: **Interactive** and **CI/CD**.
75+
There are two types of Engagement: **Interactive** and **CI/CD**.
7676

7777
* An **Interactive Engagement** is typically run by an engineer. Interactive Engagements are focused on testing the application while the app is running, using an automated test, human tester, or any activity “interacting” with the application functionality. See [OWASP's definition of IAST](https://owasp.org/www-project-devsecops-guideline/latest/02c-Interactive-Application-Security-Testing#:~:text=Interactive%20Application%20Security%20Testing,interacting%E2%80%9D%20with%20the%20application%20functionality.).
7878
* A **CI/CD Engagement** is for automated integration with a CI/CD pipeline. CI/CD Engagements are meant to import data as an automated action, triggered by a step in the release process.
7979

80-
Engagements can be tracked using DefectDojo's **Calendar** view.
80+
Engagements can be tracked using DefectDojo's **Calendar** view.
8181

8282
#### What can an Engagement represent?
8383

@@ -91,7 +91,7 @@ If you have a planned testing effort scheduled, an Engagement offers you a place
9191

9292
* **Test:** Nessus Scan Results (March 12\)
9393
* **Test:** NPM Scan Audit Results (March 12\)
94-
* **Test:** Snyk Scan Results (March 12\)
94+
* **Test:** Snyk Scan Results (March 12\)
9595
9696
You can also organize CI/CD Test results within an Engagement. These kinds of Engagements are 'Open\-Ended' meaning that they don't have a date, and will instead add additional data each time the associated CI/CD actions are run.
9797

@@ -137,6 +137,29 @@ The following Test Types appear in the "Scan Type" dropdown when creating a new
137137

138138
Non-parser Test Types should be used when you need to manually create findings that require remediation but don't originate from automated scanner output.
139139

140+
#### **Parser-based Test Types**
141+
142+
Parser-based test types can be categorized by how their test type name is determined:
143+
144+
- **Fixed Test Type Names**: The test type name is predefined and known before import (e.g., "ZAP Scan", "Nessus Scan").
145+
146+
- **Report-Defined Test Type Names**: The test type name is extracted from the scan report content at import time.
147+
148+
Examples include:
149+
- **Generic Findings Import**: Creates test types based on the `type` field in JSON reports
150+
- **SARIF**: Creates test types based on tool names in the SARIF report (e.g., "Dockle Scan (SARIF)")
151+
- **OpenReports**: Creates separate test types per source found in the report
152+
153+
**Report-Defined Test Type Naming Rules:**
154+
- If the report's `type` field equals the scan type → uses scan type directly (e.g., "Generic Findings Import")
155+
- If the report's `type` field differs → creates "{type} Scan ({scan_type})" format (e.g., "Tool1 Scan (Generic Findings Import)")
156+
- If no `type` field is provided → uses scan type directly
157+
158+
**Important Considerations:**
159+
- Report-defined test types are automatically created when a new type is detected during import or reimport.
160+
- For reimports, the test type name must match exactly - mismatches will raise a validation error
161+
- Deduplication settings (`HASHCODE_FIELDS_PER_SCANNER`) use test type names as keys, so report-defined names must be configured accordingly if you want custom deduplication behavior
162+
140163
#### **How do Tests interact with each other?**
141164

142165
Tests take your testing data and group it into Findings. Generally, security teams will be running the same testing effort repeatedly, and Tests in DefectDojo allow you to handle this process in an elegant way.

dojo/importers/base_importer.py

Lines changed: 27 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -205,10 +205,34 @@ def consolidate_dynamic_tests(self, tests: list[Test]) -> list[Finding]:
205205
if not self.test:
206206
# Determine if we should use a custom test type name
207207
if test_raw.type:
208-
test_type_name = f"{tests[0].type} Scan"
209-
if test_type_name != self.scan_type:
210-
test_type_name = f"{test_type_name} ({self.scan_type})"
208+
# If test_raw.type equals scan_type, use scan_type directly
209+
if test_raw.type == self.scan_type:
210+
test_type_name = self.scan_type
211+
else:
212+
test_type_name = f"{tests[0].type} Scan"
213+
if test_type_name != self.scan_type:
214+
test_type_name = f"{test_type_name} ({self.scan_type})"
211215
self.test = self.create_test(test_type_name)
216+
else:
217+
# During reimport, validate that the test_type matches
218+
# Calculate the expected test_type_name from the incoming report
219+
expected_test_type_name = self.scan_type
220+
if test_raw.type:
221+
# If test_raw.type equals scan_type, use scan_type directly
222+
if test_raw.type == self.scan_type:
223+
expected_test_type_name = self.scan_type
224+
else:
225+
expected_test_type_name = f"{test_raw.type} Scan"
226+
if expected_test_type_name != self.scan_type:
227+
expected_test_type_name = f"{expected_test_type_name} ({self.scan_type})"
228+
# Compare with existing test's test_type name
229+
if self.test.test_type.name != expected_test_type_name:
230+
msg = (
231+
f"Test type mismatch: Test {self.test.id} has test_type '{self.test.test_type.name}', "
232+
f"but the report contains test_type '{expected_test_type_name}'. "
233+
f"Reimport with matching test_type or create a new test."
234+
)
235+
raise ValidationError(msg)
212236
# This part change the name of the Test
213237
# we get it from the data of the parser
214238
# Update the test and test type with meta from the raw test
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
{
2+
"name": "Test Without Type",
3+
"findings": [
4+
{
5+
"title": "Test Finding Without Type",
6+
"description": "This is a test finding without type field",
7+
"severity": "Medium",
8+
"active": true,
9+
"verified": true
10+
}
11+
]
12+
}
13+
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"name": "Test Tool1",
3+
"type": "Tool1",
4+
"findings": [
5+
{
6+
"title": "Test Finding 1",
7+
"description": "This is a test finding for Tool1",
8+
"severity": "High",
9+
"active": true,
10+
"verified": true
11+
}
12+
]
13+
}
14+
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"name": "Test Tool2",
3+
"type": "Tool2",
4+
"findings": [
5+
{
6+
"title": "Test Finding 2",
7+
"description": "This is a test finding for Tool2",
8+
"severity": "Medium",
9+
"active": true,
10+
"verified": true
11+
}
12+
]
13+
}
14+
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"name": "Test With Type Equal To Scan Type",
3+
"type": "Generic Findings Import",
4+
"findings": [
5+
{
6+
"title": "Test Finding With Type Equal To Scan Type",
7+
"description": "This is a test finding with type equal to scan_type",
8+
"severity": "High",
9+
"active": true,
10+
"verified": true
11+
}
12+
]
13+
}
14+

0 commit comments

Comments
 (0)