Skip to content
This repository has been archived by the owner on Aug 25, 2021. It is now read-only.

fasten-project/fasten-vm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

72 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

FASTEN DEMO VM

⚠ Archived repository: this repository is now archive. If you are willing to test/execute FASTEN we recommend to use FASTEN Docker deployment that provides a Docker Compose setup for running the full FASTEN pipeline.

This repository contains necessary scripts and configuration files to set up a virtual machine that has all the requirements and dependencies to run the whole FASTEN pipeline.

To find out more about the scripts, Kafka, and the VM's config, check out the README file in their folders.

Requirements

To set up a VM and run the FASTEN demo, the following requirements (i.e dependencies and tools) are needed:

Required packages on the VM

The following packages should be installed on the VM:

VM Backups

You also download the VM backup (OVF file) from here. Use password fasten to download the UbuntuServer-18.04.5-FASTEN-v0.2.ova file.

Running the FASTEN demo on the VM

Follow the below step to run the FASTEN demo:

1- First install the VirtualBox software for your system. 

2- Download the pre-made VM as explained here.

3- Open up the VirtualBox and go to File->Import Appliance. Then select the OVF file that you have downloaded in the previous step in order to import the VM's backup.

4- Start the imported VM, i.e. UbuntuServer-18.04.5-FASTEN

Note: The VM needs at least 4~6 CPU cores and 8 GB of RAM.

5- To login into Ubuntu server, use the following credentials:

username: fasten

password: 1234

Note: You can also SSH into the VM by running the command ssh [email protected] -p 2223. Use the above password to log in.

6- Before running the FASTEN demo, run the following commands to clean up the results of the previous runs and initialize the DBs and Kafka:

fasten@fasten_vm:~$ clean_up
fasten@fasten_vm:~$ init_all
fasten@fasten_vm:~$ load_java_coords

Note: For the first time, the init_all may produce warnings or erros, which can be ignored.

7- Finally, to run the demo, you can either execute start_all in the terminal or use tmux session which is explained as follows:

  • First, start tmux in terminal (it's recommended to SSH into the VM before starting tmux):
fasten@fasten_vm:~$ tmux
  • Press Ctrl+A (Ctrl+B also works) and then :. Type source scripts/tmux-java.conf.
  • Now, you should be able to see a terminal window with 7 panes and htop at the bottom. Press Ctrl+A and any of the arrow keys to switch between panes. In each pane, you can run a plug-in separately by simply hitting Enter.
  • To kill the whole session, press Ctrl+A and :. Type kill-session.

Note: To stop a running instance of the FASTEN server, press Ctrl+C.

Additional notes

  • The produced CGs, graphs, and repositories are stored at ~/data folder.
  • You can run psql_db command to run the PostgreSQL CLI tool for running queries and etc.
  • Each plug-in can also be launched separately by using the following commands in the terminal:
    • start_graphdb
    • start_metadatadb
    • start_opal
    • start_pom_analyzer
    • start_repo_cloner
    • start_rapid
    • start_pycg
    • start_restapi: To access the REST API on the host OS, use the command ssh -N [email protected] -p 2223 -L 127.0.01:8080:127.0.0.1:8080.

OS configuration

In the .profile file, a set of aliases, environment variables, and functions are defined to ease and facilitate running the FASTEN demo. Some of the frequently-used aliases are explained as follows:

  • init_kafka: Initializes Kafka by creating topics.
  • init_db: Initializes the PostgreSQL DB (i.e. metadata DB) by creating DBs, tables, users, and indexes.
  • init_all: Initializes both Kafka and the metadata DB.
  • clean_fasten_kafka: Deletes the Kafka topics and consumer groups.
  • clean_fasten_db: Erases the whole metadata DB, including the DB schema, tables, and users.
  • clean_fasten_data: Erases all the local data that were produced by running the FASTEN demo. That is, call graphs, repositories, indexed graphs.
  • clean_up: Erases Kafka's data, DBs, and all local data like graphs etc.
  • java_start_all: Launches the FASTEN server with all the plug-ins that are developed by TU Delft.
  • start_all: Starts the whole FASTEN pipeline with all the plug-ins by all partners.
  • psql_db: Starts PostgreSQL CLI tool for running SQL queries, etc.
  • load_java_coords: Loads Java's Maven coordintes. Note that you should run this once.
  • load_1_java: Loads the first Maven coordinate from the input coordinates file mvn.cords.txt.
  • load_py_coords: Loads Python's PyPi coordinates.

Interesting SQL Queries

Here are a number of SQL queries to check out the metadata DB for stored CGs, vulnerable packagess etc. To perform the queries, first run the following commands:

fasten@fasten_vm:~$ clean_up
fasten@fasten_vm:~$ init_all
fasten@fasten_vm:~$ load_java_coords
fasten@fasten_vm:~$ java_start_all

After executing the command java_start_all, wait at least 5 minutes so that the processed records are injected into the metadata DB (note that you can stop the server by pressing Ctrl+C). Next, run the vulnerability plug-in as follows:

fasten@fasten_vm:~$ start_vul_analyzer

Finally, run the PSQL CLI:

fasten@fasten_vm:~$ psql_fasten

Now, you can run the following SQL quries in the PSQL:

Getting full info for a package

SELECT p.package_name, pv.version, COUNT(DISTINCT m.namespace) AS number_of_modules, COUNT(*) AS number_of_functions
FROM packages p
  JOIN package_versions pv ON p.id = pv.package_id
  JOIN modules m ON m.package_version_id = pv.id
  JOIN callables c ON m.id = c.module_id
WHERE p.package_name = 'org.digidoc4j.dss:dss-tsl-jaxb'
  AND pv.version = '5.1.d4j.5'
GROUP BY p.package_name, pv.version
ORDER BY number_of_functions desc;

Full call graph

select c1.fasten_uri as source, c2.fasten_uri as target
  from callables c1
    join edges e on e.source_id = c1.id
    join callables c2 on e.target_id = c2.id
    join modules m on m.id = c1.module_id
    join package_versions pv on m.package_version_id = pv.id
    join packages p on p.id = pv.package_id
WHERE p.package_name = 'org.digidoc4j.dss:dss-tsl-jaxb'
  AND pv.version = '5.1.d4j.5';

Largest packages in terms of functions

select p.package_name, pv.version, count(*) as num_functions
from package_versions pv
  join packages p on pv.package_id = p.id
  join modules m on
     m.package_version_id = pv.id
  join callables c on c.module_id = m.id
group by p.package_name, pv.version
order by count(*) desc
limit 5;

Largest packages in terms of edges

SELECT p.package_name, pv.version, COUNT(*) as num_function_calls
FROM package_versions pv
  JOIN packages p ON pv.package_id = p.id
  JOIN modules m ON m.package_version_id = pv.id
  JOIN callables c ON c.module_id = m.id
  JOIN edges e ON e.source_id = c.id
WHERE c.is_internal_call is true
GROUP BY p.package_name, pv.version
ORDER BY COUNT(*) DESC
LIMIT 10;

Internal vs External calls

SELECT p.package_name, pv.version, tc.is_internal_call, COUNT(sc) AS num_calls
FROM packages p
  JOIN package_versions pv ON p.id = pv.package_id
  JOIN modules m ON m.package_version_id = pv.id
  JOIN callables sc ON sc.module_id = m.id
  JOIN edges e ON e.source_id = sc.id
  JOIN callables tc ON e.target_id = tc.id
WHERE p.package_name = 'org.digidoc4j:digidoc4j'
GROUP BY p.package_name, pv.version, tc.is_internal_call
ORDER BY pv.version desc, tc.is_internal_call desc;

Finding Vulnerable Dependencies

SELECT package_version_id, packages.package_name, package_versions.version
FROM dependencies
JOIN package_versions ON package_versions.id = package_version_id
JOIN packages ON packages.id = package_versions.package_id
WHERE dependency_id = (SELECT id
                       FROM packages
                       WHERE package_name = 'com.google.guava:guava')
                       AND '20.0' = ANY(version_range);

Functions with vulnerabilities

select fasten_uri, metadata->'vulnerabilities'->0->'id' as CVE
from callables where metadata->'vulnerabilities'->0->'id'
is not null;

Particular function that has a vulnerability

SELECT id, is_internal_call, fasten_uri
FROM callables
WHERE fasten_uri='/com.google.common.io/ByteStreams.toByteArray(%2Fjava.io%2FInputStream)%2Fjava.lang%2FByteType%5B%5D';

The vulnerability checker

CALL is_vulnerable(pkg_name => 'org.digidoc4j:digidoc4j', pkg_version => '1.0.7.1');
CALL is_vulnerable(pkg_name => 'org.digidoc4j.dss:dss-utils-google-guava', pkg_version => '5.1.d4j.5');

About

A Virtual Machine for the FASTEN Demo

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •  

Languages