-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add owasp dependency check action #31511
Conversation
I'll probably need to tune it in a few iterations to get the best format, unfortunately it is not run as part of the PR which brings it |
0506e56
to
5a500db
Compare
ee40415
to
dd11330
Compare
@gsmet @aloubyansky Hi, I've experimented quite a lot with running an aggregate report with and without
FYI, the difference between I'll open for review tomorrow once Guillaume does the alpha 5 release |
This comment has been minimized.
This comment has been minimized.
@sberyozkin getting there... I had a look at the CI and what bugs me is that we won't have any report if something's failing. Should we include it in the usual reporting? I'm also not sure if something is failing if there is a security problem or if it's just a report? |
dd11330
to
c651698
Compare
This comment has been minimized.
This comment has been minimized.
Hi @gsmet, apologies, seeing your comment only now.
and
I'm not sure I understand the questions, I think I might be partially, OK, so right now, the only output of this action is an HTML report in The other thing is that it is not expected to fail, it is possible to configure it to fail when it sees the first CVE of some category, but I believe it is simpler to get the HTML report in So right now, the main challenge, as I see it, is to get an access to the HTML report in What do you think ? |
Could we simply attach the report using the
Potentially we could also figure out how to send it via email to interested people? I would also, for better troubleshooting, add the |
Uhm, the HTML report is 20 megabytes big, so it's probably not a good idea to receive it by email every day. We probably should thus also decrease the retention period (default is 90 days):
|
If we get the report published daily in the workflow's artifacts, then the responsible engineer(s) would just have to open it and skim through it once every few days |
c651698
to
4c3ae87
Compare
Hey @jmartisk Thanks, that was was missing, an upload artifact step, thanks
I agree, uploading it shoul be enough, though I guess what we can send, is a link, but then the question of managing emails, with all the GDPR angle, would make it tricky.
May be we can try say every 3 days ?
Sure, that would be the plan, myself, two of us, can look at it periodically |
Yeah let's make it run, say, on Sunday, Tuesday, Thursday, or something like that :) |
@jmartisk How about Sunday, Wednesday end of the day ( |
Sure, works for me |
df1c254
to
5782319
Compare
It should be ready for review now, I can open tomorrow |
Hi @gsmet @aloubyansky, I think/hope, after @jmartisk review that it can prove to be practically useful, now that the HTML reports will be uploaded, we can continue tuning things like the action frequency (twice per week now), retention period of the uploaded reports, etc. |
build-parent/pom.xml
Outdated
<nuspecAnalyzerEnabled>false</nuspecAnalyzerEnabled> | ||
<retireJsAnalyzerEnabled>false</retireJsAnalyzerEnabled> | ||
</configuration> | ||
</plugin> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it necessary to have it configured in the root pom and here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @aloubyansky, sorry, missed your ping, OK, right now on main, one can only run the check from the individual extensions which won't work with the action, but I can see I can run it from the extensions
folder, which I believe would require setting a working-directory
property to point to extensions
- but I'm not sure it will be equivalent to running it from the root folder, let me experiment a bit later on and I'll get back to you with the update, thanks
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi Alexey @aloubyansky Sorry for a delay, I just run, on this branch, mvn -Dowasp-report
in the root (not possible if the root pom does not have it configured) and in extensions
(which is possible on main, for -Dowasp-check for now).
The dependency-check.html is 20 MB if created in the root, and 13 MB if created in extensions.
I think it makes sense to run from the root as it can check more dependencies, for dev tools, etc...
Do you agree ?
Thanks
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure, my question was about the reason why the config is duplicated. If you configure it in the pluginManagement of the root POM then here you could remove the version and the configuration element.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@aloubyansky Oh sorry, see what you mean, totally misunderstood your question :-), I'll have a look to clean it up, thanks
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @aloubyansky I removed the owasp plugin section from the build parent pom, hopefully I did it correctly, thanks.
This comment has been minimized.
This comment has been minimized.
5782319
to
9ae0d45
Compare
Failing Jobs - Building 9ae0d45
Failures⚙️ JVM Tests - JDK 17 #- Failing: integration-tests/kafka-oauth-keycloak
📦 integration-tests/kafka-oauth-keycloak✖ |
I think this is ready to go, isn't it? @sberyozkin @aloubyansky |
Thanks @aloubyansky @jmartisk @gsmet Hopefully it will prove useful and we can optimize the action to minimize some noise in the report, etc |
I'm not 100% sure it is correct since I've never done github actions before, I just copied the codeql one and modified.
Also, I'm not sure if, instead of doing a check goal it would be better to have