Skip to content

Commit

Permalink
MEND scan (#411)
Browse files Browse the repository at this point in the history
  • Loading branch information
carrolp authored Nov 8, 2023
1 parent ecc9234 commit 9c7127b
Show file tree
Hide file tree
Showing 6 changed files with 275 additions and 241 deletions.
3 changes: 3 additions & 0 deletions .dockerignore
Original file line number Diff line number Diff line change
Expand Up @@ -13,3 +13,6 @@ kubernetes/
.env/
testdata/
.*

# MEND unified agent
wss-unified-agent.jar
3 changes: 3 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -63,3 +63,6 @@ typings/
########### Custom ignores ###########
dev/
.npmrc

# MEND unified agent
wss-unified-agent.jar
7 changes: 7 additions & 0 deletions .travis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,11 @@ services:

before_install:
- echo "$DOCKERHUB_TOKEN" | docker login -u "icdevops" --password-stdin
- export WS_APIKEY=${WS_APIKEY}
- export WS_USERKEY=${WS_USERKEY}
- export WS_PRODUCTNAME=${WS_PRODUCTNAME}
- export WS_PROJECTNAME=FeatureFlagSetLD
- export WS_WSS_URL=https://ibmets.whitesourcesoftware.com/agent

script:
# Audit npm packages. Fail build whan a PR audit fails, otherwise report the vulnerability and proceed.
Expand All @@ -19,6 +24,8 @@ script:
- docker images
- ./build/process-template.sh kubernetes/FeatureFlagSetLD/resource.yaml >/tmp/resource.yaml
- if [[ "${TRAVIS_TAG}" =~ ^[0-9]+\.[0-9]+\.[0-9]+$ ]]; then npm version --no-git-tag-version "${TRAVIS_TAG}"; fi
# Perform UA scan on non-PR builds
- if [ "${TRAVIS_PULL_REQUEST}" = "false" ]; then curl -LJO https://unified-agent.s3.amazonaws.com/wss-unified-agent.jar; java -jar wss-unified-agent.jar -d . || echo "UA Scan Error occurred"; fi

before_deploy:
- docker login -u="${QUAY_ID}" -p="${QUAY_TOKEN}" quay.io
Expand Down
55 changes: 27 additions & 28 deletions audit-ci.json
Original file line number Diff line number Diff line change
@@ -1,29 +1,28 @@
{
"low": true,
"_allowListExample": [
{
"GHSA-1234-5678-9012": {
"active": true,
"notes": "The package X has vuln Y that is ignored because Y",
"expiry": "2077-04-01"
}
},
],
"allowlist": [
{
"GHSA-p8p7-x288-28g6": {
"active": true,
"notes": "The Request package through 2.88.2 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP)",
"expiry": "2023-10-01"
}
},
{
"GHSA-72xf-g2v4-qvf3": {
"active": true,
"notes": "The Request package (see above) requires tough-cookie at a vulnerable version.",
"expiry": "2023-10-01"
}
} ],
"skip-dev": true
}

"low": true,
"_allowListExample": [
{
"GHSA-1234-5678-9012": {
"active": true,
"notes": "The package X has vuln Y that is ignored because Y",
"expiry": "2077-04-01"
}
},
],
"allowlist": [
{
"GHSA-p8p7-x288-28g6": {
"active": true,
"notes": "The Request package through 2.88.2 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP)",
"expiry": "2023-12-31"
}
},
{
"GHSA-72xf-g2v4-qvf3": {
"active": true,
"notes": "The Request package (see above) requires tough-cookie at a vulnerable version.",
"expiry": "2023-12-31"
}
} ],
"skip-dev": true
}
Loading

0 comments on commit 9c7127b

Please sign in to comment.