mirror of
https://github.com/ysoftdevs/DependencyCheck.git
synced 2026-01-15 16:23:37 +01:00
Compare commits
2267 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
1a042fab4b | ||
|
|
c3f000c5ef | ||
|
|
e848dd5bee | ||
|
|
566e11f755 | ||
|
|
13aa00e465 | ||
|
|
e9df060e0c | ||
|
|
c4724e8020 | ||
|
|
9c36087dae | ||
|
|
99dd04a1c1 | ||
|
|
29c47e3e96 | ||
|
|
659248ff22 | ||
|
|
71a7e8d2dc | ||
|
|
caabdc6584 | ||
|
|
0b92d2ec17 | ||
|
|
db8bcd8fd6 | ||
|
|
17cb96ef41 | ||
|
|
2248380c90 | ||
|
|
ffe64d2f8f | ||
|
|
a0c624fca6 | ||
|
|
31022ea8de | ||
|
|
0d0de4d5b3 | ||
|
|
1fdb4c4627 | ||
|
|
76665c54e2 | ||
|
|
04166766da | ||
|
|
aa7f903210 | ||
|
|
c4ca53cdf9 | ||
|
|
d5885acd6e | ||
|
|
550b3332a3 | ||
|
|
93b98576b8 | ||
|
|
e6f2c25167 | ||
|
|
0b207c6141 | ||
|
|
3ed5e85646 | ||
|
|
4068da33c8 | ||
|
|
d1d53ee65b | ||
|
|
38413c4f64 | ||
|
|
a6bb6cd170 | ||
|
|
145bf70420 | ||
|
|
e2c92c57e6 | ||
|
|
bcc2173768 | ||
|
|
aa1df53ab0 | ||
|
|
fb6a2a2c37 | ||
|
|
f403fc732c | ||
|
|
03aa7c56a2 | ||
|
|
547d6d4bcc | ||
|
|
2cba8f906d | ||
|
|
bb5ee6a347 | ||
|
|
34604efde4 | ||
|
|
c232a4fbad | ||
|
|
0c5dfdbe24 | ||
|
|
c0f9a382b3 | ||
|
|
8ca32fcace | ||
|
|
0461a9fc89 | ||
|
|
2b600290ae | ||
|
|
56fd3f2566 | ||
|
|
142e06e752 | ||
|
|
cbf2a047be | ||
|
|
1880e22d22 | ||
|
|
963b1eae1c | ||
|
|
d173573e6c | ||
|
|
b6c0426c1c | ||
|
|
4f18e9ee7f | ||
|
|
e227b90370 | ||
|
|
360b112bd2 | ||
|
|
ff7027439d | ||
|
|
a5ed91611a | ||
|
|
168b1c3684 | ||
|
|
7e1141ff16 | ||
|
|
168d55c54c | ||
|
|
d5ed2bc765 | ||
|
|
940a4613ee | ||
|
|
4f6d96e16b | ||
|
|
707d9925a8 | ||
|
|
657340c912 | ||
|
|
3e220704a1 | ||
|
|
4a2309a3f8 | ||
|
|
09122be7be | ||
|
|
e26ec47ad7 | ||
|
|
05ae73eea2 | ||
|
|
511d2b9457 | ||
|
|
bf96c24ec3 | ||
|
|
e328ec990c | ||
|
|
a5dee0cb27 | ||
|
|
7fb5d5bde5 | ||
|
|
5a329b4a6d | ||
|
|
500f6c5b6f | ||
|
|
29f76ba62a | ||
|
|
70e0c84a20 | ||
|
|
3dd95180e0 | ||
|
|
dcd8fc0320 | ||
|
|
bcd9fb0be9 | ||
|
|
a088d20612 | ||
|
|
29fb347bbb | ||
|
|
b2a436b3bc | ||
|
|
d288912df1 | ||
|
|
7bde6baaac | ||
|
|
26ca6d9b77 | ||
|
|
961626a136 | ||
|
|
641a311537 | ||
|
|
995ba02357 | ||
|
|
fb3e6e4208 | ||
|
|
e5363f7c8f | ||
|
|
d1a128b897 | ||
|
|
2b5fb4d75a | ||
|
|
6439ddde23 | ||
|
|
f2994ed4ff | ||
|
|
019bf67f93 | ||
|
|
78c1dcd0d0 | ||
|
|
e07b30df85 | ||
|
|
96cd517c36 | ||
|
|
2cb8e00c99 | ||
|
|
92f093009e | ||
|
|
27256a1854 | ||
|
|
ba782ca56f | ||
|
|
3f3e33a366 | ||
|
|
343fd75477 | ||
|
|
7bcfb6ff49 | ||
|
|
78ec08792f | ||
|
|
461b41f300 | ||
|
|
5b246424fb | ||
|
|
6af4b4cd5e | ||
|
|
6d348eb5a7 | ||
|
|
b26f6b697a | ||
|
|
554510bb78 | ||
|
|
3f2e5b7c69 | ||
|
|
3c4989f5ca | ||
|
|
d33c649be6 | ||
|
|
c55954e5e8 | ||
|
|
678311e65b | ||
|
|
ab1d3075e8 | ||
|
|
0a6f8b7ac1 | ||
|
|
422a1f78fc | ||
|
|
f21af8bd1e | ||
|
|
924278e387 | ||
|
|
c6ea4466fb | ||
|
|
318cc7a8fb | ||
|
|
9554a30286 | ||
|
|
5336da52d9 | ||
|
|
bd0c2e4ee4 | ||
|
|
64aad66adc | ||
|
|
587bf131db | ||
|
|
fc96c727ec | ||
|
|
d17bd5bd9e | ||
|
|
b22a935a6c | ||
|
|
a7c1d594dc | ||
|
|
dd20a9c7cc | ||
|
|
e0994e0e54 | ||
|
|
0f8ce09646 | ||
|
|
871e27d19f | ||
|
|
c429df3280 | ||
|
|
13f355c385 | ||
|
|
d33ddefb2d | ||
|
|
75b3f4b3c8 | ||
|
|
03ce1d2ea8 | ||
|
|
08eae2b09c | ||
|
|
c94f9e2d2b | ||
|
|
520370688c | ||
|
|
725949db2f | ||
|
|
5d647155b6 | ||
|
|
c152bd0517 | ||
|
|
f35146d93d | ||
|
|
e8e58555d0 | ||
|
|
7190dcc04e | ||
|
|
b623e3b3c8 | ||
|
|
d78e82bd56 | ||
|
|
ff478253e3 | ||
|
|
85c3368cda | ||
|
|
a4095cec8d | ||
|
|
c840ce249f | ||
|
|
b70812fc3d | ||
|
|
3ccf06321d | ||
|
|
1d5dd5ea11 | ||
|
|
0cadd88769 | ||
|
|
75499a3321 | ||
|
|
5096027523 | ||
|
|
5c8c07794d | ||
|
|
18a72bbb59 | ||
|
|
7b3c4475da | ||
|
|
419c446f01 | ||
|
|
735c16cc11 | ||
|
|
ed41abcf9d | ||
|
|
b750a8c802 | ||
|
|
1ee75dd8cb | ||
|
|
396efad518 | ||
|
|
8f33be262a | ||
|
|
9daa111f9c | ||
|
|
889bf22840 | ||
|
|
f46e96c7de | ||
|
|
9be6dc2935 | ||
|
|
6188f6d74a | ||
|
|
8837fab9fa | ||
|
|
316339011b | ||
|
|
fe7121e057 | ||
|
|
bc09bfd3ba | ||
|
|
26f19cead1 | ||
|
|
777b35f412 | ||
|
|
9e94ffb422 | ||
|
|
b6a38bf4d1 | ||
|
|
92d12ec68e | ||
|
|
93dd5e4b31 | ||
|
|
79e325e2ab | ||
|
|
0e095018a4 | ||
|
|
7040071ab9 | ||
|
|
e157350d03 | ||
|
|
28f6ef5eec | ||
|
|
15bcee3d10 | ||
|
|
67dbf70f5b | ||
|
|
c75b99837f | ||
|
|
cbc951be62 | ||
|
|
f5b38852a7 | ||
|
|
45b5fd3762 | ||
|
|
04c14f3a27 | ||
|
|
a55d89cc93 | ||
|
|
888801ab0c | ||
|
|
731528ef6e | ||
|
|
d7fbd0df47 | ||
|
|
6f95e6d499 | ||
|
|
79e6a13b29 | ||
|
|
b9a53775b6 | ||
|
|
1b15603227 | ||
|
|
a7ffeb7016 | ||
|
|
13b1c0fe0c | ||
|
|
1d259c510f | ||
|
|
56783bbf4d | ||
|
|
e63c296b16 | ||
|
|
57450a65cf | ||
|
|
716b52ef90 | ||
|
|
6ab8552f44 | ||
|
|
9880483690 | ||
|
|
7b9b459b74 | ||
|
|
0723606120 | ||
|
|
4261e9eb29 | ||
|
|
a322556c66 | ||
|
|
b6d3efa042 | ||
|
|
4019a0615c | ||
|
|
376e486c47 | ||
|
|
5b7c47682b | ||
|
|
741a803ea7 | ||
|
|
8a886f5434 | ||
|
|
01514af188 | ||
|
|
c5d5dccc57 | ||
|
|
5e58304448 | ||
|
|
dd9c4bfa42 | ||
|
|
e6a559f0d1 | ||
|
|
f1c860f68c | ||
|
|
cd175816e2 | ||
|
|
1d74d2e241 | ||
|
|
c4479a36a9 | ||
|
|
cc2c18243e | ||
|
|
211d34fcef | ||
|
|
dc60c24d89 | ||
|
|
922e6437cf | ||
|
|
1058157827 | ||
|
|
33b38e686a | ||
|
|
a6014f30dd | ||
|
|
3fc75df55d | ||
|
|
2bcd9d78e8 | ||
|
|
723b9e9cea | ||
|
|
efb7088cd8 | ||
|
|
f2131102f5 | ||
|
|
eae04bb156 | ||
|
|
11716128df | ||
|
|
5122808189 | ||
|
|
3c1905f941 | ||
|
|
3348086c00 | ||
|
|
919efc5037 | ||
|
|
04ab0e09d5 | ||
|
|
c8862cb927 | ||
|
|
ac135ec2b6 | ||
|
|
0257000d1a | ||
|
|
608b95e941 | ||
|
|
e6a2c5b5b4 | ||
|
|
a546aadba1 | ||
|
|
5934588b2c | ||
|
|
3ad5482a30 | ||
|
|
c3902447af | ||
|
|
764aa466f4 | ||
|
|
9ffda6cd17 | ||
|
|
8281fb09fc | ||
|
|
b6988f96fb | ||
|
|
4597c13d9a | ||
|
|
acf7297c8d | ||
|
|
bbdc8298d9 | ||
|
|
4d9f102033 | ||
|
|
0056e1052c | ||
|
|
7b729e078b | ||
|
|
6a0623f1e7 | ||
|
|
542c871152 | ||
|
|
77189eeeb1 | ||
|
|
340172ab56 | ||
|
|
afcfed1c67 | ||
|
|
59ce3bb64d | ||
|
|
81c5aa73d2 | ||
|
|
12ff05208c | ||
|
|
dc0ef70699 | ||
|
|
6ce735dcc7 | ||
|
|
faf3298f7a | ||
|
|
4f1b6b4bf1 | ||
|
|
99702fdb67 | ||
|
|
7bce7691e4 | ||
|
|
7f90160936 | ||
|
|
f367ad7185 | ||
|
|
29a31476b1 | ||
|
|
b844b66614 | ||
|
|
3e6fa1ed1f | ||
|
|
e141b4eb9f | ||
|
|
c794194bb5 | ||
|
|
3a31902e78 | ||
|
|
fedafe55c3 | ||
|
|
1c0b885267 | ||
|
|
8e4791048b | ||
|
|
e28be6f2b7 | ||
|
|
55271b8e83 | ||
|
|
8b5d8679f7 | ||
|
|
51d8ced8ce | ||
|
|
1cc94dd60b | ||
|
|
6d107e79b6 | ||
|
|
6f44b4dce1 | ||
|
|
1600492780 | ||
|
|
5f396cc647 | ||
|
|
49bd45d88c | ||
|
|
c41e673346 | ||
|
|
cf8d1a490c | ||
|
|
962f20296c | ||
|
|
e9c1ae1893 | ||
|
|
5db51a2abf | ||
|
|
63be1efed9 | ||
|
|
7fe3c659e0 | ||
|
|
4d76c7685c | ||
|
|
b50bcde028 | ||
|
|
9a8b61ae47 | ||
|
|
c31880d8de | ||
|
|
1496dc8e7d | ||
|
|
cdbd513e42 | ||
|
|
653bf1764e | ||
|
|
df08acfe9e | ||
|
|
e7a5287bb4 | ||
|
|
656f26cc9d | ||
|
|
52385ddac4 | ||
|
|
50c58667ba | ||
|
|
9cc6ca5ebe | ||
|
|
34b82a3f84 | ||
|
|
d0401f3f8d | ||
|
|
f247978d12 | ||
|
|
999116c75e | ||
|
|
04e9f5b15b | ||
|
|
78b0f7798f | ||
|
|
b0727ef3cf | ||
|
|
01fb31fc15 | ||
|
|
a1187acc31 | ||
|
|
fe4a24a651 | ||
|
|
3dcce572d3 | ||
|
|
ece69014ce | ||
|
|
fc6bb67e56 | ||
|
|
968de2947b | ||
|
|
6f9ba0033f | ||
|
|
4d4672fc4d | ||
|
|
70859eb719 | ||
|
|
ae9daf7f33 | ||
|
|
ff0daa8d66 | ||
|
|
09f1a0ac92 | ||
|
|
e562be77f6 | ||
|
|
af7c6bc2a0 | ||
|
|
e49cbcf345 | ||
|
|
b4218ff0e8 | ||
|
|
4af174d27b | ||
|
|
203a7da23a | ||
|
|
9833ff20d1 | ||
|
|
638b3c0695 | ||
|
|
01ef2e1061 | ||
|
|
56aea8ad24 | ||
|
|
d530eddc57 | ||
|
|
1eab76aab8 | ||
|
|
167dbd7368 | ||
|
|
2594fb1c5f | ||
|
|
c57d21e9bc | ||
|
|
9c15bdfe41 | ||
|
|
64dedf892d | ||
|
|
d6fc456039 | ||
|
|
df606674db | ||
|
|
1e3a7ff4ba | ||
|
|
b53de8c69b | ||
|
|
0f3ffaf270 | ||
|
|
25238d5fb5 | ||
|
|
cf677bd70e | ||
|
|
42939e4922 | ||
|
|
7c4cc1334b | ||
|
|
ff4a1e0ac6 | ||
|
|
069e22049d | ||
|
|
135ed5c614 | ||
|
|
13d7d29630 | ||
|
|
889f315c0a | ||
|
|
5a0e280899 | ||
|
|
ccb5e234b3 | ||
|
|
2caccab85f | ||
|
|
085ab48f3f | ||
|
|
a28c2819fa | ||
|
|
40beec2e40 | ||
|
|
d136aeda84 | ||
|
|
fdd6c47cd5 | ||
|
|
c5a2b5b3d8 | ||
|
|
babe4739c5 | ||
|
|
49e8ee443c | ||
|
|
a5d8ce07d8 | ||
|
|
babc016b48 | ||
|
|
a5f378d755 | ||
|
|
ebf995537e | ||
|
|
49edb6c2e1 | ||
|
|
423f26852f | ||
|
|
f931412bee | ||
|
|
bef0657801 | ||
|
|
d79d5b5f33 | ||
|
|
4c5489efd3 | ||
|
|
d5753b9589 | ||
|
|
a841027d48 | ||
|
|
73bea8e63f | ||
|
|
bbc8bab4da | ||
|
|
019f6dfb8b | ||
|
|
3b6a2a2908 | ||
|
|
c2b757ad6f | ||
|
|
efeba40f2b | ||
|
|
018e4bc382 | ||
|
|
88924ea520 | ||
|
|
4461c2e4a4 | ||
|
|
1c4aceb0fb | ||
|
|
a5b396a60d | ||
|
|
efd96ed892 | ||
|
|
fe88785846 | ||
|
|
0dcb0fb325 | ||
|
|
0825843d0f | ||
|
|
8c4df134e4 | ||
|
|
dfed5067f3 | ||
|
|
2b78e8fdc1 | ||
|
|
63c7a9d926 | ||
|
|
6609481cc1 | ||
|
|
a37853def6 | ||
|
|
9f348cfa16 | ||
|
|
52293f2596 | ||
|
|
54d3a73282 | ||
|
|
ab2d3b70cb | ||
|
|
451df460f6 | ||
|
|
b4afa01887 | ||
|
|
2ea95f5bf9 | ||
|
|
22602f42f2 | ||
|
|
b2c5183043 | ||
|
|
9f6559c7fb | ||
|
|
ef04c16237 | ||
|
|
dd85bfd2ab | ||
|
|
7152a05bfd | ||
|
|
754c2fc9bf | ||
|
|
85ad0b881f | ||
|
|
db6c471cc6 | ||
|
|
300d990276 | ||
|
|
9c55b889cb | ||
|
|
735f76cc0b | ||
|
|
d1c27a4298 | ||
|
|
650f09bbc5 | ||
|
|
08bf16971a | ||
|
|
ccb149240e | ||
|
|
ae22719985 | ||
|
|
55c4d729bb | ||
|
|
429f0966f0 | ||
|
|
7a246b90b9 | ||
|
|
d2e7de5505 | ||
|
|
a9eab16502 | ||
|
|
d59cce8080 | ||
|
|
9390e71dd9 | ||
|
|
65992243fa | ||
|
|
c81b8b0171 | ||
|
|
0671d12628 | ||
|
|
a892c5e7b7 | ||
|
|
b5c21ffbf0 | ||
|
|
bb2b25cca5 | ||
|
|
b3867244ba | ||
|
|
6bf8d396e0 | ||
|
|
6394c1a7b4 | ||
|
|
ccd656845d | ||
|
|
2931e8454c | ||
|
|
112b158795 | ||
|
|
921001000f | ||
|
|
3e3a8e9f98 | ||
|
|
7440a039fd | ||
|
|
e73f9ab02f | ||
|
|
59815b858e | ||
|
|
7df7f59d93 | ||
|
|
e971bc1991 | ||
|
|
a3f0f12779 | ||
|
|
2a9c214593 | ||
|
|
3fc37f3e5e | ||
|
|
ebe4423e25 | ||
|
|
cfafb4a101 | ||
|
|
8d538a9977 | ||
|
|
cc2953d6a3 | ||
|
|
c888019068 | ||
|
|
56639d3965 | ||
|
|
09ff99823e | ||
|
|
5078e32dc7 | ||
|
|
ecaadff0d8 | ||
|
|
f2ad8cc7d1 | ||
|
|
c8d77eb213 | ||
|
|
fe3d9e8bf6 | ||
|
|
6c4171be75 | ||
|
|
4bbb466e43 | ||
|
|
c478415667 | ||
|
|
fc832b67c5 | ||
|
|
943a9ea97e | ||
|
|
2c7ab297d7 | ||
|
|
d8299f7db1 | ||
|
|
4deeb33f08 | ||
|
|
3bf4cf8c85 | ||
|
|
e0217fc6c3 | ||
|
|
62a3efa23a | ||
|
|
cc7ebe6d52 | ||
|
|
5d920e4b44 | ||
|
|
1264ea54a1 | ||
|
|
caa1d77d23 | ||
|
|
20a55b3342 | ||
|
|
8bfe67fc60 | ||
|
|
d42a1c6ab1 | ||
|
|
80a89ef6d1 | ||
|
|
1a0e605f0c | ||
|
|
573c8eb509 | ||
|
|
e676e3a14b | ||
|
|
af8c807ee0 | ||
|
|
dfaa5df965 | ||
|
|
32055ecdcc | ||
|
|
9db71c5f0c | ||
|
|
99856bf285 | ||
|
|
4d006b3e05 | ||
|
|
4e37165ba6 | ||
|
|
38a5834785 | ||
|
|
d6e1352869 | ||
|
|
bf1b7bd7a2 | ||
|
|
2306327057 | ||
|
|
2d389ba73f | ||
|
|
ce8d5bc635 | ||
|
|
8fdc2007e0 | ||
|
|
88a97769de | ||
|
|
589c761cb0 | ||
|
|
3e6787fd61 | ||
|
|
aff52ee3f5 | ||
|
|
4555b02592 | ||
|
|
e1d4599a93 | ||
|
|
1a1e141cb8 | ||
|
|
33218f41e8 | ||
|
|
8772cda47a | ||
|
|
512eb713e4 | ||
|
|
0f90d48c62 | ||
|
|
658860e396 | ||
|
|
7522dae557 | ||
|
|
e34e65a3ba | ||
|
|
5a001a2c32 | ||
|
|
13a03eb250 | ||
|
|
cd863b6cca | ||
|
|
83b182dda5 | ||
|
|
3b90d1a564 | ||
|
|
d724855dfc | ||
|
|
78008330fe | ||
|
|
e716aad224 | ||
|
|
aa0d7cb4e9 | ||
|
|
0cd43ce35c | ||
|
|
ac98c8e395 | ||
|
|
70a8fc09c6 | ||
|
|
5b00d05e2e | ||
|
|
28c1730a02 | ||
|
|
c54483d36f | ||
|
|
2dd02ff8cb | ||
|
|
46c5501b7a | ||
|
|
f154826749 | ||
|
|
96383ef985 | ||
|
|
ab4b19dbab | ||
|
|
cdc53ac570 | ||
|
|
143cc1912e | ||
|
|
0d90b676bc | ||
|
|
5fadbb3d25 | ||
|
|
0ec99a3e12 | ||
|
|
1efbc44cc4 | ||
|
|
735fcfeee2 | ||
|
|
4a77150566 | ||
|
|
180a420219 | ||
|
|
d12ba8f3ef | ||
|
|
f333ef76d9 | ||
|
|
af5ba6854e | ||
|
|
8b7ce06793 | ||
|
|
297a5e516f | ||
|
|
92b11526be | ||
|
|
299350f655 | ||
|
|
127eafc9b3 | ||
|
|
ad1ad3a997 | ||
|
|
82151c5b3f | ||
|
|
90457c89ff | ||
|
|
3f3ac86d38 | ||
|
|
aa126039e5 | ||
|
|
662815b1ee | ||
|
|
243c36849c | ||
|
|
52d5baaf3f | ||
|
|
89217f778e | ||
|
|
9bc9bc9169 | ||
|
|
6b73430473 | ||
|
|
5ca5bca3df | ||
|
|
89ab382a18 | ||
|
|
bad425c0d7 | ||
|
|
cdbbb1b94c | ||
|
|
0a9d8a9b22 | ||
|
|
e662041d06 | ||
|
|
155464bc87 | ||
|
|
06cd811ae4 | ||
|
|
1b2cd354db | ||
|
|
1b31268f59 | ||
|
|
b57ef7291f | ||
|
|
c3bf6aa3f8 | ||
|
|
d2fa14bbe2 | ||
|
|
9b6e55e90c | ||
|
|
afb07b651f | ||
|
|
e6806fdf2b | ||
|
|
e5ff2cff4e | ||
|
|
17d7d47b9a | ||
|
|
64e32061ab | ||
|
|
931110ba6c | ||
|
|
d90e7820cd | ||
|
|
824898dba5 | ||
|
|
761dd61ed4 | ||
|
|
89c63e6d87 | ||
|
|
a2361f9327 | ||
|
|
ea15205be8 | ||
|
|
0a45048535 | ||
|
|
1c51655ce3 | ||
|
|
7749f0da7c | ||
|
|
5695238f95 | ||
|
|
e1feeb7e21 | ||
|
|
84fecaf040 | ||
|
|
da77727673 | ||
|
|
f8c913a3e8 | ||
|
|
2024881ee1 | ||
|
|
35ed3a51e5 | ||
|
|
24b1c4d0a4 | ||
|
|
7ec2458fb5 | ||
|
|
175feaea23 | ||
|
|
dda6cf728b | ||
|
|
a7fd410b01 | ||
|
|
d281c36733 | ||
|
|
dc91e44c0a | ||
|
|
7967a858f4 | ||
|
|
2081407e38 | ||
|
|
976eabd527 | ||
|
|
b6d6a5de2b | ||
|
|
2d58cfe0ce | ||
|
|
9df8bdff5f | ||
|
|
c86b821951 | ||
|
|
4def086bf9 | ||
|
|
885c890d7d | ||
|
|
06060a6694 | ||
|
|
70667814f6 | ||
|
|
766b7a940c | ||
|
|
0c37586357 | ||
|
|
b4aa55ce1f | ||
|
|
109443ce77 | ||
|
|
5f38741831 | ||
|
|
c6f391501d | ||
|
|
d1f3105fbd | ||
|
|
8f88ca9d3d | ||
|
|
f9e4ca0cc2 | ||
|
|
5caf023677 | ||
|
|
35c2f4873c | ||
|
|
1ed7bab375 | ||
|
|
f0d1bfb777 | ||
|
|
42519ac843 | ||
|
|
8869e13385 | ||
|
|
8f9cbfe806 | ||
|
|
6481938626 | ||
|
|
9c7cc2acbf | ||
|
|
89a57d4ed3 | ||
|
|
732378592b | ||
|
|
19dc46660b | ||
|
|
4aad3471af | ||
|
|
533b455356 | ||
|
|
92bd305b00 | ||
|
|
f71eb09f74 | ||
|
|
83d4a7bc18 | ||
|
|
58807d9021 | ||
|
|
29595324c4 | ||
|
|
f9064e526f | ||
|
|
93ec2e8639 | ||
|
|
0e2a31709a | ||
|
|
c785b39eda | ||
|
|
8fab2f58da | ||
|
|
e44ee3bfe1 | ||
|
|
62065c9d28 | ||
|
|
c76275275f | ||
|
|
257f78879d | ||
|
|
894263809c | ||
|
|
bc9458101c | ||
|
|
c503935d6a | ||
|
|
d4756c9eb8 | ||
|
|
0004767775 | ||
|
|
74908642c7 | ||
|
|
aadfb71c98 | ||
|
|
1244af649d | ||
|
|
7bd48cc811 | ||
|
|
8f3ce38418 | ||
|
|
1b2d9b4245 | ||
|
|
c6b2b34fde | ||
|
|
e58fc13fdb | ||
|
|
922d53d2e4 | ||
|
|
fec53b3951 | ||
|
|
e72e2c6a02 | ||
|
|
08d001ee05 | ||
|
|
99d8a07f4a | ||
|
|
eef565134b | ||
|
|
9d78293437 | ||
|
|
fc0a556e5f | ||
|
|
b6b070584f | ||
|
|
e13225eee6 | ||
|
|
da20fb2922 | ||
|
|
459c2beb12 | ||
|
|
f1cc44dead | ||
|
|
d24cfdc382 | ||
|
|
ae4cc543f6 | ||
|
|
abdb3d17f9 | ||
|
|
4095c5da38 | ||
|
|
78fab728e4 | ||
|
|
52097a6867 | ||
|
|
cb990b55b5 | ||
|
|
5070fe303a | ||
|
|
b4405ebf3e | ||
|
|
d9e6bf5068 | ||
|
|
6822188f52 | ||
|
|
15858d03ff | ||
|
|
814a733258 | ||
|
|
3ce85d8ca9 | ||
|
|
d3bff2f39d | ||
|
|
f2272730ac | ||
|
|
fe19c97d86 | ||
|
|
d49556bf3d | ||
|
|
56b447493e | ||
|
|
e45b68eda7 | ||
|
|
8df1ef5986 | ||
|
|
dac34cda82 | ||
|
|
9925e30c8b | ||
|
|
dc5566b5ae | ||
|
|
8132ee651a | ||
|
|
f49a134a3d | ||
|
|
bd955cda06 | ||
|
|
c6dbc01912 | ||
|
|
fabe1aa940 | ||
|
|
ba5dbb94b8 | ||
|
|
6ccc053d7e | ||
|
|
cf21dfaa3a | ||
|
|
54ceb630de | ||
|
|
0a0c302cb2 | ||
|
|
f6eef54566 | ||
|
|
a69804f84d | ||
|
|
0b06b194b0 | ||
|
|
73f6ce304c | ||
|
|
195818a432 | ||
|
|
47c817de1c | ||
|
|
8b3894f213 | ||
|
|
a411252f07 | ||
|
|
d7626aeb3f | ||
|
|
3565098650 | ||
|
|
803fcf146b | ||
|
|
d9d646c5fb | ||
|
|
034a274b07 | ||
|
|
718d7af8bc | ||
|
|
860d3d9c8b | ||
|
|
f28b566992 | ||
|
|
1c261c7463 | ||
|
|
226b2482b1 | ||
|
|
ff346dc429 | ||
|
|
2dcef25175 | ||
|
|
46702bbb5c | ||
|
|
5600c9bc69 | ||
|
|
d7e46b1693 | ||
|
|
fe8c60ade1 | ||
|
|
288892441f | ||
|
|
e1179a8e22 | ||
|
|
4b06d0fd87 | ||
|
|
464d91f45a | ||
|
|
5cc7aa25cc | ||
|
|
20ec224070 | ||
|
|
9cbcc29ddb | ||
|
|
0badbfc4a0 | ||
|
|
e042148c62 | ||
|
|
d8ba04ae7f | ||
|
|
314d5fdad2 | ||
|
|
5c874cafd1 | ||
|
|
8cafc14d09 | ||
|
|
25ac5033fc | ||
|
|
848be0db6c | ||
|
|
0f9da0731e | ||
|
|
8bc2364cce | ||
|
|
b64916ce3f | ||
|
|
452955667c | ||
|
|
f38bbf4cc7 | ||
|
|
25eaa11a52 | ||
|
|
4b4da8d467 | ||
|
|
13116c5381 | ||
|
|
d2cd406a62 | ||
|
|
acbce05fbf | ||
|
|
bee4d3a338 | ||
|
|
b9003a2f02 | ||
|
|
bce226002b | ||
|
|
a417db7c7a | ||
|
|
0ffef12a8b | ||
|
|
4539b040e0 | ||
|
|
f85014a86d | ||
|
|
d90d07c68b | ||
|
|
ce292b84fa | ||
|
|
01690860db | ||
|
|
89fb2d4915 | ||
|
|
5cc3a42832 | ||
|
|
6b303410d1 | ||
|
|
60b0145e04 | ||
|
|
8cae2f24b1 | ||
|
|
ce48823d38 | ||
|
|
0a04d753ea | ||
|
|
d43fee5585 | ||
|
|
35402c7bd3 | ||
|
|
5dc9e51dd4 | ||
|
|
847a97f61c | ||
|
|
235fcccbd7 | ||
|
|
fac27a6120 | ||
|
|
91c971b8fd | ||
|
|
2e24eda00d | ||
|
|
e43003cadc | ||
|
|
7a653abf22 | ||
|
|
9a96165655 | ||
|
|
ae09229107 | ||
|
|
994aef411c | ||
|
|
be35f48bdd | ||
|
|
094a180935 | ||
|
|
846173844e | ||
|
|
74e9de6370 | ||
|
|
59c28d8e51 | ||
|
|
c7f31b3d79 | ||
|
|
abdfa3ccf6 | ||
|
|
98d0239d03 | ||
|
|
99ad6634c4 | ||
|
|
ffeab147ce | ||
|
|
84556fb055 | ||
|
|
90bdbd6b84 | ||
|
|
26e14e0151 | ||
|
|
e29dd3cd33 | ||
|
|
3df2daa5cb | ||
|
|
23b95178ff | ||
|
|
c55efddc81 | ||
|
|
9bde80357f | ||
|
|
a59c8908f0 | ||
|
|
1485733715 | ||
|
|
a421c5f952 | ||
|
|
d125a7f09d | ||
|
|
37b0612d45 | ||
|
|
77486dffd4 | ||
|
|
07bc94f9f6 | ||
|
|
c84bcb433f | ||
|
|
82511880ac | ||
|
|
f1e5221257 | ||
|
|
2f5cc6a8a4 | ||
|
|
b8bf01acc3 | ||
|
|
f9a0f5e7a1 | ||
|
|
65aa7bd1de | ||
|
|
47b083eaca | ||
|
|
6f511444a7 | ||
|
|
8fcf5ee760 | ||
|
|
ef5174d89f | ||
|
|
f2006206d3 | ||
|
|
e2a97e75d8 | ||
|
|
c32361a428 | ||
|
|
9fc6e265eb | ||
|
|
ac83c2bc3c | ||
|
|
f81c42b1fd | ||
|
|
32808c16e7 | ||
|
|
8594e146eb | ||
|
|
e4e2433396 | ||
|
|
cda0dfdafe | ||
|
|
8196b6e69e | ||
|
|
363568b02c | ||
|
|
8dd49b6156 | ||
|
|
443ab02788 | ||
|
|
c4ab83a801 | ||
|
|
65784d6dc4 | ||
|
|
2c51b7b835 | ||
|
|
da805d037f | ||
|
|
bab49d04b7 | ||
|
|
d383776245 | ||
|
|
6963d66240 | ||
|
|
51eba8da73 | ||
|
|
8cbf3ffc6b | ||
|
|
14b4d64244 | ||
|
|
2a4693f6ed | ||
|
|
7cb7f68cda | ||
|
|
217256746c | ||
|
|
83300d028b | ||
|
|
6c90225024 | ||
|
|
e891ce39c0 | ||
|
|
92d8a894e3 | ||
|
|
e58b7782ac | ||
|
|
c89d619808 | ||
|
|
1ddb468a08 | ||
|
|
31dd4f6305 | ||
|
|
95e3f0e0d9 | ||
|
|
ff9715ede7 | ||
|
|
0edf017ddc | ||
|
|
ffd1e383c2 | ||
|
|
ad601fd1ee | ||
|
|
2cc4f8c2fe | ||
|
|
e7eaccb5e0 | ||
|
|
6f513eb359 | ||
|
|
6b201da3ff | ||
|
|
b235a5bb49 | ||
|
|
a85a47bc20 | ||
|
|
25f1912573 | ||
|
|
69b8f51319 | ||
|
|
d24d6f6b52 | ||
|
|
0d943ba805 | ||
|
|
afdb156c84 | ||
|
|
56fe3b5892 | ||
|
|
643d3600b8 | ||
|
|
c177f12e1d | ||
|
|
9c51bff55b | ||
|
|
72f9564757 | ||
|
|
81c91b3877 | ||
|
|
ab1a80152d | ||
|
|
3d365eb258 | ||
|
|
a87c677a35 | ||
|
|
6857f6d8f8 | ||
|
|
9e0ed57cec | ||
|
|
81bd9991bb | ||
|
|
767f4797b0 | ||
|
|
056fa9ded2 | ||
|
|
8f8c9c4582 | ||
|
|
a3792c474b | ||
|
|
9acfe3afdb | ||
|
|
ec233dbb46 | ||
|
|
9c03962c26 | ||
|
|
d89cd789ac | ||
|
|
a135460caa | ||
|
|
69088e162d | ||
|
|
7f72ef88e0 | ||
|
|
ec53bd4125 | ||
|
|
fa1adc5294 | ||
|
|
35a264d21c | ||
|
|
579b526196 | ||
|
|
0372c2eccc | ||
|
|
654e6942cb | ||
|
|
08c7ffc6d9 | ||
|
|
b7ed1429de | ||
|
|
e386f6ac20 | ||
|
|
6642c23761 | ||
|
|
60ab893888 | ||
|
|
f2b908c859 | ||
|
|
f2d960c3eb | ||
|
|
709840ca02 | ||
|
|
fb88aeaeb9 | ||
|
|
9fe596f3de | ||
|
|
94561de719 | ||
|
|
228bb2fc86 | ||
|
|
89ed18cea3 | ||
|
|
d07947f712 | ||
|
|
b996fa234b | ||
|
|
70022088fb | ||
|
|
f6cd5cb4b2 | ||
|
|
9143564d41 | ||
|
|
6ac8caaf5f | ||
|
|
55440ae32b | ||
|
|
e5a4145e37 | ||
|
|
db65c0b422 | ||
|
|
2c8b408bfb | ||
|
|
f0297938b6 | ||
|
|
58c5c04feb | ||
|
|
4d390b65fe | ||
|
|
b0d6070d28 | ||
|
|
294df359d5 | ||
|
|
3728594f73 | ||
|
|
a855d53542 | ||
|
|
dc2f1eabb2 | ||
|
|
57a0c48293 | ||
|
|
eda08e7454 | ||
|
|
bbc82d827e | ||
|
|
1bf4b6daa9 | ||
|
|
742b49e302 | ||
|
|
f757266282 | ||
|
|
8716f14941 | ||
|
|
0321823125 | ||
|
|
8b7b41de47 | ||
|
|
33d190afaa | ||
|
|
36fd4dbcf4 | ||
|
|
ff16c4f127 | ||
|
|
291a8c2bfb | ||
|
|
134728438e | ||
|
|
a1db394d93 | ||
|
|
754bd68a87 | ||
|
|
0933d96954 | ||
|
|
bd32eeeaa2 | ||
|
|
c4fcb6c88c | ||
|
|
1b9a3bd4bd | ||
|
|
2390b20e68 | ||
|
|
584d369b0b | ||
|
|
a6fd0434de | ||
|
|
0ebe052752 | ||
|
|
53b36472a0 | ||
|
|
535863bc52 | ||
|
|
ccefea6b59 | ||
|
|
dd925cd92b | ||
|
|
b24c63cb49 | ||
|
|
5529de3d95 | ||
|
|
38f69fd7cc | ||
|
|
ce6b65adb8 | ||
|
|
6a9ea3bc0f | ||
|
|
9897109332 | ||
|
|
d1b4e93f9e | ||
|
|
cfc851a99b | ||
|
|
9a6a61151d | ||
|
|
380178ccc8 | ||
|
|
497d0f0c74 | ||
|
|
3227ddd9f9 | ||
|
|
ecf1c90c22 | ||
|
|
336be63237 | ||
|
|
1aa13c1c8c | ||
|
|
37c9b9e1f5 | ||
|
|
251ad23a9e | ||
|
|
ebb3e02dcc | ||
|
|
22876e5a25 | ||
|
|
352505c54f | ||
|
|
12162e2aae | ||
|
|
0c7998712e | ||
|
|
2af09fb49d | ||
|
|
b9a20e7ac5 | ||
|
|
c58589026c | ||
|
|
7ab89b900c | ||
|
|
5b83919eb2 | ||
|
|
9620956727 | ||
|
|
f26f02c986 | ||
|
|
9b85768b7e | ||
|
|
c5d16a49d0 | ||
|
|
5276e1863d | ||
|
|
260b2c3532 | ||
|
|
0fc1a30a2c | ||
|
|
420da8f476 | ||
|
|
8609b98b1c | ||
|
|
c2a39d3296 | ||
|
|
c85514a17a | ||
|
|
6cd4bf337e | ||
|
|
d00bef5546 | ||
|
|
095c48a942 | ||
|
|
b905f46f98 | ||
|
|
e61ef1ae85 | ||
|
|
cdd4765d38 | ||
|
|
886b21af68 | ||
|
|
d62793f4ad | ||
|
|
7bba66737f | ||
|
|
d83d325a49 | ||
|
|
52fd2772cf | ||
|
|
e5baf99814 | ||
|
|
48043b5ec4 | ||
|
|
b4aeab3501 | ||
|
|
1f67ae82bd | ||
|
|
039bfd372d | ||
|
|
e7749c161d | ||
|
|
1a92de71d1 | ||
|
|
144f913aa9 | ||
|
|
d8279e11aa | ||
|
|
e28b6b9f73 | ||
|
|
b1b8584641 | ||
|
|
691636de7b | ||
|
|
11e75df1a9 | ||
|
|
6f2b1b8f06 | ||
|
|
25fc2bfbea | ||
|
|
139640e768 | ||
|
|
a93c84ff64 | ||
|
|
ae2fa19c0e | ||
|
|
986a4182d9 | ||
|
|
f8867abe49 | ||
|
|
d38a8b109b | ||
|
|
fd83e72177 | ||
|
|
711d8c8c6b | ||
|
|
1ff45c8e02 | ||
|
|
0d1d22aeff | ||
|
|
608c338403 | ||
|
|
ac2231f0f3 | ||
|
|
f23da0dd5a | ||
|
|
21344dacfc | ||
|
|
8c3f887cac | ||
|
|
ca22ba5bbc | ||
|
|
6e6f16d6ee | ||
|
|
fc64c34214 | ||
|
|
8a83385c7f | ||
|
|
c35bc2476d | ||
|
|
147bc797a2 | ||
|
|
222826af95 | ||
|
|
1735f36b82 | ||
|
|
db28db0bc7 | ||
|
|
a782354874 | ||
|
|
931f7d47ea | ||
|
|
21a709cf89 | ||
|
|
987ed1cefc | ||
|
|
76a0c1d96e | ||
|
|
3e9a77abfa | ||
|
|
1c30e555dc | ||
|
|
3879eb6b3a | ||
|
|
9bdff89833 | ||
|
|
5e5a2040fc | ||
|
|
08105eee48 | ||
|
|
eea44d7de2 | ||
|
|
40e13184ca | ||
|
|
3fcbf075fb | ||
|
|
b5a65c5e43 | ||
|
|
b2641494cc | ||
|
|
7eac65fec2 | ||
|
|
c48a794aee | ||
|
|
9bc974661c | ||
|
|
e53906aea8 | ||
|
|
b8c41a91e1 | ||
|
|
05a4a1670f | ||
|
|
3264becdc2 | ||
|
|
4bd35852a5 | ||
|
|
845bf6ada1 | ||
|
|
be4d56f8d2 | ||
|
|
865ef2beb3 | ||
|
|
dfbcd616f2 | ||
|
|
ace5353595 | ||
|
|
dc0106348d | ||
|
|
56a43fe17b | ||
|
|
f2666d4a30 | ||
|
|
46f36dc7ab | ||
|
|
4220e58d26 | ||
|
|
db0ac70b71 | ||
|
|
07de43981a | ||
|
|
6cfcc903df | ||
|
|
fa352c1a8f | ||
|
|
2ccae9f434 | ||
|
|
e5d582b30b | ||
|
|
139bf0ee35 | ||
|
|
8fb14ffdf3 | ||
|
|
1ce6e37e78 | ||
|
|
c16e85e7db | ||
|
|
462026e7e9 | ||
|
|
25a72e3508 | ||
|
|
2f180510b8 | ||
|
|
20411da67b | ||
|
|
53e67dfb27 | ||
|
|
81bfdc69dd | ||
|
|
ff951130b6 | ||
|
|
5e2829fe49 | ||
|
|
69ebb53a05 | ||
|
|
2aba09f090 | ||
|
|
1a2a3d1945 | ||
|
|
38e27309fb | ||
|
|
c8b967ba37 | ||
|
|
6b586684e6 | ||
|
|
83b713a781 | ||
|
|
773e280339 | ||
|
|
c930568df7 | ||
|
|
297a67cd00 | ||
|
|
95e2c6179f | ||
|
|
ceb61ebe74 | ||
|
|
dfdf690575 | ||
|
|
6c85e3502e | ||
|
|
db30517516 | ||
|
|
690192300f | ||
|
|
534b2e59a0 | ||
|
|
3ba963f474 | ||
|
|
5028216058 | ||
|
|
9b2cacc3a0 | ||
|
|
173947fd7d | ||
|
|
315a616293 | ||
|
|
9aa6ad216d | ||
|
|
3c56cd6738 | ||
|
|
b2a5963f5a | ||
|
|
a48ac013e8 | ||
|
|
c80fdee99b | ||
|
|
258602ce1a | ||
|
|
270db7829d | ||
|
|
c85b547502 | ||
|
|
5ff9ec9942 | ||
|
|
d6266c36bf | ||
|
|
2fc554e1d4 | ||
|
|
fdd7f30e9a | ||
|
|
7a35c1638b | ||
|
|
3994ef3619 | ||
|
|
916243468f | ||
|
|
633028a63f | ||
|
|
cb56bbc122 | ||
|
|
013374e9db | ||
|
|
d1b2d5cb27 | ||
|
|
4358b47e91 | ||
|
|
884b56a4ef | ||
|
|
6decc1ce30 | ||
|
|
eeb8d9cdf5 | ||
|
|
8a3dba3064 | ||
|
|
e8d7bbd280 | ||
|
|
27bcead1bc | ||
|
|
277ee4c4b2 | ||
|
|
acb9c01776 | ||
|
|
efa6c8135d | ||
|
|
79fd23d51b | ||
|
|
cbb705c367 | ||
|
|
776614d211 | ||
|
|
44326cd8c1 | ||
|
|
b03a498cd7 | ||
|
|
4592ab4bf5 | ||
|
|
b612926fb6 | ||
|
|
870849f01a | ||
|
|
b67377f505 | ||
|
|
a00bcc3df2 | ||
|
|
2033acbe2a | ||
|
|
122dc5baf4 | ||
|
|
e435cfc489 | ||
|
|
a276d2da4f | ||
|
|
a3199a52af | ||
|
|
6f04d4d43b | ||
|
|
99be870ab9 | ||
|
|
a966f263a2 | ||
|
|
9b2ecb4701 | ||
|
|
ac5a23ef29 | ||
|
|
be7443a0a0 | ||
|
|
b82804018d | ||
|
|
0de6557872 | ||
|
|
35b0b684df | ||
|
|
258e890056 | ||
|
|
a627ca2127 | ||
|
|
d84bbad79a | ||
|
|
05a1096e25 | ||
|
|
07e6477686 | ||
|
|
9600e56344 | ||
|
|
acde161412 | ||
|
|
1bb0871948 | ||
|
|
8d8f9c6d26 | ||
|
|
6ff50689e1 | ||
|
|
c7507d9743 | ||
|
|
9b025ddece | ||
|
|
ff970fde56 | ||
|
|
12fd77f0b2 | ||
|
|
2c4a997c64 | ||
|
|
0e60883b3d | ||
|
|
5c787e0b69 | ||
|
|
33b6bfe5be | ||
|
|
41da8435cc | ||
|
|
8167146372 | ||
|
|
84ecc4c664 | ||
|
|
21bbedaf04 | ||
|
|
d18a36af22 | ||
|
|
998aedde33 | ||
|
|
b3e766aa50 | ||
|
|
25050da2c9 | ||
|
|
0cee54c51b | ||
|
|
a74cf8ec4d | ||
|
|
41e436a183 | ||
|
|
e06f0a5d49 | ||
|
|
743fc19fa3 | ||
|
|
9d1ea4b551 | ||
|
|
76e8c66b1b | ||
|
|
e0410783be | ||
|
|
4379ea63f0 | ||
|
|
d064337c15 | ||
|
|
00ae54b4b2 | ||
|
|
6379bfb8b8 | ||
|
|
3a7fd7d271 | ||
|
|
220539e51a | ||
|
|
94a0c98bfe | ||
|
|
95cd215e9e | ||
|
|
c2b2b2698d | ||
|
|
88c04714f8 | ||
|
|
9bb630bae6 | ||
|
|
6d47e32cac | ||
|
|
c47b2f5b18 | ||
|
|
fc34b40c0a | ||
|
|
ecdc9a968d | ||
|
|
d95fa8a893 | ||
|
|
c041ff66e2 | ||
|
|
b48f83ff49 | ||
|
|
fe0e2d5c2d | ||
|
|
c189b258b4 | ||
|
|
2cf3bca8de | ||
|
|
06fc5e71c3 | ||
|
|
b2a817e17b | ||
|
|
8093927579 | ||
|
|
d1ca951ffa | ||
|
|
d9eed4a460 | ||
|
|
b3932ae8c5 | ||
|
|
9d609b6085 | ||
|
|
35223d5737 | ||
|
|
ef97f9c088 | ||
|
|
9d263f11e5 | ||
|
|
bb8aa0fe6f | ||
|
|
3f28b30e95 | ||
|
|
be441d2aa5 | ||
|
|
d797abdb1f | ||
|
|
73e089d330 | ||
|
|
3b3a940ee4 | ||
|
|
0a24fb57aa | ||
|
|
1b5b61b25e | ||
|
|
7f2c51f337 | ||
|
|
00d29b88df | ||
|
|
537e490f0f | ||
|
|
ab9bc9da74 | ||
|
|
4340368e49 | ||
|
|
b79f7b7ab8 | ||
|
|
a85fb3a871 | ||
|
|
9b34b5ca89 | ||
|
|
05a49ff5db | ||
|
|
b486788993 | ||
|
|
0bec242b2e | ||
|
|
563e9c51e1 | ||
|
|
831624897b | ||
|
|
6ab5e3ed4f | ||
|
|
ca8a0e9a88 | ||
|
|
43a6c81151 | ||
|
|
865ff7911a | ||
|
|
887a5d50a4 | ||
|
|
eefc6a5567 | ||
|
|
be68f8c3f7 | ||
|
|
bf3bc83fd8 | ||
|
|
86a4923157 | ||
|
|
03b06eee67 | ||
|
|
f80ff31412 | ||
|
|
3bc17e7b83 | ||
|
|
94acc82bf5 | ||
|
|
458297bf56 | ||
|
|
3c1a1fcca1 | ||
|
|
9673b2aa7c | ||
|
|
b3d08e4cb8 | ||
|
|
a55710df7b | ||
|
|
ab766ce85b | ||
|
|
73edd3bc40 | ||
|
|
bcb8245c61 | ||
|
|
f2ee243628 | ||
|
|
c9e60d5c3a | ||
|
|
88b1e668ee | ||
|
|
eb7c74eea7 | ||
|
|
1c92a47d75 | ||
|
|
40f5911ceb | ||
|
|
d2a9f0583a | ||
|
|
2a8809adbb | ||
|
|
2621d2e1dc | ||
|
|
39524c4064 | ||
|
|
1ce683a95a | ||
|
|
c1cc2d6350 | ||
|
|
3d5f725004 | ||
|
|
acb857f433 | ||
|
|
655bc4bee3 | ||
|
|
d343d92b17 | ||
|
|
c67d372667 | ||
|
|
43cb4716a9 | ||
|
|
54e45dac51 | ||
|
|
6222561431 | ||
|
|
5b0b594761 | ||
|
|
07b10e9e23 | ||
|
|
cdf6e3b456 | ||
|
|
dffe8cef7a | ||
|
|
cf46afea94 | ||
|
|
bb26626fd5 | ||
|
|
ea6cca588c | ||
|
|
2f207de1a0 | ||
|
|
1f9996fe62 | ||
|
|
a69419ed04 | ||
|
|
e0be6c746c | ||
|
|
be7c1ba914 | ||
|
|
2b62bf0337 | ||
|
|
461f6ad2c1 | ||
|
|
845825c0bf | ||
|
|
aff85cbfb8 | ||
|
|
f9b09e5b61 | ||
|
|
c0ce4523fa | ||
|
|
1403aa18eb | ||
|
|
65f8b3978d | ||
|
|
ba2fff249d | ||
|
|
80ca3e114e | ||
|
|
17447d3cdc | ||
|
|
330e803675 | ||
|
|
3f4c1e7029 | ||
|
|
337e9ac3ef | ||
|
|
543bbf34c2 | ||
|
|
dfb78788f9 | ||
|
|
5394151e42 | ||
|
|
2dc560f583 | ||
|
|
9349e9cd99 | ||
|
|
7355400548 | ||
|
|
594aa03c5a | ||
|
|
50b4630436 | ||
|
|
ff1328dbdd | ||
|
|
132d43f999 | ||
|
|
9ba44e32fb | ||
|
|
0627f20f5e | ||
|
|
245becdc8c | ||
|
|
40f329512b | ||
|
|
56f77e88a8 | ||
|
|
c196c08ada | ||
|
|
695e35634c | ||
|
|
8f1e0d57bf | ||
|
|
1f408dd7a7 | ||
|
|
c30c455a9f | ||
|
|
303a3ac376 | ||
|
|
cd0e8e1c6b | ||
|
|
221537601f | ||
|
|
cbeb91f9a9 | ||
|
|
f08919a829 | ||
|
|
a3830989ba | ||
|
|
cfb1f8c767 | ||
|
|
86427e2042 | ||
|
|
39d3e447ab | ||
|
|
8f079de0aa | ||
|
|
bb76242632 | ||
|
|
651727c697 | ||
|
|
6bfb709233 | ||
|
|
5c55f4d4bb | ||
|
|
ab9ec7145d | ||
|
|
c8502d3b7b | ||
|
|
6ec931fcd7 | ||
|
|
22e3b9b544 | ||
|
|
ae76a7f7d4 | ||
|
|
f16db8298b | ||
|
|
2f20bf1bee | ||
|
|
cf4a32b260 | ||
|
|
f9d01d2fad | ||
|
|
b8d83c37d9 | ||
|
|
1eb1329f68 | ||
|
|
617f6bb8ef | ||
|
|
51a3e60913 | ||
|
|
0c9f2bf5d2 | ||
|
|
30c88a2fe7 | ||
|
|
eb9afecd66 | ||
|
|
4ffd336c72 | ||
|
|
2c1f2ae589 | ||
|
|
7cbc047b41 | ||
|
|
9387b09a19 | ||
|
|
adf4222b24 | ||
|
|
f17f04f00a | ||
|
|
c095118e98 | ||
|
|
07f0192088 | ||
|
|
11d7d25037 | ||
|
|
0fd19f0de8 | ||
|
|
c45ff40250 | ||
|
|
e954fa6478 | ||
|
|
2f8c2b05bd | ||
|
|
a0fdfc0f39 | ||
|
|
a4c17bb308 | ||
|
|
57a4372b65 | ||
|
|
75eff7f083 | ||
|
|
c11cb38269 | ||
|
|
a5b9a707a4 | ||
|
|
e4fd446946 | ||
|
|
1b013db312 | ||
|
|
714d8ac3ba | ||
|
|
158250e98d | ||
|
|
f09293e077 | ||
|
|
f9f4be181d | ||
|
|
389e8bc325 | ||
|
|
3bea99c000 | ||
|
|
367f763ce5 | ||
|
|
05e52ca236 | ||
|
|
3febed82f1 | ||
|
|
f268a48a16 | ||
|
|
8a6371fe68 | ||
|
|
96bb9a2f8e | ||
|
|
93937feb13 | ||
|
|
f9b977d266 | ||
|
|
21e62d8597 | ||
|
|
7fca2a9cc6 | ||
|
|
88e8019858 | ||
|
|
e473ef36b1 | ||
|
|
cbe562a204 | ||
|
|
3b5b832bbc | ||
|
|
4dc40389a3 | ||
|
|
4cfb451755 | ||
|
|
0552f10c38 | ||
|
|
368d1ad354 | ||
|
|
c9ac7401e8 | ||
|
|
9a8f7ccba8 | ||
|
|
60625b9978 | ||
|
|
032c8e9fac | ||
|
|
b4b53cfa4c | ||
|
|
20d1abd2e1 | ||
|
|
f1e1d67f4e | ||
|
|
73903cbd1f | ||
|
|
982641752f | ||
|
|
bff22a4e4e | ||
|
|
ba66cbbc95 | ||
|
|
daaaed4118 | ||
|
|
750d13a300 | ||
|
|
c2c9db66e2 | ||
|
|
3c69a87fc2 | ||
|
|
09308083a9 | ||
|
|
dbaddab07b | ||
|
|
cf492355b4 | ||
|
|
1d58811680 | ||
|
|
1cd1b1cb08 | ||
|
|
4d78fe9ca4 | ||
|
|
91a137ab95 | ||
|
|
56d3082696 | ||
|
|
efd4b8ec11 | ||
|
|
8f573aba2f | ||
|
|
9803c75fbd | ||
|
|
96633360d0 | ||
|
|
509bbc7743 | ||
|
|
8ae7935cee | ||
|
|
f7a2428ba9 | ||
|
|
68e860baad | ||
|
|
c79a9f2ce3 | ||
|
|
38ead3133f | ||
|
|
685569e131 | ||
|
|
553d1f85c4 | ||
|
|
ca44e3062e | ||
|
|
d9a985ff38 | ||
|
|
3d919f1836 | ||
|
|
d3a2d2b248 | ||
|
|
f4fa2150b5 | ||
|
|
575b8e5f62 | ||
|
|
0e28c8e0d5 | ||
|
|
37ff924c74 | ||
|
|
cb25fc03f9 | ||
|
|
7ccbc4c77c | ||
|
|
7a64b84c5f | ||
|
|
27b7a60a8d | ||
|
|
1cac8a857d | ||
|
|
dca731ffb8 | ||
|
|
f6e02aec2a | ||
|
|
0d56de99a7 | ||
|
|
78f7152f6c | ||
|
|
ac5e11d327 | ||
|
|
1f4746c90a | ||
|
|
9d315b0ff9 | ||
|
|
c5f95e79d6 | ||
|
|
038fe84498 | ||
|
|
bd4cbc54fb | ||
|
|
4fd59f2a19 | ||
|
|
f77c3bfdf7 | ||
|
|
dc7d941316 | ||
|
|
433cc1e32c | ||
|
|
c066a03683 | ||
|
|
562a8036bc | ||
|
|
53ac703f09 | ||
|
|
a2891d97d0 | ||
|
|
2bd5169f20 | ||
|
|
b3fd6d8c92 | ||
|
|
cea281b1d3 | ||
|
|
e85b2a8961 | ||
|
|
17e3e51607 | ||
|
|
77b879d6bb | ||
|
|
9de3ae5cf2 | ||
|
|
b3a0dc3506 | ||
|
|
383731da4d | ||
|
|
67abb42652 | ||
|
|
edcc24bc12 | ||
|
|
a6836cab15 | ||
|
|
8f985737b0 | ||
|
|
6e2f102177 | ||
|
|
46a768339a | ||
|
|
f1dbbd62e9 | ||
|
|
8bb94889e0 | ||
|
|
da38e4e00c | ||
|
|
d8e8156b1c | ||
|
|
77a1b18673 | ||
|
|
9abd51f318 | ||
|
|
c7d51a29ac | ||
|
|
ac453ef32a | ||
|
|
db25493c04 | ||
|
|
8d4b4d3cd9 | ||
|
|
b05f13d82b | ||
|
|
438622d450 | ||
|
|
4f79efedc9 | ||
|
|
845fa89d0f | ||
|
|
29768576c8 | ||
|
|
4e659d799d | ||
|
|
10596bcb54 | ||
|
|
5ac6f4f7b3 | ||
|
|
957bb46e5c | ||
|
|
1042a537c1 | ||
|
|
2159b4b691 | ||
|
|
ce48e07e18 | ||
|
|
48dded02c6 | ||
|
|
b9f5799c1b | ||
|
|
b7d77042bf | ||
|
|
8b6e9b7f76 | ||
|
|
b4ea2569e3 | ||
|
|
4a02c87c27 | ||
|
|
42a9f864eb | ||
|
|
22e6de19c4 | ||
|
|
572a65d661 | ||
|
|
108ecb7e12 | ||
|
|
9c87d61528 | ||
|
|
dd903dd7e5 | ||
|
|
ae13cb2513 | ||
|
|
40f47ccd4e | ||
|
|
c344cd2a2b | ||
|
|
7601af24f0 | ||
|
|
0197eb0d08 | ||
|
|
a248967ae8 | ||
|
|
a4beb58b54 | ||
|
|
922cc942a4 | ||
|
|
f11b086381 | ||
|
|
e5eab69f65 | ||
|
|
961884ef12 | ||
|
|
5dbbf643a4 | ||
|
|
f937458c25 | ||
|
|
c617e62a16 | ||
|
|
343c886d54 | ||
|
|
824d85b2a0 | ||
|
|
0289fc5ce2 | ||
|
|
914a886bfe | ||
|
|
f65c30e975 | ||
|
|
48ac0049aa | ||
|
|
fea1117eae | ||
|
|
ace1a060db | ||
|
|
be6ad9c5e3 | ||
|
|
b2d51a2a9b | ||
|
|
74411d8656 | ||
|
|
332392b7ba | ||
|
|
e441414854 | ||
|
|
4b1d79e7f7 | ||
|
|
d7889e27e5 | ||
|
|
e65a68ce78 | ||
|
|
990f6d3730 | ||
|
|
84a62b3707 | ||
|
|
e18789b8d3 | ||
|
|
cb7be0e460 | ||
|
|
df825d0109 | ||
|
|
ce4baecb4b | ||
|
|
48907517e9 | ||
|
|
dde1d96058 | ||
|
|
b2f688a032 | ||
|
|
b4664f85f0 | ||
|
|
2725d32c33 | ||
|
|
c9f80db3c6 | ||
|
|
cb53ddf8a8 | ||
|
|
fdca41a71b | ||
|
|
d59ceee0f7 | ||
|
|
38b08835c2 | ||
|
|
dbbdb1bcbe | ||
|
|
b408e5d0d3 | ||
|
|
30f00508f5 | ||
|
|
75bb6aa966 | ||
|
|
eff206fb2b | ||
|
|
98da419c96 | ||
|
|
efe226045d | ||
|
|
35ba1532f4 | ||
|
|
476d732a3c | ||
|
|
21efc0c4a5 | ||
|
|
c20c6665fd | ||
|
|
cd497bfe9b | ||
|
|
25c42bee6d | ||
|
|
6d639385da | ||
|
|
fd1c0efedf | ||
|
|
5d2010aa73 | ||
|
|
d9333b2e93 | ||
|
|
3034306fcc | ||
|
|
0c7bae6fd7 | ||
|
|
855233f498 | ||
|
|
6b859a0478 | ||
|
|
2f37b658f1 | ||
|
|
3bd952e5c5 | ||
|
|
ae58c1fa99 | ||
|
|
dfb411cb6a | ||
|
|
449e3f5cc6 | ||
|
|
1b1fe17fca | ||
|
|
f3c457745e | ||
|
|
26f2e2b223 | ||
|
|
fcdd399eea | ||
|
|
c1d16782ab | ||
|
|
860434a1d5 | ||
|
|
38b493ee9d | ||
|
|
19dc560d56 | ||
|
|
bb10214db0 | ||
|
|
6a871c51a1 | ||
|
|
d7ff3050c2 | ||
|
|
8e0a0379d5 | ||
|
|
b7ceb90e61 | ||
|
|
c1935c83f6 | ||
|
|
62f08a2105 | ||
|
|
38d7f6e671 | ||
|
|
3c2c99c236 | ||
|
|
7694402ae4 | ||
|
|
7ed1d13221 | ||
|
|
47e89e35b2 | ||
|
|
3633759295 | ||
|
|
98bdb0479b | ||
|
|
1e40df227d | ||
|
|
caf0a709b8 | ||
|
|
daef951e59 | ||
|
|
73eab87dd9 | ||
|
|
1a2720649b | ||
|
|
1083cdb743 | ||
|
|
06eb8f9c10 | ||
|
|
31af15d267 | ||
|
|
12938df375 | ||
|
|
24d8dbcf64 | ||
|
|
2b7585357f | ||
|
|
5b659966c8 | ||
|
|
2834d6cac7 | ||
|
|
65dd4c873f | ||
|
|
8c834e634b | ||
|
|
f92430d092 | ||
|
|
b110e944c3 | ||
|
|
77eb5b5147 | ||
|
|
1fabdb9e2d | ||
|
|
e8682ac058 | ||
|
|
08603ad905 | ||
|
|
224b867737 | ||
|
|
0eb4ac5bcc | ||
|
|
876ca5927d | ||
|
|
98b4509014 | ||
|
|
c0013a0ba5 | ||
|
|
cc915e39c5 | ||
|
|
b569ad4ef5 | ||
|
|
6ab5388075 | ||
|
|
ded3079390 | ||
|
|
44fe358766 | ||
|
|
cee4b089c6 | ||
|
|
ba8bd4f95c | ||
|
|
c602072e5b | ||
|
|
76061c84aa | ||
|
|
cd01d3e923 | ||
|
|
ff23e7aba7 | ||
|
|
e61fb6f206 | ||
|
|
a6cab8fddc | ||
|
|
ec16d9abfc | ||
|
|
b5c67a47d1 | ||
|
|
a4c1e3b0bc | ||
|
|
b160d58d1b | ||
|
|
b6a4dfb424 | ||
|
|
5837718cf4 | ||
|
|
962e579434 | ||
|
|
63a249ecb0 | ||
|
|
3f40ca65f5 | ||
|
|
57668fc618 | ||
|
|
e82d14c973 | ||
|
|
8e9aa23c3c | ||
|
|
4687c7dcda | ||
|
|
5d857c731f | ||
|
|
eaec1205a1 | ||
|
|
e3d03c3d78 | ||
|
|
927fb013ff | ||
|
|
4deb14ccfb | ||
|
|
e04dba610b | ||
|
|
99a5dfee31 | ||
|
|
66842fca8e | ||
|
|
a47280f47b | ||
|
|
2808ca139c | ||
|
|
d87467aa88 | ||
|
|
382aad5119 | ||
|
|
93f94b65f1 | ||
|
|
bc66d4b0e7 | ||
|
|
ff044c831f | ||
|
|
cb85292f99 | ||
|
|
7c7722e8fc | ||
|
|
78cc6764bf | ||
|
|
0b540d6406 | ||
|
|
f1e0b7a94f | ||
|
|
611635a9a2 | ||
|
|
26c30b013b | ||
|
|
899f5231b5 | ||
|
|
0cfeee18c9 | ||
|
|
3e44835687 | ||
|
|
d5ac67071f | ||
|
|
6aee9ce92e | ||
|
|
6a268bfb68 | ||
|
|
63848e815f | ||
|
|
6640df18ac | ||
|
|
b9436c0cab | ||
|
|
c730f7931f | ||
|
|
ef6035b5be | ||
|
|
8502c0f048 | ||
|
|
acc4d5201a | ||
|
|
8248f31b20 | ||
|
|
39c1624d42 | ||
|
|
7eb82f2e84 | ||
|
|
df0d0d820a | ||
|
|
e0c0d8bc04 | ||
|
|
97619d8ba1 | ||
|
|
80df96fd0d | ||
|
|
579e76430d | ||
|
|
36dd7269e2 | ||
|
|
6596cb014f | ||
|
|
62ac63fd77 | ||
|
|
e6e8d96f12 | ||
|
|
f80464ea31 | ||
|
|
75b0c6f7a3 | ||
|
|
f95ce8c7b5 | ||
|
|
c991a3ccfd | ||
|
|
a1d612b1f6 | ||
|
|
d3cbd20c5e | ||
|
|
cff4f29ba4 | ||
|
|
dc08363360 | ||
|
|
a2aa8d9336 | ||
|
|
ab2bfa951c | ||
|
|
e871d37044 | ||
|
|
e32ee71bea | ||
|
|
3bc8823e54 | ||
|
|
a4b9dfaf1c | ||
|
|
c7c85ac676 | ||
|
|
1af445a390 | ||
|
|
4236a2e6f7 | ||
|
|
47e58942f8 | ||
|
|
f854ed50d6 | ||
|
|
2933a173a2 | ||
|
|
39c45cd329 | ||
|
|
93e6473828 | ||
|
|
2cf96bef52 | ||
|
|
3850ef4355 | ||
|
|
d29f989c22 | ||
|
|
0e31d503d0 | ||
|
|
8c2d552238 | ||
|
|
1b6cb61f8a | ||
|
|
b6e0fa9085 | ||
|
|
1f983d502e | ||
|
|
13637be1aa | ||
|
|
8f22740e07 | ||
|
|
03d5cc7521 | ||
|
|
c9f9e2b97d | ||
|
|
8ca4ede403 | ||
|
|
b50be86615 | ||
|
|
fe1a8f4425 | ||
|
|
dd472c1322 | ||
|
|
a636adec10 | ||
|
|
e3960445ae | ||
|
|
c631b7cd8a | ||
|
|
bb2bf12808 | ||
|
|
db95dfe208 | ||
|
|
86d052e51e | ||
|
|
fb55b9db17 | ||
|
|
ad3ad81c1e | ||
|
|
dccb84ded8 | ||
|
|
510c693871 | ||
|
|
8696df12ac | ||
|
|
d56e0b0eba | ||
|
|
29d77b2f2c | ||
|
|
4e131cd059 | ||
|
|
4c1f3948a3 | ||
|
|
c40ff67704 | ||
|
|
af6ac8bd4f | ||
|
|
70211a8407 | ||
|
|
4d6b83425b | ||
|
|
985396aaf9 | ||
|
|
d86c14d3a6 | ||
|
|
3bdb3a6b87 | ||
|
|
8dac57d4cf | ||
|
|
a91e7b9ed0 | ||
|
|
220b2c9a2a | ||
|
|
06bc8ed4a4 | ||
|
|
648863d21b | ||
|
|
3232e60467 | ||
|
|
da81ea4e57 | ||
|
|
42baec7c72 | ||
|
|
1accdfe2e6 | ||
|
|
f625653b30 | ||
|
|
2682187fa3 | ||
|
|
090f3fafa9 | ||
|
|
de81ed0c61 | ||
|
|
49465888b2 | ||
|
|
1555185d60 | ||
|
|
e5235bd714 | ||
|
|
1b4fe6135f | ||
|
|
9481b29d6b | ||
|
|
20115e6557 | ||
|
|
ee47136fb4 | ||
|
|
83dece68fc | ||
|
|
fce7083e28 | ||
|
|
5268375153 | ||
|
|
3598f59123 | ||
|
|
557f491a7e | ||
|
|
5aa876da72 | ||
|
|
7e7a66595b | ||
|
|
c429bdf139 | ||
|
|
22d22f3afa | ||
|
|
f5845908b9 | ||
|
|
138ce1c69a | ||
|
|
8366ec5831 | ||
|
|
383f0a7f43 | ||
|
|
22e5a5cafd | ||
|
|
8d6255aa55 | ||
|
|
8fd6f7add9 | ||
|
|
623c2cb9f1 | ||
|
|
259e87442d | ||
|
|
8655e025a2 | ||
|
|
aba2a9f504 | ||
|
|
9aa76bd088 | ||
|
|
10faef62fa | ||
|
|
6b291a5ce5 | ||
|
|
164f1dcfd4 | ||
|
|
b7d6d027d3 | ||
|
|
c4869f1917 | ||
|
|
79c31b5f54 | ||
|
|
89e99219d7 | ||
|
|
a9b6c68ce3 | ||
|
|
0563077fb9 | ||
|
|
e2f174e92e | ||
|
|
861bdb47ed | ||
|
|
9f9e2d12c4 | ||
|
|
03f504cadc | ||
|
|
182c7e827b | ||
|
|
61e0cfc979 | ||
|
|
3ea3f01394 | ||
|
|
fc5b8ca1e5 | ||
|
|
5d67b2f9dc | ||
|
|
bcf4fd9e93 | ||
|
|
5b5faad553 | ||
|
|
5299261d18 | ||
|
|
f852851886 | ||
|
|
20a4d9adb8 | ||
|
|
13997cd282 | ||
|
|
965429296b | ||
|
|
d9750ce4dc | ||
|
|
d0fb41e582 | ||
|
|
f7a83d5a60 | ||
|
|
fc52462df4 | ||
|
|
119804794f | ||
|
|
f23bd0b268 | ||
|
|
d6f61b4faf | ||
|
|
4e4b7a1c39 | ||
|
|
376bfb6799 | ||
|
|
12bdba9a9c | ||
|
|
33fa1e1350 | ||
|
|
94e1a4f793 | ||
|
|
2603d960b7 | ||
|
|
b8433c4ea7 | ||
|
|
fc30aeea61 | ||
|
|
01d6e1f14d | ||
|
|
3b4a65deaa | ||
|
|
2ec5ec78a9 | ||
|
|
6b416b8494 | ||
|
|
eac470e081 | ||
|
|
34ce50b7b5 | ||
|
|
6d85e7cdf7 | ||
|
|
23a47a6f63 | ||
|
|
d2bfcc6f0e | ||
|
|
7495392aa2 | ||
|
|
c4ddf84ba8 | ||
|
|
aad6c28e4d | ||
|
|
2bd03dada4 | ||
|
|
5fab16ad06 | ||
|
|
6a4d1ed44d | ||
|
|
db22159a89 | ||
|
|
029e0e5044 | ||
|
|
3f1ee0b1b8 | ||
|
|
8009794cca | ||
|
|
12ce96d802 | ||
|
|
53bd62b236 | ||
|
|
cd7362c654 | ||
|
|
788b5633cb | ||
|
|
46d106e6e2 | ||
|
|
8ffb91022e | ||
|
|
57c09d1772 | ||
|
|
0731ed2c7a | ||
|
|
19ecb67f2d | ||
|
|
d16123c276 | ||
|
|
f90b168fdd | ||
|
|
09f416efdf | ||
|
|
05f40f3451 | ||
|
|
d81206fe2e | ||
|
|
f166ef9313 | ||
|
|
14704f9b4d | ||
|
|
8381daeeb7 | ||
|
|
164ed75af2 | ||
|
|
1f7c64e279 | ||
|
|
a76bf03bc9 | ||
|
|
e50d7f7b95 | ||
|
|
45b1327c58 | ||
|
|
fe60421731 | ||
|
|
0404fe9044 | ||
|
|
8cf6c59ec7 | ||
|
|
7b817ff866 | ||
|
|
f087f70a2c | ||
|
|
b05752f430 | ||
|
|
c4cde366e8 | ||
|
|
33249fad21 | ||
|
|
f0dd28d4db | ||
|
|
c0e35aa9fa | ||
|
|
1fd633a23b | ||
|
|
9a65e26e71 | ||
|
|
f22cabc32a | ||
|
|
b97d57f00b | ||
|
|
5db3544683 | ||
|
|
96eee95596 | ||
|
|
ffb3243bb6 | ||
|
|
09f07902ef | ||
|
|
43583bbc2e | ||
|
|
2ebc713cbb | ||
|
|
65ecc0f3bb | ||
|
|
ebabc1117e | ||
|
|
672e59e657 | ||
|
|
882e11f558 | ||
|
|
1cd5acb972 | ||
|
|
464a6efd28 | ||
|
|
18c3c1f475 | ||
|
|
52de46aeb3 | ||
|
|
b80d088254 | ||
|
|
7d0d85aeb7 | ||
|
|
d19ef8322e | ||
|
|
840b4d7619 | ||
|
|
e4a36545d7 | ||
|
|
31fbc7389b | ||
|
|
19ec936d38 | ||
|
|
939c67d41c | ||
|
|
9614e4f115 | ||
|
|
c48150a792 | ||
|
|
60687502d1 | ||
|
|
2fab58759e | ||
|
|
a42c586bb2 | ||
|
|
a6b76b3494 | ||
|
|
a6eaf7fc84 | ||
|
|
97ba9b42eb | ||
|
|
e0a71f0373 | ||
|
|
b8875d7f1c | ||
|
|
67dfd9a942 | ||
|
|
db46b03d0c | ||
|
|
5672c86905 | ||
|
|
d5406270a5 | ||
|
|
0b3f5e408b | ||
|
|
2ce432ac77 | ||
|
|
6cb26b3fbb | ||
|
|
a9b5949191 | ||
|
|
6016370515 | ||
|
|
f3c026f278 | ||
|
|
8f218bd6d6 | ||
|
|
59fd89bf68 | ||
|
|
d27a6235f0 | ||
|
|
c23febbcf0 | ||
|
|
81e85a4d0d | ||
|
|
44ba1bc85b | ||
|
|
6244fe5a93 | ||
|
|
973335db56 | ||
|
|
4b2c4f88d3 | ||
|
|
bbd2ca0d68 | ||
|
|
a82c225841 | ||
|
|
f9a6852aaa | ||
|
|
fad704b692 | ||
|
|
e362632477 | ||
|
|
4558b49c1b | ||
|
|
4357d8788a | ||
|
|
78b7c24c15 | ||
|
|
127e9e9f74 | ||
|
|
1951ae1cce | ||
|
|
79e2fd4b52 | ||
|
|
2265a2c43d | ||
|
|
1e7e543ab0 | ||
|
|
9671a73bd6 | ||
|
|
5bbee94d68 | ||
|
|
9d7122d69c | ||
|
|
6b1270a4f9 | ||
|
|
3c8de2be3f | ||
|
|
5afb5f0e83 | ||
|
|
7f42d0df40 | ||
|
|
0df54c9021 | ||
|
|
41bc33f4ba | ||
|
|
dcc883fa27 | ||
|
|
492c5d01bf | ||
|
|
49eaca1290 | ||
|
|
ce43b586ad | ||
|
|
ae49cd6a26 | ||
|
|
6ad3897af8 | ||
|
|
53ddb067ea | ||
|
|
a9762170bc | ||
|
|
4d91403fd2 | ||
|
|
e1cd4a63d0 | ||
|
|
18f3874dab | ||
|
|
6efcee500d | ||
|
|
8c0532f363 | ||
|
|
fdb0d07ab8 | ||
|
|
58e30649a3 | ||
|
|
85feef3a60 | ||
|
|
fccd913a8a | ||
|
|
dd119edafe | ||
|
|
f6633fb16c | ||
|
|
d243bf4f48 | ||
|
|
92d306f777 | ||
|
|
0ea29b3d7c | ||
|
|
c8e6e8eb32 | ||
|
|
a6aae6292e | ||
|
|
e33100b075 | ||
|
|
84a229d286 | ||
|
|
ab32c42487 | ||
|
|
0dc3744859 | ||
|
|
d22eab4155 | ||
|
|
ea9bfec3c9 | ||
|
|
02b43a5d66 | ||
|
|
e0fc7952f4 | ||
|
|
66ec2c5d27 | ||
|
|
f5a78402a6 | ||
|
|
29bfd7325d | ||
|
|
318962c01f | ||
|
|
8ca49fafa1 | ||
|
|
656e783894 | ||
|
|
18c6d60a85 | ||
|
|
b202121c21 | ||
|
|
ea3672dd08 | ||
|
|
88037af7ef | ||
|
|
4bda5b619d | ||
|
|
a0645ea30f | ||
|
|
a3e4adb0af | ||
|
|
e18aedfabf | ||
|
|
44529a78d2 | ||
|
|
bb9025364b | ||
|
|
7c78283b46 | ||
|
|
f7d6ca5c11 | ||
|
|
172a341b40 | ||
|
|
09aef67808 | ||
|
|
a400312d3a | ||
|
|
1b01b35b03 | ||
|
|
2d0acaa8ae | ||
|
|
a31a73320b | ||
|
|
75da352806 | ||
|
|
61b0c9b1c1 | ||
|
|
2185fe0f4c | ||
|
|
4ee0977aa1 | ||
|
|
1ba44771bb | ||
|
|
9966eec1df | ||
|
|
dd444f5f76 | ||
|
|
a0a6089057 | ||
|
|
4be72fc989 | ||
|
|
033cbf696a | ||
|
|
805bc85ea9 | ||
|
|
0d057d500e | ||
|
|
7462500e20 | ||
|
|
3e06a4a7c5 | ||
|
|
e0684ab086 | ||
|
|
e7be883e2e | ||
|
|
8fe80a4507 | ||
|
|
68084c4567 | ||
|
|
9c27545f5f | ||
|
|
6da8af7680 | ||
|
|
1b7ce93623 | ||
|
|
5f6480527e | ||
|
|
4d7b4ce877 | ||
|
|
fd61f7d363 | ||
|
|
47cc3d7358 | ||
|
|
d180618634 | ||
|
|
b2b96426d7 | ||
|
|
5796d4b969 | ||
|
|
37957613df | ||
|
|
cb82f02eb4 | ||
|
|
3feccefee8 | ||
|
|
910b1dca85 | ||
|
|
d71c6f055b | ||
|
|
536f373b91 | ||
|
|
6987845228 | ||
|
|
2edd2bf763 | ||
|
|
2605761d76 | ||
|
|
391d261ca1 | ||
|
|
6a7531f1e6 | ||
|
|
fb294e8bea | ||
|
|
a1046488c3 | ||
|
|
8cef56265c | ||
|
|
ec30851247 | ||
|
|
7420c12b89 | ||
|
|
895c770c24 | ||
|
|
606070f449 | ||
|
|
ec41493d91 | ||
|
|
d551093199 | ||
|
|
f7f8b2da62 | ||
|
|
1378b630a6 | ||
|
|
9726d86ab0 | ||
|
|
c9364e7b94 | ||
|
|
1e6780a2e3 | ||
|
|
72855d4d7a | ||
|
|
c0359da930 | ||
|
|
b4f39b0bfc | ||
|
|
d7af145f3b | ||
|
|
b078d8477e | ||
|
|
02b64e1a4b | ||
|
|
f444825e42 | ||
|
|
9fa62ef388 | ||
|
|
e73ad07836 | ||
|
|
a680e79686 | ||
|
|
728c05262c | ||
|
|
23e08c1ca1 | ||
|
|
198d73acfa | ||
|
|
71e210b66c | ||
|
|
2f31c53fd4 | ||
|
|
9f661535e0 | ||
|
|
5b0d4bf8e6 | ||
|
|
a639264149 | ||
|
|
91ab257eb6 | ||
|
|
e24a62d621 | ||
|
|
ec9f4b2b61 | ||
|
|
b66c7da4b3 | ||
|
|
6544cc98d5 | ||
|
|
2dbef9e1fa | ||
|
|
a924e81adb | ||
|
|
1ded1b603e | ||
|
|
a3012a29c2 | ||
|
|
8fcd800aff | ||
|
|
4d414ea082 | ||
|
|
d5b2380bc2 | ||
|
|
d2853fafa9 | ||
|
|
0e5a207c44 | ||
|
|
d7744537ae | ||
|
|
9e79e9efb6 | ||
|
|
a04338d184 | ||
|
|
772b0ca2b0 | ||
|
|
13eb2b75d5 | ||
|
|
c800440e44 | ||
|
|
05f822380c | ||
|
|
7896c81e98 | ||
|
|
ea50569b2a | ||
|
|
7bce07aa0e | ||
|
|
5ef02290dd | ||
|
|
34d5ba7d35 | ||
|
|
55004e7832 | ||
|
|
4945446171 | ||
|
|
0e2d2408ca | ||
|
|
8b8707c36e | ||
|
|
3bd9caf113 | ||
|
|
f713a83abf | ||
|
|
b0e0f8c8bf | ||
|
|
c8623fd3a2 | ||
|
|
c6aad2c2d4 | ||
|
|
7ede87753b | ||
|
|
59bed5a0fa | ||
|
|
e59377d9a3 | ||
|
|
6274cfce4b | ||
|
|
9d624702f6 | ||
|
|
f9d8ff3f74 | ||
|
|
6c837f0639 | ||
|
|
03c9ce3589 | ||
|
|
1ac7cdacb0 | ||
|
|
ba93be1814 | ||
|
|
1404bbab9f | ||
|
|
a5f8ed6378 | ||
|
|
1b59212003 | ||
|
|
4142901dc6 | ||
|
|
4ba9431e6f | ||
|
|
5da83517a8 | ||
|
|
a7e95c2a4d | ||
|
|
ae7fbbb04f | ||
|
|
cc18ef9aa8 | ||
|
|
4202e8a7ba | ||
|
|
882ff8a325 | ||
|
|
1b29957731 | ||
|
|
5702543bc5 | ||
|
|
c810f0647a | ||
|
|
d366b67bee | ||
|
|
85286b3cf9 | ||
|
|
ae4b5464c7 | ||
|
|
dec2536e3e | ||
|
|
30ea512dcc | ||
|
|
f6cdf34b25 | ||
|
|
99818d038b | ||
|
|
c35ce8e195 | ||
|
|
2ae856b0dd | ||
|
|
e592598990 | ||
|
|
07af34fbd0 | ||
|
|
0b3e313260 | ||
|
|
21947de4e0 | ||
|
|
3cdd0baabb | ||
|
|
f851e62330 | ||
|
|
bea19ad8ce | ||
|
|
f5b48f5390 | ||
|
|
cc712b86d5 | ||
|
|
0cf6cfc2b0 | ||
|
|
6f19360da5 | ||
|
|
f216b4716f | ||
|
|
3bf638f7c6 | ||
|
|
5ec9a24c99 | ||
|
|
23caa1d0b5 | ||
|
|
36ecf7c7fd | ||
|
|
0027e75a45 | ||
|
|
4cd759bfa6 | ||
|
|
0f2752220a | ||
|
|
ce1ed46851 | ||
|
|
aa795ee7eb | ||
|
|
5c83671739 | ||
|
|
3fb9390040 | ||
|
|
965687186c | ||
|
|
83742437d6 | ||
|
|
a37e53769c | ||
|
|
084a389a02 | ||
|
|
7971c42814 | ||
|
|
c694461abc |
10
.gitignore
vendored
10
.gitignore
vendored
@@ -7,6 +7,10 @@
|
|||||||
# Eclipse project files
|
# Eclipse project files
|
||||||
.classpath
|
.classpath
|
||||||
.project
|
.project
|
||||||
|
.settings
|
||||||
|
maven-eclipse.xml
|
||||||
|
.externalToolBuilders
|
||||||
|
.pmd
|
||||||
# Netbeans configuration
|
# Netbeans configuration
|
||||||
nb-configuration.xml
|
nb-configuration.xml
|
||||||
/target/
|
/target/
|
||||||
@@ -15,4 +19,8 @@ dependency-reduced-pom.xml
|
|||||||
#ruby Gemfile, etc. This is a java project, Gemfile is here to check site problem with Jekyll
|
#ruby Gemfile, etc. This is a java project, Gemfile is here to check site problem with Jekyll
|
||||||
Gemfile
|
Gemfile
|
||||||
Gemfile.lock
|
Gemfile.lock
|
||||||
_site/**
|
_site/**
|
||||||
|
#unknown as to why these are showing up... but need to be ignored.
|
||||||
|
.LCKpom.xml~
|
||||||
|
#coverity
|
||||||
|
/cov-int/
|
||||||
|
|||||||
@@ -29,7 +29,7 @@ On Windows
|
|||||||
|
|
||||||
### Maven Plugin
|
### Maven Plugin
|
||||||
|
|
||||||
More detailed instructions can be found on the [dependency-check-maven github pages](http://jeremylong.github.io/DependencyCheck/dependency-check-maven/installation.html).
|
More detailed instructions can be found on the [dependency-check-maven github pages](http://jeremylong.github.io/DependencyCheck/dependency-check-maven/usage.html).
|
||||||
The plugin can be configured using the following:
|
The plugin can be configured using the following:
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
@@ -40,7 +40,6 @@ The plugin can be configured using the following:
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.owasp</groupId>
|
<groupId>org.owasp</groupId>
|
||||||
<artifactId>dependency-check-maven</artifactId>
|
<artifactId>dependency-check-maven</artifactId>
|
||||||
<version>1.0.2</version>
|
|
||||||
<executions>
|
<executions>
|
||||||
<execution>
|
<execution>
|
||||||
<goals>
|
<goals>
|
||||||
@@ -59,7 +58,7 @@ The plugin can be configured using the following:
|
|||||||
|
|
||||||
### Ant Task
|
### Ant Task
|
||||||
|
|
||||||
For instructions on the use of the Ant Task, please see the [dependency-check-ant github page](http://jeremylong.github.io/DependencyCheck/dependency-check-maven/installation.html).
|
For instructions on the use of the Ant Task, please see the [dependency-check-ant github page](http://jeremylong.github.io/DependencyCheck/dependency-check-ant/installation.html).
|
||||||
|
|
||||||
Development Usage
|
Development Usage
|
||||||
-------------
|
-------------
|
||||||
@@ -106,4 +105,4 @@ Dependency-Check makes use of several other open source libraries. Please see th
|
|||||||
[wiki]: https://github.com/jeremylong/DependencyCheck/wiki
|
[wiki]: https://github.com/jeremylong/DependencyCheck/wiki
|
||||||
[subscribe]: mailto:dependency-check+subscribe@googlegroups.com
|
[subscribe]: mailto:dependency-check+subscribe@googlegroups.com
|
||||||
[post]: mailto:dependency-check@googlegroups.com
|
[post]: mailto:dependency-check@googlegroups.com
|
||||||
[notices]: https://github.com/jeremylong/DependencyCheck/blob/master/NOTICES.txt
|
[notices]: https://github.com/jeremylong/DependencyCheck/blob/master/NOTICES.txt
|
||||||
|
|||||||
@@ -1,223 +0,0 @@
|
|||||||
<?xml version="1.0"?>
|
|
||||||
<!DOCTYPE module PUBLIC
|
|
||||||
"-//Puppy Crawl//DTD Check Configuration 1.3//EN"
|
|
||||||
"http://www.puppycrawl.com/dtds/configuration_1_3.dtd">
|
|
||||||
|
|
||||||
<module name="Checker">
|
|
||||||
<!--
|
|
||||||
If you set the basedir property below, then all reported file
|
|
||||||
names will be relative to the specified directory. See
|
|
||||||
http://checkstyle.sourceforge.net/5.x/config.html#Checker
|
|
||||||
|
|
||||||
<property name="basedir" value="${basedir}"/>
|
|
||||||
-->
|
|
||||||
|
|
||||||
<property name="severity" value="error"/>
|
|
||||||
|
|
||||||
<module name="SuppressionFilter">
|
|
||||||
<property name="file" value="${checkstyle.suppressions.file}"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="JavadocPackage">
|
|
||||||
<property name="allowLegacy" value="false"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="Translation">
|
|
||||||
<property name="severity" value="warning"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="FileTabCharacter">
|
|
||||||
<property name="eachLine" value="false"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="FileLength">
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NewlineAtEndOfFile">
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
<property name="lineSeparator" value="lf"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="RegexpHeader">
|
|
||||||
<property name="headerFile" value="${checkstyle.header.file}"/>
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
<property name="id" value="header"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="RegexpSingleline">
|
|
||||||
<property name="format" value="\s+$"/>
|
|
||||||
<property name="minimum" value="0"/>
|
|
||||||
<property name="maximum" value="0"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="TreeWalker">
|
|
||||||
<property name="tabWidth" value="4"/>
|
|
||||||
|
|
||||||
<module name="AvoidStarImport"/>
|
|
||||||
<module name="ConstantName"/>
|
|
||||||
<module name="EmptyBlock"/>
|
|
||||||
<module name="EmptyForIteratorPad"/>
|
|
||||||
<module name="EqualsHashCode"/>
|
|
||||||
<module name="OneStatementPerLine"/>
|
|
||||||
|
|
||||||
<!-- module name="IllegalCatch"/ -->
|
|
||||||
<!--module name="ImportControl">
|
|
||||||
<property name="file" value="${checkstyle.importcontrol.file}"/>
|
|
||||||
</module-->
|
|
||||||
<module name="IllegalImport"/>
|
|
||||||
<module name="IllegalInstantiation"/>
|
|
||||||
<module name="IllegalThrows"/>
|
|
||||||
<module name="InnerAssignment"/>
|
|
||||||
<module name="JavadocType">
|
|
||||||
<property name="authorFormat" value="\S"/>
|
|
||||||
</module>
|
|
||||||
<module name="JavadocMethod">
|
|
||||||
<property name="allowUndeclaredRTE" value="true"/>
|
|
||||||
<property name="allowThrowsTagsForSubclasses" value="true"/>
|
|
||||||
<property name="allowMissingPropertyJavadoc" value="true"/>
|
|
||||||
</module>
|
|
||||||
<module name="JavadocVariable"/>
|
|
||||||
<module name="JavadocStyle">
|
|
||||||
<property name="scope" value="public"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="LeftCurly">
|
|
||||||
<property name="option" value="eol"/>
|
|
||||||
<property name="tokens" value="CLASS_DEF"/>
|
|
||||||
<property name="tokens" value="CTOR_DEF"/>
|
|
||||||
<property name="tokens" value="INTERFACE_DEF"/>
|
|
||||||
<property name="tokens" value="METHOD_DEF"/>
|
|
||||||
<property name="tokens" value="LITERAL_CATCH"/>
|
|
||||||
<property name="tokens" value="LITERAL_DO"/>
|
|
||||||
<property name="tokens" value="LITERAL_ELSE"/>
|
|
||||||
<property name="tokens" value="LITERAL_FINALLY"/>
|
|
||||||
<property name="tokens" value="LITERAL_FOR"/>
|
|
||||||
<property name="tokens" value="LITERAL_IF"/>
|
|
||||||
<property name="tokens" value="LITERAL_SWITCH"/>
|
|
||||||
<property name="tokens" value="LITERAL_SYNCHRONIZED"/>
|
|
||||||
<property name="tokens" value="LITERAL_TRY"/>
|
|
||||||
<property name="tokens" value="LITERAL_WHILE"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="OuterTypeNumber"/>
|
|
||||||
<module name="LineLength">
|
|
||||||
<property name="ignorePattern" value="^ *\* *[^ ]+$"/>
|
|
||||||
<property name="max" value="150"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="MethodCount">
|
|
||||||
<property name="maxTotal" value="40"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="LocalFinalVariableName"/>
|
|
||||||
<module name="LocalVariableName"/>
|
|
||||||
<module name="MemberName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="MethodLength">
|
|
||||||
<property name="max" value="160"/>
|
|
||||||
<property name="countEmpty" value="false"/>
|
|
||||||
</module>
|
|
||||||
<module name="MethodName"/>
|
|
||||||
<module name="MethodParamPad"/>
|
|
||||||
<module name="ModifierOrder"/>
|
|
||||||
<module name="NeedBraces"/>
|
|
||||||
<module name="NoWhitespaceAfter">
|
|
||||||
<property name="tokens" value="ARRAY_INIT"/>
|
|
||||||
<property name="tokens" value="BNOT"/>
|
|
||||||
<property name="tokens" value="DEC"/>
|
|
||||||
<property name="tokens" value="DOT"/>
|
|
||||||
<property name="tokens" value="INC"/>
|
|
||||||
<property name="tokens" value="LNOT"/>
|
|
||||||
<property name="tokens" value="UNARY_MINUS"/>
|
|
||||||
<property name="tokens" value="UNARY_PLUS"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NoWhitespaceBefore"/>
|
|
||||||
<module name="NoWhitespaceBefore">
|
|
||||||
<property name="tokens" value="DOT"/>
|
|
||||||
<property name="allowLineBreaks" value="true"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="OperatorWrap"/>
|
|
||||||
<module name="OperatorWrap">
|
|
||||||
<property name="tokens" value="ASSIGN"/>
|
|
||||||
<property name="tokens" value="DIV_ASSIGN"/>
|
|
||||||
<property name="tokens" value="PLUS_ASSIGN"/>
|
|
||||||
<property name="tokens" value="MINUS_ASSIGN"/>
|
|
||||||
<property name="tokens" value="STAR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="MOD_ASSIGN"/>
|
|
||||||
<property name="tokens" value="SR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BSR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="SL_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BXOR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BOR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BAND_ASSIGN"/>
|
|
||||||
<property name="option" value="eol"/>
|
|
||||||
</module>
|
|
||||||
<module name="PackageName"/>
|
|
||||||
<module name="ParameterName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="ParameterNumber">
|
|
||||||
<property name="id" value="paramNum"/>
|
|
||||||
</module>
|
|
||||||
<module name="ParenPad"/>
|
|
||||||
<module name="TypecastParenPad"/>
|
|
||||||
<module name="RedundantImport"/>
|
|
||||||
<module name="RedundantModifier"/>
|
|
||||||
<module name="RightCurly">
|
|
||||||
<property name="option" value="same"/>
|
|
||||||
</module>
|
|
||||||
<module name="SimplifyBooleanExpression"/>
|
|
||||||
<module name="SimplifyBooleanReturn"/>
|
|
||||||
<module name="StaticVariableName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="TypeName"/>
|
|
||||||
<module name="UnusedImports"/>
|
|
||||||
<module name="UpperEll"/>
|
|
||||||
<module name="VisibilityModifier"/>
|
|
||||||
<module name="WhitespaceAfter"/>
|
|
||||||
<module name="WhitespaceAround"/>
|
|
||||||
<module name="GenericWhitespace"/>
|
|
||||||
<module name="FinalClass"/>
|
|
||||||
<module name="MissingSwitchDefault"/>
|
|
||||||
<!--module name="MagicNumber"/-->
|
|
||||||
<!--module name="Indentation">
|
|
||||||
<property name="basicOffset" value="4"/>
|
|
||||||
<property name="braceAdjustment" value="0"/>
|
|
||||||
<property name="caseIndent" value="0"/>
|
|
||||||
</module-->
|
|
||||||
<module name="ArrayTrailingComma"/>
|
|
||||||
<module name="FinalLocalVariable"/>
|
|
||||||
<module name="EqualsAvoidNull"/>
|
|
||||||
<module name="ParameterAssignment"/>
|
|
||||||
|
|
||||||
<!-- Generates quite a few errors -->
|
|
||||||
<module name="CyclomaticComplexity">
|
|
||||||
<property name="severity" value="ignore"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NestedForDepth">
|
|
||||||
<property name="max" value="2"/>
|
|
||||||
</module>
|
|
||||||
<module name="NestedIfDepth">
|
|
||||||
<property name="max" value="4"/>
|
|
||||||
</module>
|
|
||||||
<module name="NestedTryDepth">
|
|
||||||
<property name="max" value="2"/>
|
|
||||||
</module>
|
|
||||||
<!--module name="ExplicitInitialization"/-->
|
|
||||||
<module name="AnnotationUseStyle"/>
|
|
||||||
<module name="MissingDeprecated"/>
|
|
||||||
<module name="MissingOverride">
|
|
||||||
<property name="javaFiveCompatibility" value="true"/>
|
|
||||||
</module>
|
|
||||||
<module name="PackageAnnotation"/>
|
|
||||||
<module name="SuppressWarnings"/>
|
|
||||||
<module name="OuterTypeFilename"/>
|
|
||||||
<module name="HideUtilityClassConstructor"/>
|
|
||||||
</module>
|
|
||||||
</module>
|
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
^/\*\s*$
|
|
||||||
^ \* This file is part of dependency-check-ant\.\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \* Licensed under the Apache License, Version 2\.0 \(the "License"\);\s*$
|
|
||||||
^ \* you may not use this file except in compliance with the License.\s*$
|
|
||||||
^ \* You may obtain a copy of the License at\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \*\s*http://www.apache.org/licenses/LICENSE-2\.0\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \* Unless required by applicable law or agreed to in writing, software\s*$
|
|
||||||
^ \* distributed under the License is distributed on an "AS IS" BASIS,\s*$
|
|
||||||
^ \* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied\.\s*$
|
|
||||||
^ \* See the License for the specific language governing permissions and\s*$
|
|
||||||
^ \* limitations under the License\.\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \* Copyright \(c\) 201[234] (Jeremy Long|Steve Springett)\. All Rights Reserved\.\s*$
|
|
||||||
^ \*/\s*$
|
|
||||||
^package
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
<?xml version="1.0"?>
|
|
||||||
|
|
||||||
<!DOCTYPE suppressions PUBLIC
|
|
||||||
"-//Puppy Crawl//DTD Suppressions 1.0//EN"
|
|
||||||
"http://www.puppycrawl.com/dtds/suppressions_1_0.dtd">
|
|
||||||
|
|
||||||
<suppressions>
|
|
||||||
<suppress checks=".*" files=".*[\\/]package-info\.java" />
|
|
||||||
</suppressions>
|
|
||||||
@@ -15,20 +15,19 @@ limitations under the License.
|
|||||||
|
|
||||||
Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
||||||
-->
|
-->
|
||||||
|
|
||||||
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
|
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
|
||||||
<modelVersion>4.0.0</modelVersion>
|
<modelVersion>4.0.0</modelVersion>
|
||||||
<parent>
|
<parent>
|
||||||
<groupId>org.owasp</groupId>
|
<groupId>org.owasp</groupId>
|
||||||
<artifactId>dependency-check-parent</artifactId>
|
<artifactId>dependency-check-parent</artifactId>
|
||||||
<version>1.1.0</version>
|
<version>1.2.11</version>
|
||||||
</parent>
|
</parent>
|
||||||
|
|
||||||
<artifactId>dependency-check-ant</artifactId>
|
<artifactId>dependency-check-ant</artifactId>
|
||||||
<packaging>jar</packaging>
|
<packaging>jar</packaging>
|
||||||
|
|
||||||
<name>Dependency-Check Ant Task</name>
|
<name>Dependency-Check Ant Task</name>
|
||||||
<description>Dependency-check is a utility that attempts to detect publicly disclosed vulnerabilities contained within project dependencies. It does this by determining if there is a Common Platform Enumeration (CPE) identifier for a given dependency. If found, it will generate a report linking to the associated CVE entries.</description>
|
<description>dependency-check-ant is an Ant Task that uses dependency-check-core to detect publicly disclosed vulnerabilities associated with the project's dependencies. The task will generate a report listing the dependency, any identified Common Platform Enumeration (CPE) identifiers, and the associated Common Vulnerability and Exposure (CVE) entries.</description>
|
||||||
<!-- begin copy from http://minds.coremedia.com/2012/09/11/problem-solved-deploy-multi-module-maven-project-site-as-github-pages/ -->
|
<!-- begin copy from http://minds.coremedia.com/2012/09/11/problem-solved-deploy-multi-module-maven-project-site-as-github-pages/ -->
|
||||||
<distributionManagement>
|
<distributionManagement>
|
||||||
<site>
|
<site>
|
||||||
@@ -69,7 +68,6 @@ Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-resources-plugin</artifactId>
|
<artifactId>maven-resources-plugin</artifactId>
|
||||||
<version>2.6</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<escapeWindowsPaths>false</escapeWindowsPaths>
|
<escapeWindowsPaths>false</escapeWindowsPaths>
|
||||||
</configuration>
|
</configuration>
|
||||||
@@ -192,10 +190,18 @@ Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
|||||||
</execution>
|
</execution>
|
||||||
</executions>
|
</executions>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-compiler-plugin</artifactId>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-jar-plugin</artifactId>
|
||||||
|
</plugin>
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-shade-plugin</artifactId>
|
<artifactId>maven-shade-plugin</artifactId>
|
||||||
<version>2.1</version>
|
<version>2.3</version>
|
||||||
<configuration>
|
<configuration>
|
||||||
<transformers>
|
<transformers>
|
||||||
<transformer implementation="org.apache.maven.plugins.shade.resource.ServicesResourceTransformer" />
|
<transformer implementation="org.apache.maven.plugins.shade.resource.ServicesResourceTransformer" />
|
||||||
@@ -219,26 +225,13 @@ Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
|||||||
</execution>
|
</execution>
|
||||||
</executions>
|
</executions>
|
||||||
</plugin>
|
</plugin>
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-jar-plugin</artifactId>
|
|
||||||
<version>2.4</version>
|
|
||||||
<configuration>
|
|
||||||
<archive>
|
|
||||||
<manifest>
|
|
||||||
<addDefaultImplementationEntries>true</addDefaultImplementationEntries>
|
|
||||||
</manifest>
|
|
||||||
</archive>
|
|
||||||
<excludes>
|
|
||||||
<exclude>**/checkstyle*</exclude>
|
|
||||||
</excludes>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
<artifactId>cobertura-maven-plugin</artifactId>
|
<artifactId>cobertura-maven-plugin</artifactId>
|
||||||
<version>2.5.2</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
|
<!--instrumentation>
|
||||||
|
<ignoreTrivial>true</ignoreTrivial>
|
||||||
|
</instrumentation-->
|
||||||
<check>
|
<check>
|
||||||
<branchRate>85</branchRate>
|
<branchRate>85</branchRate>
|
||||||
<lineRate>85</lineRate>
|
<lineRate>85</lineRate>
|
||||||
@@ -267,14 +260,8 @@ Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-surefire-plugin</artifactId>
|
<artifactId>maven-surefire-plugin</artifactId>
|
||||||
<version>2.16</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<systemProperties>
|
<systemProperties>
|
||||||
<property>
|
|
||||||
<name>net.sourceforge.cobertura.datafile</name>
|
|
||||||
<value>${project.build.directory}/cobertura/cobertura.ser</value>
|
|
||||||
<workingDirectory>target</workingDirectory>
|
|
||||||
</property>
|
|
||||||
<property>
|
<property>
|
||||||
<name>data.directory</name>
|
<name>data.directory</name>
|
||||||
<value>${project.build.directory}/dependency-check-data</value>
|
<value>${project.build.directory}/dependency-check-data</value>
|
||||||
@@ -282,156 +269,150 @@ Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
|||||||
</systemProperties>
|
</systemProperties>
|
||||||
</configuration>
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-compiler-plugin</artifactId>
|
|
||||||
<version>3.1</version>
|
|
||||||
<configuration>
|
|
||||||
<showDeprecation>false</showDeprecation>
|
|
||||||
<source>1.6</source>
|
|
||||||
<target>1.6</target>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-site-plugin</artifactId>
|
|
||||||
<version>3.3</version>
|
|
||||||
<dependencies>
|
|
||||||
<dependency>
|
|
||||||
<groupId>org.apache.maven.doxia</groupId>
|
|
||||||
<artifactId>doxia-module-markdown</artifactId>
|
|
||||||
<version>1.5</version>
|
|
||||||
</dependency>
|
|
||||||
</dependencies>
|
|
||||||
<configuration>
|
|
||||||
<skipDeploy>true</skipDeploy>
|
|
||||||
<reportPlugins>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-project-info-reports-plugin</artifactId>
|
|
||||||
<version>2.7</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>index</report>
|
|
||||||
<report>summary</report>
|
|
||||||
<report>license</report>
|
|
||||||
<report>help</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-javadoc-plugin</artifactId>
|
|
||||||
<version>2.9.1</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<id>default</id>
|
|
||||||
<reports>
|
|
||||||
<report>javadoc</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>versions-maven-plugin</artifactId>
|
|
||||||
<version>2.1</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>dependency-updates-report</report>
|
|
||||||
<report>plugin-updates-report</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-jxr-plugin</artifactId>
|
|
||||||
<version>2.4</version>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>cobertura-maven-plugin</artifactId>
|
|
||||||
<version>2.5.2</version>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-surefire-report-plugin</artifactId>
|
|
||||||
<version>2.16</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>report-only</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>taglist-maven-plugin</artifactId>
|
|
||||||
<version>2.4</version>
|
|
||||||
<configuration>
|
|
||||||
<tagListOptions>
|
|
||||||
<tagClasses>
|
|
||||||
<tagClass>
|
|
||||||
<displayName>Todo Work</displayName>
|
|
||||||
<tags>
|
|
||||||
<tag>
|
|
||||||
<matchString>todo</matchString>
|
|
||||||
<matchType>ignoreCase</matchType>
|
|
||||||
</tag>
|
|
||||||
<tag>
|
|
||||||
<matchString>FIXME</matchString>
|
|
||||||
<matchType>exact</matchType>
|
|
||||||
</tag>
|
|
||||||
</tags>
|
|
||||||
</tagClass>
|
|
||||||
</tagClasses>
|
|
||||||
</tagListOptions>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-checkstyle-plugin</artifactId>
|
|
||||||
<version>2.11</version>
|
|
||||||
<configuration>
|
|
||||||
<enableRulesSummary>false</enableRulesSummary>
|
|
||||||
<configLocation>${basedir}/config/checkstyle-checks.xml</configLocation>
|
|
||||||
<headerLocation>${basedir}/config/checkstyle-header.txt</headerLocation>
|
|
||||||
<suppressionsLocation>${basedir}/config/checkstyle-suppressions.xml</suppressionsLocation>
|
|
||||||
<suppressionsFileExpression>checkstyle.suppressions.file</suppressionsFileExpression>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-pmd-plugin</artifactId>
|
|
||||||
<version>3.0.1</version>
|
|
||||||
<configuration>
|
|
||||||
<targetJdk>1.6</targetJdk>
|
|
||||||
<linkXref>true</linkXref>
|
|
||||||
<sourceEncoding>utf-8</sourceEncoding>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>findbugs-maven-plugin</artifactId>
|
|
||||||
<version>2.5.3</version>
|
|
||||||
</plugin>
|
|
||||||
</reportPlugins>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
</plugins>
|
</plugins>
|
||||||
</build>
|
</build>
|
||||||
|
<reporting>
|
||||||
|
<plugins>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-project-info-reports-plugin</artifactId>
|
||||||
|
<version>2.7</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>summary</report>
|
||||||
|
<report>license</report>
|
||||||
|
<report>help</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-javadoc-plugin</artifactId>
|
||||||
|
<version>2.9.1</version>
|
||||||
|
<configuration>
|
||||||
|
<failOnError>false</failOnError>
|
||||||
|
<bottom>Copyright© 2012-15 Jeremy Long. All Rights Reserved.</bottom>
|
||||||
|
</configuration>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<id>default</id>
|
||||||
|
<reports>
|
||||||
|
<report>javadoc</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>versions-maven-plugin</artifactId>
|
||||||
|
<version>2.1</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>dependency-updates-report</report>
|
||||||
|
<report>plugin-updates-report</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-jxr-plugin</artifactId>
|
||||||
|
<version>2.4</version>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>cobertura-maven-plugin</artifactId>
|
||||||
|
<version>2.6</version>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-surefire-report-plugin</artifactId>
|
||||||
|
<version>2.16</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>report-only</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>taglist-maven-plugin</artifactId>
|
||||||
|
<version>2.4</version>
|
||||||
|
<configuration>
|
||||||
|
<tagListOptions>
|
||||||
|
<tagClasses>
|
||||||
|
<tagClass>
|
||||||
|
<displayName>Todo Work</displayName>
|
||||||
|
<tags>
|
||||||
|
<tag>
|
||||||
|
<matchString>todo</matchString>
|
||||||
|
<matchType>ignoreCase</matchType>
|
||||||
|
</tag>
|
||||||
|
<tag>
|
||||||
|
<matchString>FIXME</matchString>
|
||||||
|
<matchType>exact</matchType>
|
||||||
|
</tag>
|
||||||
|
</tags>
|
||||||
|
</tagClass>
|
||||||
|
</tagClasses>
|
||||||
|
</tagListOptions>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-checkstyle-plugin</artifactId>
|
||||||
|
<version>2.11</version>
|
||||||
|
<configuration>
|
||||||
|
<enableRulesSummary>false</enableRulesSummary>
|
||||||
|
<enableFilesSummary>false</enableFilesSummary>
|
||||||
|
<configLocation>${basedir}/../src/main/config/checkstyle-checks.xml</configLocation>
|
||||||
|
<headerLocation>${basedir}/../src/main/config/checkstyle-header.txt</headerLocation>
|
||||||
|
<suppressionsLocation>${basedir}/../src/main/config/checkstyle-suppressions.xml</suppressionsLocation>
|
||||||
|
<suppressionsFileExpression>checkstyle.suppressions.file</suppressionsFileExpression>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-pmd-plugin</artifactId>
|
||||||
|
<version>3.0.1</version>
|
||||||
|
<configuration>
|
||||||
|
<targetJdk>1.6</targetJdk>
|
||||||
|
<linkXref>true</linkXref>
|
||||||
|
<sourceEncoding>utf-8</sourceEncoding>
|
||||||
|
<excludes>
|
||||||
|
<exclude>**/generated/*.java</exclude>
|
||||||
|
</excludes>
|
||||||
|
<rulesets>
|
||||||
|
<ruleset>../src/main/config/dcrules.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/basic.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/imports.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/unusedcode.xml</ruleset>
|
||||||
|
</rulesets>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>findbugs-maven-plugin</artifactId>
|
||||||
|
<version>2.5.3</version>
|
||||||
|
</plugin>
|
||||||
|
</plugins>
|
||||||
|
</reporting>
|
||||||
<dependencies>
|
<dependencies>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.owasp</groupId>
|
<groupId>org.owasp</groupId>
|
||||||
<artifactId>dependency-check-core</artifactId>
|
<artifactId>dependency-check-core</artifactId>
|
||||||
<version>${project.parent.version}</version>
|
<version>${project.parent.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.owasp</groupId>
|
||||||
|
<artifactId>dependency-check-utils</artifactId>
|
||||||
|
<version>${project.parent.version}</version>
|
||||||
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.owasp</groupId>
|
<groupId>org.owasp</groupId>
|
||||||
<artifactId>dependency-check-core</artifactId>
|
<artifactId>dependency-check-core</artifactId>
|
||||||
@@ -442,12 +423,12 @@ Copyright (c) 2013 - Jeremy Long. All Rights Reserved.
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.ant</groupId>
|
<groupId>org.apache.ant</groupId>
|
||||||
<artifactId>ant</artifactId>
|
<artifactId>ant</artifactId>
|
||||||
<version>1.9.3</version>
|
<version>1.9.4</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.ant</groupId>
|
<groupId>org.apache.ant</groupId>
|
||||||
<artifactId>ant-testutil</artifactId>
|
<artifactId>ant-testutil</artifactId>
|
||||||
<version>1.9.3</version>
|
<version>1.9.4</version>
|
||||||
<scope>test</scope>
|
<scope>test</scope>
|
||||||
</dependency>
|
</dependency>
|
||||||
</dependencies>
|
</dependencies>
|
||||||
|
|||||||
@@ -46,7 +46,7 @@ import org.owasp.dependencycheck.utils.Settings;
|
|||||||
/**
|
/**
|
||||||
* An Ant task definition to execute dependency-check during an Ant build.
|
* An Ant task definition to execute dependency-check during an Ant build.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class DependencyCheckTask extends Task {
|
public class DependencyCheckTask extends Task {
|
||||||
|
|
||||||
@@ -62,6 +62,10 @@ public class DependencyCheckTask extends Task {
|
|||||||
* System specific new line character.
|
* System specific new line character.
|
||||||
*/
|
*/
|
||||||
private static final String NEW_LINE = System.getProperty("line.separator", "\n").intern();
|
private static final String NEW_LINE = System.getProperty("line.separator", "\n").intern();
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(DependencyCheckTask.class.getName());
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Construct a new DependencyCheckTask.
|
* Construct a new DependencyCheckTask.
|
||||||
@@ -94,8 +98,8 @@ public class DependencyCheckTask extends Task {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the path. If the path has not been initialized yet, this class is synchronized, and will instantiate the
|
* Returns the path. If the path has not been initialized yet, this class is synchronized, and will instantiate the path
|
||||||
* path object.
|
* object.
|
||||||
*
|
*
|
||||||
* @return the path
|
* @return the path
|
||||||
*/
|
*/
|
||||||
@@ -211,9 +215,9 @@ public class DependencyCheckTask extends Task {
|
|||||||
this.reportOutputDirectory = reportOutputDirectory;
|
this.reportOutputDirectory = reportOutputDirectory;
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* Specifies if the build should be failed if a CVSS score above a specified level is identified. The default is 11
|
* Specifies if the build should be failed if a CVSS score above a specified level is identified. The default is 11 which
|
||||||
* which means since the CVSS scores are 0-10, by default the build will never fail and the CVSS score is set to 11.
|
* means since the CVSS scores are 0-10, by default the build will never fail and the CVSS score is set to 11. The valid range
|
||||||
* The valid range for the fail build on CVSS is 0 to 11, where anything above 10 will not cause the build to fail.
|
* for the fail build on CVSS is 0 to 11, where anything above 10 will not cause the build to fail.
|
||||||
*/
|
*/
|
||||||
private float failBuildOnCVSS = 11;
|
private float failBuildOnCVSS = 11;
|
||||||
|
|
||||||
@@ -235,8 +239,8 @@ public class DependencyCheckTask extends Task {
|
|||||||
this.failBuildOnCVSS = failBuildOnCVSS;
|
this.failBuildOnCVSS = failBuildOnCVSS;
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* Sets whether auto-updating of the NVD CVE/CPE data is enabled. It is not recommended that this be turned to
|
* Sets whether auto-updating of the NVD CVE/CPE data is enabled. It is not recommended that this be turned to false. Default
|
||||||
* false. Default is true.
|
* is true.
|
||||||
*/
|
*/
|
||||||
private boolean autoUpdate = true;
|
private boolean autoUpdate = true;
|
||||||
|
|
||||||
@@ -258,8 +262,31 @@ public class DependencyCheckTask extends Task {
|
|||||||
this.autoUpdate = autoUpdate;
|
this.autoUpdate = autoUpdate;
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* The report format to be generated (HTML, XML, VULN, ALL). This configuration option has no affect if using this
|
* Whether only the update phase should be executed.
|
||||||
* within the Site plugin unless the externalReport is set to true. Default is HTML.
|
*/
|
||||||
|
private boolean updateOnly = false;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of updateOnly.
|
||||||
|
*
|
||||||
|
* @return the value of updateOnly
|
||||||
|
*/
|
||||||
|
public boolean isUpdateOnly() {
|
||||||
|
return updateOnly;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of updateOnly.
|
||||||
|
*
|
||||||
|
* @param updateOnly new value of updateOnly
|
||||||
|
*/
|
||||||
|
public void setUpdateOnly(boolean updateOnly) {
|
||||||
|
this.updateOnly = updateOnly;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The report format to be generated (HTML, XML, VULN, ALL). This configuration option has no affect if using this within the
|
||||||
|
* Site plugin unless the externalReport is set to true. Default is HTML.
|
||||||
*/
|
*/
|
||||||
private String reportFormat = "HTML";
|
private String reportFormat = "HTML";
|
||||||
|
|
||||||
@@ -281,26 +308,49 @@ public class DependencyCheckTask extends Task {
|
|||||||
this.reportFormat = reportFormat.getValue();
|
this.reportFormat = reportFormat.getValue();
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* The Proxy URL.
|
* The Proxy Server.
|
||||||
*/
|
*/
|
||||||
private String proxyUrl;
|
private String proxyServer;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get the value of proxyUrl.
|
* Get the value of proxyServer.
|
||||||
*
|
*
|
||||||
* @return the value of proxyUrl
|
* @return the value of proxyServer
|
||||||
*/
|
*/
|
||||||
public String getProxyUrl() {
|
public String getProxyServer() {
|
||||||
return proxyUrl;
|
return proxyServer;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Set the value of proxyUrl.
|
* Set the value of proxyServer.
|
||||||
*
|
*
|
||||||
* @param proxyUrl new value of proxyUrl
|
* @param server new value of proxyServer
|
||||||
*/
|
*/
|
||||||
|
public void setProxyServer(String server) {
|
||||||
|
this.proxyServer = server;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of proxyServer.
|
||||||
|
*
|
||||||
|
* @return the value of proxyServer
|
||||||
|
* @deprecated use {@link org.owasp.dependencycheck.taskdefs.DependencyCheckTask#getProxyServer()} instead
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
|
public String getProxyUrl() {
|
||||||
|
return proxyServer;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of proxyServer.
|
||||||
|
*
|
||||||
|
* @param proxyUrl new value of proxyServer
|
||||||
|
* @deprecated use {@link org.owasp.dependencycheck.taskdefs.DependencyCheckTask#setProxyServer(java.lang.String)} instead
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public void setProxyUrl(String proxyUrl) {
|
public void setProxyUrl(String proxyUrl) {
|
||||||
this.proxyUrl = proxyUrl;
|
LOGGER.warning("A deprecated configuration option 'proxyUrl' was detected; use 'proxyServer' instead.");
|
||||||
|
this.proxyServer = proxyUrl;
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* The Proxy Port.
|
* The Proxy Port.
|
||||||
@@ -457,6 +507,103 @@ public class DependencyCheckTask extends Task {
|
|||||||
this.showSummary = showSummary;
|
this.showSummary = showSummary;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @param jarAnalyzerEnabled the value of the new setting
|
||||||
|
*/
|
||||||
|
public void setJarAnalyzerEnabled(boolean jarAnalyzerEnabled) {
|
||||||
|
this.jarAnalyzerEnabled = jarAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* Whether or not the Archive Analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private boolean archiveAnalyzerEnabled = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @return true if the analyzer is enabled
|
||||||
|
*/
|
||||||
|
public boolean isArchiveAnalyzerEnabled() {
|
||||||
|
return archiveAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* Whether or not the .NET Assembly Analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private boolean assemblyAnalyzerEnabled = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @param archiveAnalyzerEnabled the value of the new setting
|
||||||
|
*/
|
||||||
|
public void setArchiveAnalyzerEnabled(boolean archiveAnalyzerEnabled) {
|
||||||
|
this.archiveAnalyzerEnabled = archiveAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @return true if the analyzer is enabled
|
||||||
|
*/
|
||||||
|
public boolean isAssemblyAnalyzerEnabled() {
|
||||||
|
return assemblyAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @param assemblyAnalyzerEnabled the value of the new setting
|
||||||
|
*/
|
||||||
|
public void setAssemblyAnalyzerEnabled(boolean assemblyAnalyzerEnabled) {
|
||||||
|
this.assemblyAnalyzerEnabled = assemblyAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* Whether or not the .NET Nuspec Analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private boolean nuspecAnalyzerEnabled = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @return true if the analyzer is enabled
|
||||||
|
*/
|
||||||
|
public boolean isNuspecAnalyzerEnabled() {
|
||||||
|
return nuspecAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @param nuspecAnalyzerEnabled the value of the new setting
|
||||||
|
*/
|
||||||
|
public void setNuspecAnalyzerEnabled(boolean nuspecAnalyzerEnabled) {
|
||||||
|
this.nuspecAnalyzerEnabled = nuspecAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* Whether or not the central analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private boolean centralAnalyzerEnabled = false;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of centralAnalyzerEnabled.
|
||||||
|
*
|
||||||
|
* @return the value of centralAnalyzerEnabled
|
||||||
|
*/
|
||||||
|
public boolean isCentralAnalyzerEnabled() {
|
||||||
|
return centralAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of centralAnalyzerEnabled.
|
||||||
|
*
|
||||||
|
* @param centralAnalyzerEnabled new value of centralAnalyzerEnabled
|
||||||
|
*/
|
||||||
|
public void setCentralAnalyzerEnabled(boolean centralAnalyzerEnabled) {
|
||||||
|
this.centralAnalyzerEnabled = centralAnalyzerEnabled;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Whether or not the nexus analyzer is enabled.
|
* Whether or not the nexus analyzer is enabled.
|
||||||
*/
|
*/
|
||||||
@@ -481,7 +628,7 @@ public class DependencyCheckTask extends Task {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The URL of the Nexus server.
|
* The URL of a Nexus server's REST API end point (http://domain/nexus/service/local).
|
||||||
*/
|
*/
|
||||||
private String nexusUrl;
|
private String nexusUrl;
|
||||||
|
|
||||||
@@ -502,6 +649,28 @@ public class DependencyCheckTask extends Task {
|
|||||||
public void setNexusUrl(String nexusUrl) {
|
public void setNexusUrl(String nexusUrl) {
|
||||||
this.nexusUrl = nexusUrl;
|
this.nexusUrl = nexusUrl;
|
||||||
}
|
}
|
||||||
|
/**
|
||||||
|
* Whether or not the defined proxy should be used when connecting to Nexus.
|
||||||
|
*/
|
||||||
|
private boolean nexusUsesProxy = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of nexusUsesProxy.
|
||||||
|
*
|
||||||
|
* @return the value of nexusUsesProxy
|
||||||
|
*/
|
||||||
|
public boolean isNexusUsesProxy() {
|
||||||
|
return nexusUsesProxy;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of nexusUsesProxy.
|
||||||
|
*
|
||||||
|
* @param nexusUsesProxy new value of nexusUsesProxy
|
||||||
|
*/
|
||||||
|
public void setNexusUsesProxy(boolean nexusUsesProxy) {
|
||||||
|
this.nexusUsesProxy = nexusUsesProxy;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The database driver name; such as org.h2.Driver.
|
* The database driver name; such as org.h2.Driver.
|
||||||
@@ -616,6 +785,144 @@ public class DependencyCheckTask extends Task {
|
|||||||
this.databasePassword = databasePassword;
|
this.databasePassword = databasePassword;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Additional ZIP File extensions to add analyze. This should be a comma-separated list of file extensions to treat like ZIP
|
||||||
|
* files.
|
||||||
|
*/
|
||||||
|
private String zipExtensions;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of zipExtensions.
|
||||||
|
*
|
||||||
|
* @return the value of zipExtensions
|
||||||
|
*/
|
||||||
|
public String getZipExtensions() {
|
||||||
|
return zipExtensions;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of zipExtensions.
|
||||||
|
*
|
||||||
|
* @param zipExtensions new value of zipExtensions
|
||||||
|
*/
|
||||||
|
public void setZipExtensions(String zipExtensions) {
|
||||||
|
this.zipExtensions = zipExtensions;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The url for the modified NVD CVE (1.2 schema).
|
||||||
|
*/
|
||||||
|
private String cveUrl12Modified;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of cveUrl12Modified.
|
||||||
|
*
|
||||||
|
* @return the value of cveUrl12Modified
|
||||||
|
*/
|
||||||
|
public String getCveUrl12Modified() {
|
||||||
|
return cveUrl12Modified;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of cveUrl12Modified.
|
||||||
|
*
|
||||||
|
* @param cveUrl12Modified new value of cveUrl12Modified
|
||||||
|
*/
|
||||||
|
public void setCveUrl12Modified(String cveUrl12Modified) {
|
||||||
|
this.cveUrl12Modified = cveUrl12Modified;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The url for the modified NVD CVE (2.0 schema).
|
||||||
|
*/
|
||||||
|
private String cveUrl20Modified;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of cveUrl20Modified.
|
||||||
|
*
|
||||||
|
* @return the value of cveUrl20Modified
|
||||||
|
*/
|
||||||
|
public String getCveUrl20Modified() {
|
||||||
|
return cveUrl20Modified;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of cveUrl20Modified.
|
||||||
|
*
|
||||||
|
* @param cveUrl20Modified new value of cveUrl20Modified
|
||||||
|
*/
|
||||||
|
public void setCveUrl20Modified(String cveUrl20Modified) {
|
||||||
|
this.cveUrl20Modified = cveUrl20Modified;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Base Data Mirror URL for CVE 1.2.
|
||||||
|
*/
|
||||||
|
private String cveUrl12Base;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of cveUrl12Base.
|
||||||
|
*
|
||||||
|
* @return the value of cveUrl12Base
|
||||||
|
*/
|
||||||
|
public String getCveUrl12Base() {
|
||||||
|
return cveUrl12Base;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of cveUrl12Base.
|
||||||
|
*
|
||||||
|
* @param cveUrl12Base new value of cveUrl12Base
|
||||||
|
*/
|
||||||
|
public void setCveUrl12Base(String cveUrl12Base) {
|
||||||
|
this.cveUrl12Base = cveUrl12Base;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Data Mirror URL for CVE 2.0.
|
||||||
|
*/
|
||||||
|
private String cveUrl20Base;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of cveUrl20Base.
|
||||||
|
*
|
||||||
|
* @return the value of cveUrl20Base
|
||||||
|
*/
|
||||||
|
public String getCveUrl20Base() {
|
||||||
|
return cveUrl20Base;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of cveUrl20Base.
|
||||||
|
*
|
||||||
|
* @param cveUrl20Base new value of cveUrl20Base
|
||||||
|
*/
|
||||||
|
public void setCveUrl20Base(String cveUrl20Base) {
|
||||||
|
this.cveUrl20Base = cveUrl20Base;
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* The path to Mono for .NET assembly analysis on non-windows systems.
|
||||||
|
*/
|
||||||
|
private String pathToMono;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of pathToMono.
|
||||||
|
*
|
||||||
|
* @return the value of pathToMono
|
||||||
|
*/
|
||||||
|
public String getPathToMono() {
|
||||||
|
return pathToMono;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of pathToMono.
|
||||||
|
*
|
||||||
|
* @param pathToMono new value of pathToMono
|
||||||
|
*/
|
||||||
|
public void setPathToMono(String pathToMono) {
|
||||||
|
this.pathToMono = pathToMono;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void execute() throws BuildException {
|
public void execute() throws BuildException {
|
||||||
final InputStream in = DependencyCheckTask.class.getClassLoader().getResourceAsStream(LOG_PROPERTIES_FILE);
|
final InputStream in = DependencyCheckTask.class.getClassLoader().getResourceAsStream(LOG_PROPERTIES_FILE);
|
||||||
@@ -625,46 +932,63 @@ public class DependencyCheckTask extends Task {
|
|||||||
validateConfiguration();
|
validateConfiguration();
|
||||||
populateSettings();
|
populateSettings();
|
||||||
|
|
||||||
final Engine engine = new Engine();
|
Engine engine = null;
|
||||||
for (Resource resource : path) {
|
|
||||||
final FileProvider provider = resource.as(FileProvider.class);
|
|
||||||
if (provider != null) {
|
|
||||||
final File file = provider.getFile();
|
|
||||||
if (file != null && file.exists()) {
|
|
||||||
engine.scan(file);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
try {
|
try {
|
||||||
engine.analyzeDependencies();
|
engine = new Engine(DependencyCheckTask.class.getClassLoader());
|
||||||
DatabaseProperties prop = null;
|
//todo - should this be its own task?
|
||||||
CveDB cve = null;
|
if (updateOnly) {
|
||||||
try {
|
engine.doUpdates();
|
||||||
cve = new CveDB();
|
} else {
|
||||||
cve.open();
|
try {
|
||||||
prop = cve.getDatabaseProperties();
|
for (Resource resource : path) {
|
||||||
} catch (DatabaseException ex) {
|
final FileProvider provider = resource.as(FileProvider.class);
|
||||||
Logger.getLogger(DependencyCheckTask.class.getName()).log(Level.FINE, "Unable to retrieve DB Properties", ex);
|
if (provider != null) {
|
||||||
} finally {
|
final File file = provider.getFile();
|
||||||
if (cve != null) {
|
if (file != null && file.exists()) {
|
||||||
cve.close();
|
engine.scan(file);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
engine.analyzeDependencies();
|
||||||
|
DatabaseProperties prop = null;
|
||||||
|
CveDB cve = null;
|
||||||
|
try {
|
||||||
|
cve = new CveDB();
|
||||||
|
cve.open();
|
||||||
|
prop = cve.getDatabaseProperties();
|
||||||
|
} catch (DatabaseException ex) {
|
||||||
|
LOGGER.log(Level.FINE, "Unable to retrieve DB Properties", ex);
|
||||||
|
} finally {
|
||||||
|
if (cve != null) {
|
||||||
|
cve.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
final ReportGenerator reporter = new ReportGenerator(applicationName, engine.getDependencies(), engine.getAnalyzers(), prop);
|
||||||
|
reporter.generateReports(reportOutputDirectory, reportFormat);
|
||||||
|
|
||||||
|
if (this.failBuildOnCVSS <= 10) {
|
||||||
|
checkForFailure(engine.getDependencies());
|
||||||
|
}
|
||||||
|
if (this.showSummary) {
|
||||||
|
showSummary(engine.getDependencies());
|
||||||
|
}
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.FINE, "Unable to generate dependency-check report", ex);
|
||||||
|
throw new BuildException("Unable to generate dependency-check report", ex);
|
||||||
|
} catch (Exception ex) {
|
||||||
|
LOGGER.log(Level.FINE, "An exception occurred; unable to continue task", ex);
|
||||||
|
throw new BuildException("An exception occurred; unable to continue task", ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
final ReportGenerator reporter = new ReportGenerator(applicationName, engine.getDependencies(), engine.getAnalyzers(), prop);
|
} catch (DatabaseException ex) {
|
||||||
reporter.generateReports(reportOutputDirectory, reportFormat);
|
LOGGER.log(Level.SEVERE, "Unable to connect to the dependency-check database; analysis has stopped");
|
||||||
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
if (this.failBuildOnCVSS <= 10) {
|
} finally {
|
||||||
checkForFailure(engine.getDependencies());
|
Settings.cleanup(true);
|
||||||
|
if (engine != null) {
|
||||||
|
engine.cleanup();
|
||||||
}
|
}
|
||||||
if (this.showSummary) {
|
|
||||||
showSummary(engine.getDependencies());
|
|
||||||
}
|
|
||||||
} catch (IOException ex) {
|
|
||||||
Logger.getLogger(DependencyCheckTask.class.getName()).log(Level.FINE, "Unable to generate dependency-check report", ex);
|
|
||||||
throw new BuildException("Unable to generate dependency-check report", ex);
|
|
||||||
} catch (Exception ex) {
|
|
||||||
Logger.getLogger(DependencyCheckTask.class.getName()).log(Level.FINE, "An exception occurred; unable to continue task", ex);
|
|
||||||
throw new BuildException("An exception occurred; unable to continue task", ex);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -683,23 +1007,24 @@ public class DependencyCheckTask extends Task {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Takes the properties supplied and updates the dependency-check settings. Additionally, this sets the system
|
* Takes the properties supplied and updates the dependency-check settings. Additionally, this sets the system properties
|
||||||
* properties required to change the proxy url, port, and connection timeout.
|
* required to change the proxy server, port, and connection timeout.
|
||||||
*/
|
*/
|
||||||
private void populateSettings() {
|
private void populateSettings() {
|
||||||
|
Settings.initialize();
|
||||||
InputStream taskProperties = null;
|
InputStream taskProperties = null;
|
||||||
try {
|
try {
|
||||||
taskProperties = this.getClass().getClassLoader().getResourceAsStream(PROPERTIES_FILE);
|
taskProperties = this.getClass().getClassLoader().getResourceAsStream(PROPERTIES_FILE);
|
||||||
Settings.mergeProperties(taskProperties);
|
Settings.mergeProperties(taskProperties);
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(DependencyCheckTask.class.getName()).log(Level.WARNING, "Unable to load the dependency-check ant task.properties file.");
|
LOGGER.log(Level.WARNING, "Unable to load the dependency-check ant task.properties file.");
|
||||||
Logger.getLogger(DependencyCheckTask.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} finally {
|
} finally {
|
||||||
if (taskProperties != null) {
|
if (taskProperties != null) {
|
||||||
try {
|
try {
|
||||||
taskProperties.close();
|
taskProperties.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(DependencyCheckTask.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -715,8 +1040,8 @@ public class DependencyCheckTask extends Task {
|
|||||||
|
|
||||||
Settings.setBoolean(Settings.KEYS.AUTO_UPDATE, autoUpdate);
|
Settings.setBoolean(Settings.KEYS.AUTO_UPDATE, autoUpdate);
|
||||||
|
|
||||||
if (proxyUrl != null && !proxyUrl.isEmpty()) {
|
if (proxyServer != null && !proxyServer.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.PROXY_URL, proxyUrl);
|
Settings.setString(Settings.KEYS.PROXY_SERVER, proxyServer);
|
||||||
}
|
}
|
||||||
if (proxyPort != null && !proxyPort.isEmpty()) {
|
if (proxyPort != null && !proxyPort.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.PROXY_PORT, proxyPort);
|
Settings.setString(Settings.KEYS.PROXY_PORT, proxyPort);
|
||||||
@@ -733,10 +1058,31 @@ public class DependencyCheckTask extends Task {
|
|||||||
if (suppressionFile != null && !suppressionFile.isEmpty()) {
|
if (suppressionFile != null && !suppressionFile.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.SUPPRESSION_FILE, suppressionFile);
|
Settings.setString(Settings.KEYS.SUPPRESSION_FILE, suppressionFile);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//File Type Analyzer Settings
|
||||||
|
//JAR ANALYZER
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_JAR_ENABLED, jarAnalyzerEnabled);
|
||||||
|
//NUSPEC ANALYZER
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_NUSPEC_ENABLED, nuspecAnalyzerEnabled);
|
||||||
|
//CENTRAL ANALYZER
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_CENTRAL_ENABLED, centralAnalyzerEnabled);
|
||||||
|
//NEXUS ANALYZER
|
||||||
Settings.setBoolean(Settings.KEYS.ANALYZER_NEXUS_ENABLED, nexusAnalyzerEnabled);
|
Settings.setBoolean(Settings.KEYS.ANALYZER_NEXUS_ENABLED, nexusAnalyzerEnabled);
|
||||||
if (nexusUrl != null && !nexusUrl.isEmpty()) {
|
if (nexusUrl != null && !nexusUrl.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.ANALYZER_NEXUS_URL, nexusUrl);
|
Settings.setString(Settings.KEYS.ANALYZER_NEXUS_URL, nexusUrl);
|
||||||
}
|
}
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_NEXUS_PROXY, nexusUsesProxy);
|
||||||
|
//ARCHIVE ANALYZER
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_ARCHIVE_ENABLED, archiveAnalyzerEnabled);
|
||||||
|
if (zipExtensions != null && !zipExtensions.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.ADDITIONAL_ZIP_EXTENSIONS, zipExtensions);
|
||||||
|
}
|
||||||
|
//ASSEMBLY ANALYZER
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_ASSEMBLY_ENABLED, assemblyAnalyzerEnabled);
|
||||||
|
if (pathToMono != null && !pathToMono.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.ANALYZER_ASSEMBLY_MONO_PATH, pathToMono);
|
||||||
|
}
|
||||||
|
|
||||||
if (databaseDriverName != null && !databaseDriverName.isEmpty()) {
|
if (databaseDriverName != null && !databaseDriverName.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.DB_DRIVER_NAME, databaseDriverName);
|
Settings.setString(Settings.KEYS.DB_DRIVER_NAME, databaseDriverName);
|
||||||
}
|
}
|
||||||
@@ -752,6 +1098,18 @@ public class DependencyCheckTask extends Task {
|
|||||||
if (databasePassword != null && !databasePassword.isEmpty()) {
|
if (databasePassword != null && !databasePassword.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.DB_PASSWORD, databasePassword);
|
Settings.setString(Settings.KEYS.DB_PASSWORD, databasePassword);
|
||||||
}
|
}
|
||||||
|
if (cveUrl12Modified != null && !cveUrl12Modified.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.CVE_MODIFIED_12_URL, cveUrl12Modified);
|
||||||
|
}
|
||||||
|
if (cveUrl20Modified != null && !cveUrl20Modified.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.CVE_MODIFIED_20_URL, cveUrl20Modified);
|
||||||
|
}
|
||||||
|
if (cveUrl12Base != null && !cveUrl12Base.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.CVE_SCHEMA_1_2, cveUrl12Base);
|
||||||
|
}
|
||||||
|
if (cveUrl20Base != null && !cveUrl20Base.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.CVE_SCHEMA_2_0, cveUrl20Base);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -818,7 +1176,7 @@ public class DependencyCheckTask extends Task {
|
|||||||
final String msg = String.format("%n%n"
|
final String msg = String.format("%n%n"
|
||||||
+ "One or more dependencies were identified with known vulnerabilities:%n%n%s"
|
+ "One or more dependencies were identified with known vulnerabilities:%n%n%s"
|
||||||
+ "%n%nSee the dependency-check report for more details.%n%n", summary.toString());
|
+ "%n%nSee the dependency-check report for more details.%n%n", summary.toString());
|
||||||
Logger.getLogger(DependencyCheckTask.class.getName()).log(Level.WARNING, msg);
|
LOGGER.log(Level.WARNING, msg);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -843,4 +1201,18 @@ public class DependencyCheckTask extends Task {
|
|||||||
return values;
|
return values;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Whether or not the Jar Analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private boolean jarAnalyzerEnabled = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether or not the analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @return true if the analyzer is enabled
|
||||||
|
*/
|
||||||
|
public boolean isJarAnalyzerEnabled() {
|
||||||
|
return jarAnalyzerEnabled;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,11 +1,4 @@
|
|||||||
/**
|
/**
|
||||||
* <html>
|
|
||||||
* <head>
|
|
||||||
* <title>org.owasp.dependencycheck.taskdefs</title>
|
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* This package includes the Ant task definitions.
|
* This package includes the Ant task definitions.
|
||||||
* </body>
|
|
||||||
* </html>
|
|
||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.taskdefs;
|
package org.owasp.dependencycheck.taskdefs;
|
||||||
|
|||||||
@@ -18,29 +18,62 @@ the project's dependencies.
|
|||||||
</dependency-check>
|
</dependency-check>
|
||||||
</target>
|
</target>
|
||||||
```
|
```
|
||||||
The following table lists the configurable properties:
|
|
||||||
|
|
||||||
Property | Description | Requirement
|
Configuration
|
||||||
----------------------|-------------|---------
|
====================
|
||||||
ApplicationName | The name of the application to use in the generated report. | Required
|
The following properties can be set on the dependency-check-maven plugin.
|
||||||
ReportFormat | The format of the report to be generated. Allowed values are: HTML, XML, VULN, or ALL. The default value is HTML.| Optional
|
|
||||||
ReportOutputDirectory | The directory where dependency-check will store data used for analysis. Defaults to the current working directory. | Optional
|
|
||||||
FailBuildOn | If set and a CVE is found that is greater then the specified value the build will fail. The default value is 11 which means that the build will not fail. Valid values are 0-11. | Optional
|
|
||||||
AutoUpdate | If set to false the NVD CVE data is not automatically updated. Setting this to false could result in false negatives. However, this may be required in some environments. The default value is true. | Optional
|
|
||||||
DataDirectory | The directory where dependency-check will store data used for analysis. Defaults to a folder called, called 'dependency-check-data', that is in the same directory as the dependency-check-ant jar file was installed in. *It is not recommended to change this.* | Optional
|
|
||||||
LogFile | The file path to write verbose logging information. | Optional
|
|
||||||
SuppressionFile | An XML file conforming to the suppression schema that suppresses findings; this is used to hide [false positives](../suppression.html). | Optional
|
|
||||||
ProxyUrl | Defines the proxy used to connect to the Internet. | Optional
|
|
||||||
ProxyPort | Defines the port for the proxy. | Optional
|
|
||||||
ProxyUsername | Defines the proxy user name. | Optional
|
|
||||||
ProxyPassword | Defines the proxy password. | Optional
|
|
||||||
ConnectionTimeout | The connection timeout used when downloading data files from the Internet. | Optional
|
|
||||||
nexusAnalyzerEnabled | The connection timeout used when downloading data files from the Internet. | Optional
|
|
||||||
nexusUrl | The connection timeout used when downloading data files from the Internet. | Optional
|
|
||||||
databaseDriverName | The name of the database driver. Example: org.h2.Driver. | Optional
|
|
||||||
databaseDriverPath | The path to the database driver JAR file; only used if the driver is not in the class path. | Optional
|
|
||||||
connectionString | The connection string used to connect to the database. | Optional
|
|
||||||
databaseUser | The username used when connecting to the database. | Optional
|
|
||||||
databasePassword | The password used when connecting to the database. | Optional
|
|
||||||
|
|
||||||
|
Property | Description | Default Value
|
||||||
|
---------------------|------------------------------------|------------------
|
||||||
|
autoUpdate | Sets whether auto-updating of the NVD CVE/CPE data is enabled. It is not recommended that this be turned to false. | true
|
||||||
|
updateOnly | If set to true only the update phase of dependency-check will be executed; no scan will be executed and no report will be generated. | false
|
||||||
|
externalReport | When using as a Site plugin this parameter sets whether or not the external report format should be used. | false
|
||||||
|
outputDirectory | The location to write the report(s). Note, this is not used if generating the report as part of a `mvn site` build | 'target'
|
||||||
|
failBuildOnCVSS | Specifies if the build should be failed if a CVSS score above a specified level is identified. The default is 11 which means since the CVSS scores are 0-10, by default the build will never fail. | 11
|
||||||
|
format | The report format to be generated (HTML, XML, VULN, ALL). This configuration option has no affect if using this within the Site plugin unless the externalReport is set to true. | HTML
|
||||||
|
logFile | The file path to write verbose logging information. |
|
||||||
|
suppressionFile | The file path to the XML suppression file \- used to suppress [false positives](../suppression.html) |
|
||||||
|
proxyServer | The Proxy Server. |
|
||||||
|
proxyPort | The Proxy Port. |
|
||||||
|
proxyUsername | Defines the proxy user name. |
|
||||||
|
proxyPassword | Defines the proxy password. |
|
||||||
|
connectionTimeout | The URL Connection Timeout. |
|
||||||
|
|
||||||
|
Analyzer Configuration
|
||||||
|
====================
|
||||||
|
The following properties are used to configure the various file type analyzers.
|
||||||
|
These properties can be used to turn off specific analyzers if it is not needed.
|
||||||
|
Note, that specific analyzers will automatically disable themselves if no file
|
||||||
|
types that they support are detected - so specifically disabling them may not
|
||||||
|
be needed.
|
||||||
|
|
||||||
|
Property | Description | Default Value
|
||||||
|
------------------------|---------------------------------------------------------------------------|------------------
|
||||||
|
archiveAnalyzerEnabled | Sets whether the Archive Analyzer will be used. | true
|
||||||
|
zipExtensions | A comma-separated list of additional file extensions to be treated like a ZIP file, the contents will be extracted and analyzed. |
|
||||||
|
jarAnalyzer | Sets whether the Jar Analyzer will be used. | true
|
||||||
|
centralAnalyzerEnabled | Sets whether the Central Analyzer will be used. **Disabling this analyzer is not recommended as it could lead to false negatives (e.g. libraries that have vulnerabilities may not be reported correctly).** If this analyzer is being disabled there is a good chance you also want to disable the Nexus Analyzer (see below). | true
|
||||||
|
nexusAnalyzerEnabled | Sets whether Nexus Analyzer will be used. This analyzer is superceded by the Central Analyzer; however, you can configure this to run against a Nexus Pro installation. | true
|
||||||
|
nexusUrl | Defines the Nexus web service endpoint (example http://domain.enterprise/nexus/service/local/). If not set the Nexus Analyzer will be disabled. |
|
||||||
|
nexusUsesProxy | Whether or not the defined proxy should be used when connecting to Nexus. | true
|
||||||
|
nuspecAnalyzerEnabled | Sets whether or not the .NET Nuget Nuspec Analyzer will be used. | true
|
||||||
|
assemblyAnalyzerEnabled | Sets whether or not the .NET Assembly Analyzer should be used. | true
|
||||||
|
pathToMono | The path to Mono for .NET assembly analysis on non-windows systems. |
|
||||||
|
|
||||||
|
Advanced Configuration
|
||||||
|
====================
|
||||||
|
The following properties can be configured in the plugin. However, they are less frequently changed. One exception
|
||||||
|
may be the cvedUrl properties, which can be used to host a mirror of the NVD within an enterprise environment.
|
||||||
|
|
||||||
|
Property | Description | Default Value
|
||||||
|
---------------------|-------------------------------------------------------------------------|------------------
|
||||||
|
cveUrl12Modified | URL for the modified CVE 1.2 | http://nvd.nist.gov/download/nvdcve-modified.xml
|
||||||
|
cveUrl20Modified | URL for the modified CVE 2.0 | http://static.nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-modified.xml
|
||||||
|
cveUrl12Base | Base URL for each year's CVE 1.2, the %d will be replaced with the year | http://nvd.nist.gov/download/nvdcve-%d.xml
|
||||||
|
cveUrl20Base | Base URL for each year's CVE 2.0, the %d will be replaced with the year | http://static.nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-%d.xml
|
||||||
|
dataDirectory | Data directory to hold SQL CVEs contents. This should generally not be changed. |
|
||||||
|
databaseDriverName | The name of the database driver. Example: org.h2.Driver. |
|
||||||
|
databaseDriverPath | The path to the database driver JAR file; only used if the driver is not in the class path. |
|
||||||
|
connectionString | The connection string used to connect to the database. |
|
||||||
|
databaseUser | The username used when connecting to the database. |
|
||||||
|
databasePassword | The password used when connecting to the database. |
|
||||||
|
|||||||
33
dependency-check-ant/src/site/markdown/index.md.vm
Normal file
33
dependency-check-ant/src/site/markdown/index.md.vm
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
About
|
||||||
|
====================
|
||||||
|
OWASP dependency-check-ant is an Ant Task that uses dependency-check-core to detect publicly
|
||||||
|
disclosed vulnerabilities associated with the project's dependencies. The task will
|
||||||
|
generate a report listing the dependency, any identified Common Platform Enumeration (CPE)
|
||||||
|
identifiers, and the associated Common Vulnerability and Exposure (CVE) entries.
|
||||||
|
|
||||||
|
Installation
|
||||||
|
====================
|
||||||
|
Download dependency-check-ant from [bintray here](http://dl.bintray.com/jeremy-long/owasp/dependency-check-ant-${project.version}.jar).
|
||||||
|
To install dependency-check-ant place the dependency-check-ant-${project.version}.jar into
|
||||||
|
the lib directory of your Ant instalation directory. Once installed you can add
|
||||||
|
the taskdef to you build.xml and add the task to a new or existing target:
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<taskdef name="dependency-check" classname="org.owasp.dependencycheck.taskdefs.DependencyCheckTask"/>
|
||||||
|
```
|
||||||
|
|
||||||
|
If you do not want to install dependency-check-ant into your ant's lib directory when you define the task def you
|
||||||
|
must add the classpath to the taskdef:
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<taskdef name="dependency-check" classname="org.owasp.dependencycheck.taskdefs.DependencyCheckTask">
|
||||||
|
<classpath path="[path]/[to]/dependency-check-ant-${project.version}.jar"/>
|
||||||
|
</taskdef>
|
||||||
|
```
|
||||||
|
|
||||||
|
It is important to understand that the first time this task is executed it may
|
||||||
|
take 10 minutes or more as it downloads and processes the data from the National
|
||||||
|
Vulnerability Database (NVD) hosted by NIST: https://nvd.nist.gov
|
||||||
|
|
||||||
|
After the first batch download, as long as the task is executed at least once every
|
||||||
|
seven days the update will only take a few seconds.
|
||||||
@@ -1,13 +0,0 @@
|
|||||||
Installation
|
|
||||||
====================
|
|
||||||
Download dependency-check-ant from [bintray here](http://dl.bintray.com/jeremy-long/owasp/dependency-check-ant-${project.version}.jar).
|
|
||||||
To install dependency-check-ant place the dependency-check-ant-${project.version}.jar into
|
|
||||||
the lib directory of your Ant instalation directory. Once installed you can add
|
|
||||||
the taskdef to you build.xml and add the task to a new or existing target.
|
|
||||||
|
|
||||||
It is important to understand that the first time this task is executed it may
|
|
||||||
take 20 minutes or more as it downloads and processes the data from the National
|
|
||||||
Vulnerability Database (NVD) hosted by NIST: https://nvd.nist.gov
|
|
||||||
|
|
||||||
After the first batch download, as long as the task is executed at least once every
|
|
||||||
seven days the update will only take a few seconds.
|
|
||||||
@@ -1,11 +1,19 @@
|
|||||||
Usage
|
Usage
|
||||||
====================
|
====================
|
||||||
First, add the dependency-check-ant taskdef to your build.xml:
|
First, add the dependency-check-ant taskdef to your build.xml (see the [installation guide](installation.html)):
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<taskdef name="dependency-check" classname="org.owasp.dependencycheck.taskdefs.DependencyCheckTask"/>
|
<taskdef name="dependency-check" classname="org.owasp.dependencycheck.taskdefs.DependencyCheckTask"/>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Or
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<taskdef name="dependency-check" classname="org.owasp.dependencycheck.taskdefs.DependencyCheckTask">
|
||||||
|
<classpath path="[path]/[to]/dependency-check-ant-${project.version}.jar"/>
|
||||||
|
</taskdef>
|
||||||
|
```
|
||||||
|
|
||||||
Next, add the task to a target of your choosing:
|
Next, add the task to a target of your choosing:
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
File diff suppressed because one or more lines are too long
|
After Width: | Height: | Size: 10 KiB |
@@ -18,7 +18,9 @@ Copyright (c) 2013 Jeremy Long. All Rights Reserved.
|
|||||||
-->
|
-->
|
||||||
<project name="dependency-check-ant">
|
<project name="dependency-check-ant">
|
||||||
<bannerLeft>
|
<bannerLeft>
|
||||||
<name>dependency-check-ant</name>
|
<name>OWASP dependency-check-ant</name>
|
||||||
|
<alt>OWASP dependency-check-ant</alt>
|
||||||
|
<src>./images/dc-ant.svg</src>
|
||||||
</bannerLeft>
|
</bannerLeft>
|
||||||
<body>
|
<body>
|
||||||
<breadcrumbs>
|
<breadcrumbs>
|
||||||
@@ -29,7 +31,6 @@ Copyright (c) 2013 Jeremy Long. All Rights Reserved.
|
|||||||
<item name="Usage" href="usage.html"/>
|
<item name="Usage" href="usage.html"/>
|
||||||
<item name="Configuration" href="configuration.html"/>
|
<item name="Configuration" href="configuration.html"/>
|
||||||
</menu>
|
</menu>
|
||||||
<menu ref="Project Documentation" />
|
|
||||||
<menu ref="reports" />
|
<menu ref="reports" />
|
||||||
</body>
|
</body>
|
||||||
</project>
|
</project>
|
||||||
@@ -18,35 +18,27 @@
|
|||||||
package org.owasp.dependencycheck.taskdefs;
|
package org.owasp.dependencycheck.taskdefs;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import static junit.framework.TestCase.assertTrue;
|
|
||||||
import org.apache.tools.ant.BuildFileTest;
|
import org.apache.tools.ant.BuildFileTest;
|
||||||
import org.junit.After;
|
import org.junit.After;
|
||||||
import org.junit.AfterClass;
|
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.BeforeClass;
|
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.BaseDBTestCase;
|
import org.owasp.dependencycheck.data.nvdcve.BaseDBTestCase;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class DependencyCheckTaskTest extends BuildFileTest {
|
public class DependencyCheckTaskTest extends BuildFileTest {
|
||||||
|
//TODO: The use of deprecated class BuildFileTestcan possibly
|
||||||
public DependencyCheckTaskTest() {
|
//be replaced with BuildFileRule. However, it currently isn't included in the ant-testutil jar.
|
||||||
}
|
//This should be fixed in ant-testutil 1.9.5, so we can check back once that has been released.
|
||||||
|
//Reference: http://mail-archives.apache.org/mod_mbox/ant-user/201406.mbox/%3C000001cf87ba$8949b690$9bdd23b0$@de%3E
|
||||||
@BeforeClass
|
|
||||||
public static void setUpClass() {
|
|
||||||
}
|
|
||||||
|
|
||||||
@AfterClass
|
|
||||||
public static void tearDownClass() {
|
|
||||||
}
|
|
||||||
|
|
||||||
@Before
|
@Before
|
||||||
@Override
|
@Override
|
||||||
public void setUp() throws Exception {
|
public void setUp() throws Exception {
|
||||||
|
Settings.initialize();
|
||||||
BaseDBTestCase.ensureDBExists();
|
BaseDBTestCase.ensureDBExists();
|
||||||
final String buildFile = this.getClass().getClassLoader().getResource("build.xml").getPath();
|
final String buildFile = this.getClass().getClassLoader().getResource("build.xml").getPath();
|
||||||
configureProject(buildFile);
|
configureProject(buildFile);
|
||||||
@@ -57,6 +49,7 @@ public class DependencyCheckTaskTest extends BuildFileTest {
|
|||||||
public void tearDown() {
|
public void tearDown() {
|
||||||
//no cleanup...
|
//no cleanup...
|
||||||
//executeTarget("cleanup");
|
//executeTarget("cleanup");
|
||||||
|
Settings.cleanup(true);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -64,7 +57,7 @@ public class DependencyCheckTaskTest extends BuildFileTest {
|
|||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testAddFileSet() throws Exception {
|
public void testAddFileSet() throws Exception {
|
||||||
File report = new File("target/DependencyCheck-Report.html");
|
File report = new File("target/dependency-check-report.html");
|
||||||
if (report.exists()) {
|
if (report.exists()) {
|
||||||
if (!report.delete()) {
|
if (!report.delete()) {
|
||||||
throw new Exception("Unable to delete 'target/DependencyCheck-Report.html' prior to test.");
|
throw new Exception("Unable to delete 'target/DependencyCheck-Report.html' prior to test.");
|
||||||
@@ -83,7 +76,7 @@ public class DependencyCheckTaskTest extends BuildFileTest {
|
|||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testAddFileList() throws Exception {
|
public void testAddFileList() throws Exception {
|
||||||
File report = new File("target/DependencyCheck-Report.xml");
|
File report = new File("target/dependency-check-report.xml");
|
||||||
if (report.exists()) {
|
if (report.exists()) {
|
||||||
if (!report.delete()) {
|
if (!report.delete()) {
|
||||||
throw new Exception("Unable to delete 'target/DependencyCheck-Report.xml' prior to test.");
|
throw new Exception("Unable to delete 'target/DependencyCheck-Report.xml' prior to test.");
|
||||||
@@ -101,7 +94,7 @@ public class DependencyCheckTaskTest extends BuildFileTest {
|
|||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testAddDirSet() throws Exception {
|
public void testAddDirSet() throws Exception {
|
||||||
File report = new File("target/DependencyCheck-Vulnerability.html");
|
File report = new File("target/dependency-check-vulnerability.html");
|
||||||
if (report.exists()) {
|
if (report.exists()) {
|
||||||
if (!report.delete()) {
|
if (!report.delete()) {
|
||||||
throw new Exception("Unable to delete 'target/DependencyCheck-Vulnerability.html' prior to test.");
|
throw new Exception("Unable to delete 'target/DependencyCheck-Vulnerability.html' prior to test.");
|
||||||
|
|||||||
@@ -1,223 +0,0 @@
|
|||||||
<?xml version="1.0"?>
|
|
||||||
<!DOCTYPE module PUBLIC
|
|
||||||
"-//Puppy Crawl//DTD Check Configuration 1.3//EN"
|
|
||||||
"http://www.puppycrawl.com/dtds/configuration_1_3.dtd">
|
|
||||||
|
|
||||||
<module name="Checker">
|
|
||||||
<!--
|
|
||||||
If you set the basedir property below, then all reported file
|
|
||||||
names will be relative to the specified directory. See
|
|
||||||
http://checkstyle.sourceforge.net/5.x/config.html#Checker
|
|
||||||
|
|
||||||
<property name="basedir" value="${basedir}"/>
|
|
||||||
-->
|
|
||||||
|
|
||||||
<property name="severity" value="error"/>
|
|
||||||
|
|
||||||
<module name="SuppressionFilter">
|
|
||||||
<property name="file" value="${checkstyle.suppressions.file}"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="JavadocPackage">
|
|
||||||
<property name="allowLegacy" value="false"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="Translation">
|
|
||||||
<property name="severity" value="warning"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="FileTabCharacter">
|
|
||||||
<property name="eachLine" value="false"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="FileLength">
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NewlineAtEndOfFile">
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
<property name="lineSeparator" value="lf"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="RegexpHeader">
|
|
||||||
<property name="headerFile" value="${checkstyle.header.file}"/>
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
<property name="id" value="header"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="RegexpSingleline">
|
|
||||||
<property name="format" value="\s+$"/>
|
|
||||||
<property name="minimum" value="0"/>
|
|
||||||
<property name="maximum" value="0"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="TreeWalker">
|
|
||||||
<property name="tabWidth" value="4"/>
|
|
||||||
|
|
||||||
<module name="AvoidStarImport"/>
|
|
||||||
<module name="ConstantName"/>
|
|
||||||
<module name="EmptyBlock"/>
|
|
||||||
<module name="EmptyForIteratorPad"/>
|
|
||||||
<module name="EqualsHashCode"/>
|
|
||||||
<module name="OneStatementPerLine"/>
|
|
||||||
|
|
||||||
<!-- module name="IllegalCatch"/ -->
|
|
||||||
<!--module name="ImportControl">
|
|
||||||
<property name="file" value="${checkstyle.importcontrol.file}"/>
|
|
||||||
</module-->
|
|
||||||
<module name="IllegalImport"/>
|
|
||||||
<module name="IllegalInstantiation"/>
|
|
||||||
<module name="IllegalThrows"/>
|
|
||||||
<module name="InnerAssignment"/>
|
|
||||||
<module name="JavadocType">
|
|
||||||
<property name="authorFormat" value="\S"/>
|
|
||||||
</module>
|
|
||||||
<module name="JavadocMethod">
|
|
||||||
<property name="allowUndeclaredRTE" value="true"/>
|
|
||||||
<property name="allowThrowsTagsForSubclasses" value="true"/>
|
|
||||||
<property name="allowMissingPropertyJavadoc" value="true"/>
|
|
||||||
</module>
|
|
||||||
<module name="JavadocVariable"/>
|
|
||||||
<module name="JavadocStyle">
|
|
||||||
<property name="scope" value="public"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="LeftCurly">
|
|
||||||
<property name="option" value="eol"/>
|
|
||||||
<property name="tokens" value="CLASS_DEF"/>
|
|
||||||
<property name="tokens" value="CTOR_DEF"/>
|
|
||||||
<property name="tokens" value="INTERFACE_DEF"/>
|
|
||||||
<property name="tokens" value="METHOD_DEF"/>
|
|
||||||
<property name="tokens" value="LITERAL_CATCH"/>
|
|
||||||
<property name="tokens" value="LITERAL_DO"/>
|
|
||||||
<property name="tokens" value="LITERAL_ELSE"/>
|
|
||||||
<property name="tokens" value="LITERAL_FINALLY"/>
|
|
||||||
<property name="tokens" value="LITERAL_FOR"/>
|
|
||||||
<property name="tokens" value="LITERAL_IF"/>
|
|
||||||
<property name="tokens" value="LITERAL_SWITCH"/>
|
|
||||||
<property name="tokens" value="LITERAL_SYNCHRONIZED"/>
|
|
||||||
<property name="tokens" value="LITERAL_TRY"/>
|
|
||||||
<property name="tokens" value="LITERAL_WHILE"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="OuterTypeNumber"/>
|
|
||||||
<module name="LineLength">
|
|
||||||
<property name="ignorePattern" value="^ *\* *[^ ]+$"/>
|
|
||||||
<property name="max" value="150"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="MethodCount">
|
|
||||||
<property name="maxTotal" value="40"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="LocalFinalVariableName"/>
|
|
||||||
<module name="LocalVariableName"/>
|
|
||||||
<module name="MemberName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="MethodLength">
|
|
||||||
<property name="max" value="160"/>
|
|
||||||
<property name="countEmpty" value="false"/>
|
|
||||||
</module>
|
|
||||||
<module name="MethodName"/>
|
|
||||||
<module name="MethodParamPad"/>
|
|
||||||
<module name="ModifierOrder"/>
|
|
||||||
<module name="NeedBraces"/>
|
|
||||||
<module name="NoWhitespaceAfter">
|
|
||||||
<property name="tokens" value="ARRAY_INIT"/>
|
|
||||||
<property name="tokens" value="BNOT"/>
|
|
||||||
<property name="tokens" value="DEC"/>
|
|
||||||
<property name="tokens" value="DOT"/>
|
|
||||||
<property name="tokens" value="INC"/>
|
|
||||||
<property name="tokens" value="LNOT"/>
|
|
||||||
<property name="tokens" value="UNARY_MINUS"/>
|
|
||||||
<property name="tokens" value="UNARY_PLUS"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NoWhitespaceBefore"/>
|
|
||||||
<module name="NoWhitespaceBefore">
|
|
||||||
<property name="tokens" value="DOT"/>
|
|
||||||
<property name="allowLineBreaks" value="true"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="OperatorWrap"/>
|
|
||||||
<module name="OperatorWrap">
|
|
||||||
<property name="tokens" value="ASSIGN"/>
|
|
||||||
<property name="tokens" value="DIV_ASSIGN"/>
|
|
||||||
<property name="tokens" value="PLUS_ASSIGN"/>
|
|
||||||
<property name="tokens" value="MINUS_ASSIGN"/>
|
|
||||||
<property name="tokens" value="STAR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="MOD_ASSIGN"/>
|
|
||||||
<property name="tokens" value="SR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BSR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="SL_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BXOR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BOR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BAND_ASSIGN"/>
|
|
||||||
<property name="option" value="eol"/>
|
|
||||||
</module>
|
|
||||||
<module name="PackageName"/>
|
|
||||||
<module name="ParameterName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="ParameterNumber">
|
|
||||||
<property name="id" value="paramNum"/>
|
|
||||||
</module>
|
|
||||||
<module name="ParenPad"/>
|
|
||||||
<module name="TypecastParenPad"/>
|
|
||||||
<module name="RedundantImport"/>
|
|
||||||
<module name="RedundantModifier"/>
|
|
||||||
<module name="RightCurly">
|
|
||||||
<property name="option" value="same"/>
|
|
||||||
</module>
|
|
||||||
<module name="SimplifyBooleanExpression"/>
|
|
||||||
<module name="SimplifyBooleanReturn"/>
|
|
||||||
<module name="StaticVariableName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="TypeName"/>
|
|
||||||
<module name="UnusedImports"/>
|
|
||||||
<module name="UpperEll"/>
|
|
||||||
<module name="VisibilityModifier"/>
|
|
||||||
<module name="WhitespaceAfter"/>
|
|
||||||
<module name="WhitespaceAround"/>
|
|
||||||
<module name="GenericWhitespace"/>
|
|
||||||
<module name="FinalClass"/>
|
|
||||||
<module name="MissingSwitchDefault"/>
|
|
||||||
<!--module name="MagicNumber"/-->
|
|
||||||
<!--module name="Indentation">
|
|
||||||
<property name="basicOffset" value="4"/>
|
|
||||||
<property name="braceAdjustment" value="0"/>
|
|
||||||
<property name="caseIndent" value="0"/>
|
|
||||||
</module-->
|
|
||||||
<module name="ArrayTrailingComma"/>
|
|
||||||
<module name="FinalLocalVariable"/>
|
|
||||||
<module name="EqualsAvoidNull"/>
|
|
||||||
<module name="ParameterAssignment"/>
|
|
||||||
|
|
||||||
<!-- Generates quite a few errors -->
|
|
||||||
<module name="CyclomaticComplexity">
|
|
||||||
<property name="severity" value="ignore"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NestedForDepth">
|
|
||||||
<property name="max" value="2"/>
|
|
||||||
</module>
|
|
||||||
<module name="NestedIfDepth">
|
|
||||||
<property name="max" value="4"/>
|
|
||||||
</module>
|
|
||||||
<module name="NestedTryDepth">
|
|
||||||
<property name="max" value="2"/>
|
|
||||||
</module>
|
|
||||||
<!--module name="ExplicitInitialization"/-->
|
|
||||||
<module name="AnnotationUseStyle"/>
|
|
||||||
<module name="MissingDeprecated"/>
|
|
||||||
<module name="MissingOverride">
|
|
||||||
<property name="javaFiveCompatibility" value="true"/>
|
|
||||||
</module>
|
|
||||||
<module name="PackageAnnotation"/>
|
|
||||||
<module name="SuppressWarnings"/>
|
|
||||||
<module name="OuterTypeFilename"/>
|
|
||||||
<module name="HideUtilityClassConstructor"/>
|
|
||||||
</module>
|
|
||||||
</module>
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
<?xml version="1.0"?>
|
|
||||||
|
|
||||||
<!DOCTYPE suppressions PUBLIC
|
|
||||||
"-//Puppy Crawl//DTD Suppressions 1.0//EN"
|
|
||||||
"http://www.puppycrawl.com/dtds/suppressions_1_0.dtd">
|
|
||||||
|
|
||||||
<suppressions>
|
|
||||||
<suppress checks=".*" files=".*[\\/]package-info\.java" />
|
|
||||||
</suppressions>
|
|
||||||
@@ -15,20 +15,19 @@ limitations under the License.
|
|||||||
|
|
||||||
Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
|
Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
|
||||||
-->
|
-->
|
||||||
|
|
||||||
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
|
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
|
||||||
<modelVersion>4.0.0</modelVersion>
|
<modelVersion>4.0.0</modelVersion>
|
||||||
<parent>
|
<parent>
|
||||||
<groupId>org.owasp</groupId>
|
<groupId>org.owasp</groupId>
|
||||||
<artifactId>dependency-check-parent</artifactId>
|
<artifactId>dependency-check-parent</artifactId>
|
||||||
<version>1.1.0</version>
|
<version>1.2.11</version>
|
||||||
</parent>
|
</parent>
|
||||||
|
|
||||||
<artifactId>dependency-check-cli</artifactId>
|
<artifactId>dependency-check-cli</artifactId>
|
||||||
<packaging>jar</packaging>
|
<packaging>jar</packaging>
|
||||||
|
|
||||||
<name>Dependency-Check Command Line</name>
|
<name>Dependency-Check Command Line</name>
|
||||||
<description>Dependency-Check-Maven is a Maven Plugin that attempts to detect publicly disclosed vulnerabilities contained within project dependencies. It does this by determining if there is a Common Platform Enumeration (CPE) identifier for a given dependency. If found, it will generate a report linking to the associated CVE entries.</description>
|
<description>dependency-check-cli is an command line tool that uses dependency-check-core to detect publicly disclosed vulnerabilities associated with the scanned project dependencies. The tool will generate a report listing the dependency, any identified Common Platform Enumeration (CPE) identifiers, and the associated Common Vulnerability and Exposure (CVE) entries.</description>
|
||||||
<!-- begin copy from http://minds.coremedia.com/2012/09/11/problem-solved-deploy-multi-module-maven-project-site-as-github-pages/ -->
|
<!-- begin copy from http://minds.coremedia.com/2012/09/11/problem-solved-deploy-multi-module-maven-project-site-as-github-pages/ -->
|
||||||
<distributionManagement>
|
<distributionManagement>
|
||||||
<site>
|
<site>
|
||||||
@@ -61,24 +60,21 @@ Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-jar-plugin</artifactId>
|
<artifactId>maven-jar-plugin</artifactId>
|
||||||
<version>2.4</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<archive>
|
<archive>
|
||||||
<manifest>
|
<manifest>
|
||||||
<mainClass>org.owasp.dependencycheck.App</mainClass>
|
<mainClass>org.owasp.dependencycheck.App</mainClass>
|
||||||
<addDefaultImplementationEntries>true</addDefaultImplementationEntries>
|
|
||||||
</manifest>
|
</manifest>
|
||||||
</archive>
|
</archive>
|
||||||
<excludes>
|
|
||||||
<exclude>**/checkstyle*</exclude>
|
|
||||||
</excludes>
|
|
||||||
</configuration>
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
<artifactId>cobertura-maven-plugin</artifactId>
|
<artifactId>cobertura-maven-plugin</artifactId>
|
||||||
<version>2.5.2</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
|
<!--instrumentation>
|
||||||
|
<ignoreTrivial>true</ignoreTrivial>
|
||||||
|
</instrumentation-->
|
||||||
<check>
|
<check>
|
||||||
<branchRate>85</branchRate>
|
<branchRate>85</branchRate>
|
||||||
<lineRate>85</lineRate>
|
<lineRate>85</lineRate>
|
||||||
@@ -112,14 +108,8 @@ Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-surefire-plugin</artifactId>
|
<artifactId>maven-surefire-plugin</artifactId>
|
||||||
<version>2.16</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<systemProperties>
|
<systemProperties>
|
||||||
<property>
|
|
||||||
<name>net.sourceforge.cobertura.datafile</name>
|
|
||||||
<value>${project.build.directory}/cobertura/cobertura.ser</value>
|
|
||||||
<workingDirectory>target</workingDirectory>
|
|
||||||
</property>
|
|
||||||
<property>
|
<property>
|
||||||
<name>cpe</name>
|
<name>cpe</name>
|
||||||
<value>data/cpe</value>
|
<value>data/cpe</value>
|
||||||
@@ -136,156 +126,15 @@ Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-compiler-plugin</artifactId>
|
<artifactId>maven-compiler-plugin</artifactId>
|
||||||
<version>3.1</version>
|
|
||||||
<configuration>
|
|
||||||
<showDeprecation>false</showDeprecation>
|
|
||||||
<source>1.6</source>
|
|
||||||
<target>1.6</target>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-site-plugin</artifactId>
|
|
||||||
<version>3.3</version>
|
|
||||||
<dependencies>
|
|
||||||
<dependency>
|
|
||||||
<groupId>org.apache.maven.doxia</groupId>
|
|
||||||
<artifactId>doxia-module-markdown</artifactId>
|
|
||||||
<version>1.5</version>
|
|
||||||
</dependency>
|
|
||||||
</dependencies>
|
|
||||||
<configuration>
|
|
||||||
<skipDeploy>true</skipDeploy>
|
|
||||||
<reportPlugins>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-project-info-reports-plugin</artifactId>
|
|
||||||
<version>2.7</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>index</report>
|
|
||||||
<report>summary</report>
|
|
||||||
<report>license</report>
|
|
||||||
<report>help</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-javadoc-plugin</artifactId>
|
|
||||||
<version>2.9.1</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<id>default</id>
|
|
||||||
<reports>
|
|
||||||
<report>javadoc</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>versions-maven-plugin</artifactId>
|
|
||||||
<version>2.1</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>dependency-updates-report</report>
|
|
||||||
<report>plugin-updates-report</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-jxr-plugin</artifactId>
|
|
||||||
<version>2.4</version>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>cobertura-maven-plugin</artifactId>
|
|
||||||
<version>2.5.2</version>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-surefire-report-plugin</artifactId>
|
|
||||||
<version>2.16</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>report-only</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>taglist-maven-plugin</artifactId>
|
|
||||||
<version>2.4</version>
|
|
||||||
<configuration>
|
|
||||||
<tagListOptions>
|
|
||||||
<tagClasses>
|
|
||||||
<tagClass>
|
|
||||||
<displayName>Todo Work</displayName>
|
|
||||||
<tags>
|
|
||||||
<tag>
|
|
||||||
<matchString>todo</matchString>
|
|
||||||
<matchType>ignoreCase</matchType>
|
|
||||||
</tag>
|
|
||||||
<tag>
|
|
||||||
<matchString>FIXME</matchString>
|
|
||||||
<matchType>exact</matchType>
|
|
||||||
</tag>
|
|
||||||
</tags>
|
|
||||||
</tagClass>
|
|
||||||
</tagClasses>
|
|
||||||
</tagListOptions>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-checkstyle-plugin</artifactId>
|
|
||||||
<version>2.11</version>
|
|
||||||
<configuration>
|
|
||||||
<enableRulesSummary>false</enableRulesSummary>
|
|
||||||
<configLocation>${basedir}/config/checkstyle-checks.xml</configLocation>
|
|
||||||
<headerLocation>${basedir}/config/checkstyle-header.txt</headerLocation>
|
|
||||||
<suppressionsLocation>${basedir}/config/checkstyle-suppressions.xml</suppressionsLocation>
|
|
||||||
<suppressionsFileExpression>checkstyle.suppressions.file</suppressionsFileExpression>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-pmd-plugin</artifactId>
|
|
||||||
<version>3.0.1</version>
|
|
||||||
<configuration>
|
|
||||||
<targetJdk>1.6</targetJdk>
|
|
||||||
<linkXref>true</linkXref>
|
|
||||||
<sourceEncoding>utf-8</sourceEncoding>
|
|
||||||
<excludes>
|
|
||||||
<exclude>**/generated/*.java</exclude>
|
|
||||||
</excludes>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>findbugs-maven-plugin</artifactId>
|
|
||||||
<version>2.5.3</version>
|
|
||||||
</plugin>
|
|
||||||
</reportPlugins>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
</plugin>
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
<artifactId>appassembler-maven-plugin</artifactId>
|
<artifactId>appassembler-maven-plugin</artifactId>
|
||||||
<version>1.7</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<programs>
|
<programs>
|
||||||
<program>
|
<program>
|
||||||
<mainClass>org.owasp.dependencycheck.App</mainClass>
|
<mainClass>org.owasp.dependencycheck.App</mainClass>
|
||||||
<name>dependency-check</name>
|
<id>dependency-check</id>
|
||||||
</program>
|
</program>
|
||||||
</programs>
|
</programs>
|
||||||
<assembleDirectory>${project.build.directory}/release</assembleDirectory>
|
<assembleDirectory>${project.build.directory}/release</assembleDirectory>
|
||||||
@@ -326,6 +175,137 @@ Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
|
|||||||
</plugin>
|
</plugin>
|
||||||
</plugins>
|
</plugins>
|
||||||
</build>
|
</build>
|
||||||
|
<reporting>
|
||||||
|
<plugins>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-project-info-reports-plugin</artifactId>
|
||||||
|
<version>2.7</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>summary</report>
|
||||||
|
<report>license</report>
|
||||||
|
<report>help</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-javadoc-plugin</artifactId>
|
||||||
|
<version>2.9.1</version>
|
||||||
|
<configuration>
|
||||||
|
<failOnError>false</failOnError>
|
||||||
|
<bottom>Copyright© 2012-15 Jeremy Long. All Rights Reserved.</bottom>
|
||||||
|
</configuration>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<id>default</id>
|
||||||
|
<reports>
|
||||||
|
<report>javadoc</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>versions-maven-plugin</artifactId>
|
||||||
|
<version>2.1</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>dependency-updates-report</report>
|
||||||
|
<report>plugin-updates-report</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-jxr-plugin</artifactId>
|
||||||
|
<version>2.4</version>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>cobertura-maven-plugin</artifactId>
|
||||||
|
<version>2.6</version>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-surefire-report-plugin</artifactId>
|
||||||
|
<version>2.16</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>report-only</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>taglist-maven-plugin</artifactId>
|
||||||
|
<version>2.4</version>
|
||||||
|
<configuration>
|
||||||
|
<tagListOptions>
|
||||||
|
<tagClasses>
|
||||||
|
<tagClass>
|
||||||
|
<displayName>Todo Work</displayName>
|
||||||
|
<tags>
|
||||||
|
<tag>
|
||||||
|
<matchString>todo</matchString>
|
||||||
|
<matchType>ignoreCase</matchType>
|
||||||
|
</tag>
|
||||||
|
<tag>
|
||||||
|
<matchString>FIXME</matchString>
|
||||||
|
<matchType>exact</matchType>
|
||||||
|
</tag>
|
||||||
|
</tags>
|
||||||
|
</tagClass>
|
||||||
|
</tagClasses>
|
||||||
|
</tagListOptions>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-checkstyle-plugin</artifactId>
|
||||||
|
<version>2.11</version>
|
||||||
|
<configuration>
|
||||||
|
<enableRulesSummary>false</enableRulesSummary>
|
||||||
|
<enableFilesSummary>false</enableFilesSummary>
|
||||||
|
<configLocation>${basedir}/../src/main/config/checkstyle-checks.xml</configLocation>
|
||||||
|
<headerLocation>${basedir}/../src/main/config/checkstyle-header.txt</headerLocation>
|
||||||
|
<suppressionsLocation>${basedir}/../src/main/config/checkstyle-suppressions.xml</suppressionsLocation>
|
||||||
|
<suppressionsFileExpression>checkstyle.suppressions.file</suppressionsFileExpression>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-pmd-plugin</artifactId>
|
||||||
|
<version>3.1</version>
|
||||||
|
<configuration>
|
||||||
|
<targetJdk>1.6</targetJdk>
|
||||||
|
<linkXref>true</linkXref>
|
||||||
|
<sourceEncoding>utf-8</sourceEncoding>
|
||||||
|
<excludes>
|
||||||
|
<exclude>**/generated/*.java</exclude>
|
||||||
|
</excludes>
|
||||||
|
<rulesets>
|
||||||
|
<ruleset>../src/main/config/dcrules.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/basic.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/imports.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/unusedcode.xml</ruleset>
|
||||||
|
</rulesets>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>findbugs-maven-plugin</artifactId>
|
||||||
|
<version>2.5.3</version>
|
||||||
|
</plugin>
|
||||||
|
</plugins>
|
||||||
|
</reporting>
|
||||||
<dependencies>
|
<dependencies>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>commons-cli</groupId>
|
<groupId>commons-cli</groupId>
|
||||||
@@ -337,5 +317,10 @@ Copyright (c) 2012 - Jeremy Long. All Rights Reserved.
|
|||||||
<artifactId>dependency-check-core</artifactId>
|
<artifactId>dependency-check-core</artifactId>
|
||||||
<version>${project.parent.version}</version>
|
<version>${project.parent.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.owasp</groupId>
|
||||||
|
<artifactId>dependency-check-utils</artifactId>
|
||||||
|
<version>${project.parent.version}</version>
|
||||||
|
</dependency>
|
||||||
</dependencies>
|
</dependencies>
|
||||||
</project>
|
</project>
|
||||||
|
|||||||
@@ -2,10 +2,8 @@
|
|||||||
<assembly
|
<assembly
|
||||||
xmlns="http://maven.apache.org/plugins/maven-assembly-plugin/assembly/1.1.2"
|
xmlns="http://maven.apache.org/plugins/maven-assembly-plugin/assembly/1.1.2"
|
||||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
xsi:schemaLocation="
|
xsi:schemaLocation="http://maven.apache.org/plugins/maven-assembly-plugin/assembly/1.1.2
|
||||||
http://maven.apache.org/plugins/maven-assembly-plugin/assembly/1.1.2
|
http://maven.apache.org/xsd/assembly-1.1.2.xsd"
|
||||||
http://maven.apache.org/xsd/assembly-1.1.2.xsd
|
|
||||||
"
|
|
||||||
>
|
>
|
||||||
<id>release</id>
|
<id>release</id>
|
||||||
<formats>
|
<formats>
|
||||||
|
|||||||
@@ -21,15 +21,19 @@ import java.io.File;
|
|||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
import org.apache.commons.cli.ParseException;
|
import org.apache.commons.cli.ParseException;
|
||||||
import org.owasp.dependencycheck.cli.CliParser;
|
|
||||||
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.DatabaseException;
|
import org.owasp.dependencycheck.data.nvdcve.DatabaseException;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.DatabaseProperties;
|
import org.owasp.dependencycheck.data.nvdcve.DatabaseProperties;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.org.apache.tools.ant.DirectoryScanner;
|
||||||
import org.owasp.dependencycheck.reporting.ReportGenerator;
|
import org.owasp.dependencycheck.reporting.ReportGenerator;
|
||||||
import org.owasp.dependencycheck.utils.LogUtils;
|
import org.owasp.dependencycheck.utils.LogUtils;
|
||||||
import org.owasp.dependencycheck.utils.Settings;
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
@@ -37,7 +41,7 @@ import org.owasp.dependencycheck.utils.Settings;
|
|||||||
/**
|
/**
|
||||||
* The command line interface for the DependencyCheck application.
|
* The command line interface for the DependencyCheck application.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class App {
|
public class App {
|
||||||
|
|
||||||
@@ -46,14 +50,24 @@ public class App {
|
|||||||
*/
|
*/
|
||||||
private static final String LOG_PROPERTIES_FILE = "log.properties";
|
private static final String LOG_PROPERTIES_FILE = "log.properties";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(App.class.getName());
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The main method for the application.
|
* The main method for the application.
|
||||||
*
|
*
|
||||||
* @param args the command line arguments
|
* @param args the command line arguments
|
||||||
*/
|
*/
|
||||||
public static void main(String[] args) {
|
public static void main(String[] args) {
|
||||||
final App app = new App();
|
try {
|
||||||
app.run(args);
|
Settings.initialize();
|
||||||
|
final App app = new App();
|
||||||
|
app.run(args);
|
||||||
|
} finally {
|
||||||
|
Settings.cleanup(true);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -62,8 +76,8 @@ public class App {
|
|||||||
* @param args the command line arguments
|
* @param args the command line arguments
|
||||||
*/
|
*/
|
||||||
public void run(String[] args) {
|
public void run(String[] args) {
|
||||||
|
|
||||||
final CliParser cli = new CliParser();
|
final CliParser cli = new CliParser();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
cli.parse(args);
|
cli.parse(args);
|
||||||
} catch (FileNotFoundException ex) {
|
} catch (FileNotFoundException ex) {
|
||||||
@@ -81,9 +95,16 @@ public class App {
|
|||||||
|
|
||||||
if (cli.isGetVersion()) {
|
if (cli.isGetVersion()) {
|
||||||
cli.printVersionInfo();
|
cli.printVersionInfo();
|
||||||
|
} else if (cli.isUpdateOnly()) {
|
||||||
|
populateSettings(cli);
|
||||||
|
runUpdateOnly();
|
||||||
} else if (cli.isRunScan()) {
|
} else if (cli.isRunScan()) {
|
||||||
updateSettings(cli);
|
populateSettings(cli);
|
||||||
runScan(cli.getReportDirectory(), cli.getReportFormat(), cli.getApplicationName(), cli.getScanFiles());
|
try {
|
||||||
|
runScan(cli.getReportDirectory(), cli.getReportFormat(), cli.getApplicationName(), cli.getScanFiles(), cli.getExcludeList());
|
||||||
|
} catch (InvalidScanPathException ex) {
|
||||||
|
LOGGER.log(Level.SEVERE, "An invalid scan path was detected; unable to scan '//*' paths");
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
cli.printHelp();
|
cli.printHelp();
|
||||||
}
|
}
|
||||||
@@ -96,58 +117,146 @@ public class App {
|
|||||||
* @param outputFormat the output format of the report
|
* @param outputFormat the output format of the report
|
||||||
* @param applicationName the application name for the report
|
* @param applicationName the application name for the report
|
||||||
* @param files the files/directories to scan
|
* @param files the files/directories to scan
|
||||||
|
* @param excludes the patterns for files/directories to exclude
|
||||||
|
*
|
||||||
|
* @throws InvalidScanPathException thrown if the path to scan starts with "//"
|
||||||
*/
|
*/
|
||||||
private void runScan(String reportDirectory, String outputFormat, String applicationName, String[] files) {
|
private void runScan(String reportDirectory, String outputFormat, String applicationName, String[] files,
|
||||||
final Engine scanner = new Engine();
|
String[] excludes) throws InvalidScanPathException {
|
||||||
|
Engine engine = null;
|
||||||
for (String file : files) {
|
|
||||||
scanner.scan(file);
|
|
||||||
}
|
|
||||||
|
|
||||||
scanner.analyzeDependencies();
|
|
||||||
final List<Dependency> dependencies = scanner.getDependencies();
|
|
||||||
DatabaseProperties prop = null;
|
|
||||||
CveDB cve = null;
|
|
||||||
try {
|
try {
|
||||||
cve = new CveDB();
|
engine = new Engine();
|
||||||
cve.open();
|
List<String> antStylePaths = new ArrayList<String>();
|
||||||
prop = cve.getDatabaseProperties();
|
if (excludes == null || excludes.length == 0) {
|
||||||
|
for (String file : files) {
|
||||||
|
if (file.contains("*") || file.contains("?")) {
|
||||||
|
antStylePaths.add(file);
|
||||||
|
} else {
|
||||||
|
engine.scan(file);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
antStylePaths = Arrays.asList(files);
|
||||||
|
}
|
||||||
|
|
||||||
|
final Set<File> paths = new HashSet<File>();
|
||||||
|
for (String file : antStylePaths) {
|
||||||
|
final DirectoryScanner scanner = new DirectoryScanner();
|
||||||
|
String include = file.replace('\\', '/');
|
||||||
|
File baseDir;
|
||||||
|
|
||||||
|
if (include.startsWith("//")) {
|
||||||
|
throw new InvalidScanPathException("Unable to scan paths specified by //");
|
||||||
|
} else if (include.startsWith("./")) {
|
||||||
|
baseDir = new File(".");
|
||||||
|
include = include.substring(2);
|
||||||
|
} else if (include.startsWith("/")) {
|
||||||
|
baseDir = new File("/");
|
||||||
|
include = include.substring(1);
|
||||||
|
} else if (include.contains("/")) {
|
||||||
|
final int pos = include.indexOf('/');
|
||||||
|
final String tmp = include.substring(0, pos);
|
||||||
|
if (tmp.contains("*") || tmp.contains("?")) {
|
||||||
|
baseDir = new File(".");
|
||||||
|
} else {
|
||||||
|
baseDir = new File(tmp);
|
||||||
|
include = include.substring(pos + 1);
|
||||||
|
}
|
||||||
|
} else { //no path info - must just be a file in the working directory
|
||||||
|
baseDir = new File(".");
|
||||||
|
}
|
||||||
|
scanner.setBasedir(baseDir);
|
||||||
|
scanner.setIncludes(include);
|
||||||
|
if (excludes != null && excludes.length > 0) {
|
||||||
|
scanner.addExcludes(excludes);
|
||||||
|
}
|
||||||
|
scanner.scan();
|
||||||
|
if (scanner.getIncludedFilesCount() > 0) {
|
||||||
|
for (String s : scanner.getIncludedFiles()) {
|
||||||
|
final File f = new File(baseDir, s);
|
||||||
|
paths.add(f);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
engine.scan(paths);
|
||||||
|
|
||||||
|
engine.analyzeDependencies();
|
||||||
|
final List<Dependency> dependencies = engine.getDependencies();
|
||||||
|
DatabaseProperties prop = null;
|
||||||
|
CveDB cve = null;
|
||||||
|
try {
|
||||||
|
cve = new CveDB();
|
||||||
|
cve.open();
|
||||||
|
prop = cve.getDatabaseProperties();
|
||||||
|
} catch (DatabaseException ex) {
|
||||||
|
LOGGER.log(Level.FINE, "Unable to retrieve DB Properties", ex);
|
||||||
|
} finally {
|
||||||
|
if (cve != null) {
|
||||||
|
cve.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
final ReportGenerator report = new ReportGenerator(applicationName, dependencies, engine.getAnalyzers(), prop);
|
||||||
|
try {
|
||||||
|
report.generateReports(reportDirectory, outputFormat);
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.SEVERE, "There was an IO error while attempting to generate the report.");
|
||||||
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
|
} catch (Throwable ex) {
|
||||||
|
LOGGER.log(Level.SEVERE, "There was an error while attempting to generate the report.");
|
||||||
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
|
}
|
||||||
} catch (DatabaseException ex) {
|
} catch (DatabaseException ex) {
|
||||||
Logger.getLogger(App.class.getName()).log(Level.FINE, "Unable to retrieve DB Properties", ex);
|
LOGGER.log(Level.SEVERE, "Unable to connect to the dependency-check database; analysis has stopped");
|
||||||
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
} finally {
|
} finally {
|
||||||
if (cve != null) {
|
if (engine != null) {
|
||||||
cve.close();
|
engine.cleanup();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
final ReportGenerator report = new ReportGenerator(applicationName, dependencies, scanner.getAnalyzers(), prop);
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Only executes the update phase of dependency-check.
|
||||||
|
*/
|
||||||
|
private void runUpdateOnly() {
|
||||||
|
Engine engine = null;
|
||||||
try {
|
try {
|
||||||
report.generateReports(reportDirectory, outputFormat);
|
engine = new Engine();
|
||||||
} catch (IOException ex) {
|
engine.doUpdates();
|
||||||
Logger.getLogger(App.class.getName()).log(Level.SEVERE, "There was an IO error while attempting to generate the report.");
|
} catch (DatabaseException ex) {
|
||||||
Logger.getLogger(App.class.getName()).log(Level.INFO, null, ex);
|
LOGGER.log(Level.SEVERE, "Unable to connect to the dependency-check database; analysis has stopped");
|
||||||
} catch (Exception ex) {
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
Logger.getLogger(App.class.getName()).log(Level.SEVERE, "There was an error while attempting to generate the report.");
|
} finally {
|
||||||
Logger.getLogger(App.class.getName()).log(Level.INFO, null, ex);
|
if (engine != null) {
|
||||||
|
engine.cleanup();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Updates the global Settings.
|
* Updates the global Settings.
|
||||||
*
|
*
|
||||||
* @param cli a reference to the CLI Parser that contains the command line arguments used to set the corresponding
|
* @param cli a reference to the CLI Parser that contains the command line arguments used to set the corresponding settings in
|
||||||
* settings in the core engine.
|
* the core engine.
|
||||||
*/
|
*/
|
||||||
private void updateSettings(CliParser cli) {
|
private void populateSettings(CliParser cli) {
|
||||||
|
|
||||||
final boolean autoUpdate = cli.isAutoUpdate();
|
final boolean autoUpdate = cli.isAutoUpdate();
|
||||||
final String connectionTimeout = cli.getConnectionTimeout();
|
final String connectionTimeout = cli.getConnectionTimeout();
|
||||||
final String proxyUrl = cli.getProxyUrl();
|
final String proxyServer = cli.getProxyServer();
|
||||||
final String proxyPort = cli.getProxyPort();
|
final String proxyPort = cli.getProxyPort();
|
||||||
final String proxyUser = cli.getProxyUsername();
|
final String proxyUser = cli.getProxyUsername();
|
||||||
final String proxyPass = cli.getProxyPassword();
|
final String proxyPass = cli.getProxyPassword();
|
||||||
final String dataDirectory = cli.getDataDirectory();
|
final String dataDirectory = cli.getDataDirectory();
|
||||||
final File propertiesFile = cli.getPropertiesFile();
|
final File propertiesFile = cli.getPropertiesFile();
|
||||||
final String suppressionFile = cli.getSuppressionFile();
|
final String suppressionFile = cli.getSuppressionFile();
|
||||||
|
final boolean jarDisabled = cli.isJarDisabled();
|
||||||
|
final boolean archiveDisabled = cli.isArchiveDisabled();
|
||||||
|
final boolean pyDistDisabled = cli.isPythonDistributionDisabled();
|
||||||
|
final boolean pyPkgDisabled = cli.isPythonPackageDisabled();
|
||||||
|
final boolean assemblyDisabled = cli.isAssemblyDisabled();
|
||||||
|
final boolean nuspecDisabled = cli.isNuspecDisabled();
|
||||||
|
final boolean centralDisabled = cli.isCentralDisabled();
|
||||||
final boolean nexusDisabled = cli.isNexusDisabled();
|
final boolean nexusDisabled = cli.isNexusDisabled();
|
||||||
final String nexusUrl = cli.getNexusUrl();
|
final String nexusUrl = cli.getNexusUrl();
|
||||||
final String databaseDriverName = cli.getDatabaseDriverName();
|
final String databaseDriverName = cli.getDatabaseDriverName();
|
||||||
@@ -155,20 +264,26 @@ public class App {
|
|||||||
final String connectionString = cli.getConnectionString();
|
final String connectionString = cli.getConnectionString();
|
||||||
final String databaseUser = cli.getDatabaseUser();
|
final String databaseUser = cli.getDatabaseUser();
|
||||||
final String databasePassword = cli.getDatabasePassword();
|
final String databasePassword = cli.getDatabasePassword();
|
||||||
|
final String additionalZipExtensions = cli.getAdditionalZipExtensions();
|
||||||
|
final String pathToMono = cli.getPathToMono();
|
||||||
|
|
||||||
if (propertiesFile != null) {
|
if (propertiesFile != null) {
|
||||||
try {
|
try {
|
||||||
Settings.mergeProperties(propertiesFile);
|
Settings.mergeProperties(propertiesFile);
|
||||||
} catch (FileNotFoundException ex) {
|
} catch (FileNotFoundException ex) {
|
||||||
final String msg = String.format("Unable to load properties file '%s'", propertiesFile.getPath());
|
final String msg = String.format("Unable to load properties file '%s'", propertiesFile.getPath());
|
||||||
Logger.getLogger(App.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(App.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
final String msg = String.format("Unable to find properties file '%s'", propertiesFile.getPath());
|
final String msg = String.format("Unable to find properties file '%s'", propertiesFile.getPath());
|
||||||
Logger.getLogger(App.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(App.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
// We have to wait until we've merged the properties before attempting to set whether we use
|
||||||
|
// the proxy for Nexus since it could be disabled in the properties, but not explicitly stated
|
||||||
|
// on the command line
|
||||||
|
final boolean nexusUsesProxy = cli.isNexusUsesProxy();
|
||||||
if (dataDirectory != null) {
|
if (dataDirectory != null) {
|
||||||
Settings.setString(Settings.KEYS.DATA_DIRECTORY, dataDirectory);
|
Settings.setString(Settings.KEYS.DATA_DIRECTORY, dataDirectory);
|
||||||
} else if (System.getProperty("basedir") != null) {
|
} else if (System.getProperty("basedir") != null) {
|
||||||
@@ -182,8 +297,8 @@ public class App {
|
|||||||
Settings.setString(Settings.KEYS.DATA_DIRECTORY, dataDir.getAbsolutePath());
|
Settings.setString(Settings.KEYS.DATA_DIRECTORY, dataDir.getAbsolutePath());
|
||||||
}
|
}
|
||||||
Settings.setBoolean(Settings.KEYS.AUTO_UPDATE, autoUpdate);
|
Settings.setBoolean(Settings.KEYS.AUTO_UPDATE, autoUpdate);
|
||||||
if (proxyUrl != null && !proxyUrl.isEmpty()) {
|
if (proxyServer != null && !proxyServer.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.PROXY_URL, proxyUrl);
|
Settings.setString(Settings.KEYS.PROXY_SERVER, proxyServer);
|
||||||
}
|
}
|
||||||
if (proxyPort != null && !proxyPort.isEmpty()) {
|
if (proxyPort != null && !proxyPort.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.PROXY_PORT, proxyPort);
|
Settings.setString(Settings.KEYS.PROXY_PORT, proxyPort);
|
||||||
@@ -200,11 +315,21 @@ public class App {
|
|||||||
if (suppressionFile != null && !suppressionFile.isEmpty()) {
|
if (suppressionFile != null && !suppressionFile.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.SUPPRESSION_FILE, suppressionFile);
|
Settings.setString(Settings.KEYS.SUPPRESSION_FILE, suppressionFile);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//File Type Analyzer Settings
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_JAR_ENABLED, !jarDisabled);
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_ARCHIVE_ENABLED, !archiveDisabled);
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_PYTHON_DISTRIBUTION_ENABLED, !pyDistDisabled);
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_PYTHON_PACKAGE_ENABLED, !pyPkgDisabled);
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_NUSPEC_ENABLED, !nuspecDisabled);
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_ASSEMBLY_ENABLED, !assemblyDisabled);
|
||||||
|
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_CENTRAL_ENABLED, !centralDisabled);
|
||||||
Settings.setBoolean(Settings.KEYS.ANALYZER_NEXUS_ENABLED, !nexusDisabled);
|
Settings.setBoolean(Settings.KEYS.ANALYZER_NEXUS_ENABLED, !nexusDisabled);
|
||||||
if (nexusUrl != null && !nexusUrl.isEmpty()) {
|
if (nexusUrl != null && !nexusUrl.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.ANALYZER_NEXUS_URL, nexusUrl);
|
Settings.setString(Settings.KEYS.ANALYZER_NEXUS_URL, nexusUrl);
|
||||||
}
|
}
|
||||||
|
Settings.setBoolean(Settings.KEYS.ANALYZER_NEXUS_PROXY, nexusUsesProxy);
|
||||||
if (databaseDriverName != null && !databaseDriverName.isEmpty()) {
|
if (databaseDriverName != null && !databaseDriverName.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.DB_DRIVER_NAME, databaseDriverName);
|
Settings.setString(Settings.KEYS.DB_DRIVER_NAME, databaseDriverName);
|
||||||
}
|
}
|
||||||
@@ -220,5 +345,11 @@ public class App {
|
|||||||
if (databasePassword != null && !databasePassword.isEmpty()) {
|
if (databasePassword != null && !databasePassword.isEmpty()) {
|
||||||
Settings.setString(Settings.KEYS.DB_PASSWORD, databasePassword);
|
Settings.setString(Settings.KEYS.DB_PASSWORD, databasePassword);
|
||||||
}
|
}
|
||||||
|
if (additionalZipExtensions != null && !additionalZipExtensions.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.ADDITIONAL_ZIP_EXTENSIONS, additionalZipExtensions);
|
||||||
|
}
|
||||||
|
if (pathToMono != null && !pathToMono.isEmpty()) {
|
||||||
|
Settings.setString(Settings.KEYS.ANALYZER_ASSEMBLY_MONO_PATH, pathToMono);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,10 +15,12 @@
|
|||||||
*
|
*
|
||||||
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.cli;
|
package org.owasp.dependencycheck;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
|
||||||
import org.apache.commons.cli.CommandLine;
|
import org.apache.commons.cli.CommandLine;
|
||||||
import org.apache.commons.cli.CommandLineParser;
|
import org.apache.commons.cli.CommandLineParser;
|
||||||
import org.apache.commons.cli.HelpFormatter;
|
import org.apache.commons.cli.HelpFormatter;
|
||||||
@@ -29,15 +31,20 @@ import org.apache.commons.cli.Options;
|
|||||||
import org.apache.commons.cli.ParseException;
|
import org.apache.commons.cli.ParseException;
|
||||||
import org.apache.commons.cli.PosixParser;
|
import org.apache.commons.cli.PosixParser;
|
||||||
import org.owasp.dependencycheck.reporting.ReportGenerator.Format;
|
import org.owasp.dependencycheck.reporting.ReportGenerator.Format;
|
||||||
|
import org.owasp.dependencycheck.utils.InvalidSettingException;
|
||||||
import org.owasp.dependencycheck.utils.Settings;
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A utility to parse command line arguments for the DependencyCheck.
|
* A utility to parse command line arguments for the DependencyCheck.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class CliParser {
|
public final class CliParser {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(CliParser.class.getName());
|
||||||
/**
|
/**
|
||||||
* The command line.
|
* The command line.
|
||||||
*/
|
*/
|
||||||
@@ -78,19 +85,22 @@ public final class CliParser {
|
|||||||
/**
|
/**
|
||||||
* Validates that the command line arguments are valid.
|
* Validates that the command line arguments are valid.
|
||||||
*
|
*
|
||||||
* @throws FileNotFoundException if there is a file specified by either the SCAN or CPE command line arguments that
|
* @throws FileNotFoundException if there is a file specified by either the SCAN or CPE command line arguments that does not
|
||||||
* does not exist.
|
* exist.
|
||||||
* @throws ParseException is thrown if there is an exception parsing the command line.
|
* @throws ParseException is thrown if there is an exception parsing the command line.
|
||||||
*/
|
*/
|
||||||
private void validateArgs() throws FileNotFoundException, ParseException {
|
private void validateArgs() throws FileNotFoundException, ParseException {
|
||||||
if (isRunScan()) {
|
if (isRunScan()) {
|
||||||
validatePathExists(getScanFiles(), "scan");
|
validatePathExists(getScanFiles(), ARGUMENT.SCAN);
|
||||||
validatePathExists(getReportDirectory(), "out");
|
validatePathExists(getReportDirectory(), ARGUMENT.OUT);
|
||||||
if (!line.hasOption(ArgumentName.APP_NAME)) {
|
if (getPathToMono() != null) {
|
||||||
|
validatePathExists(getPathToMono(), ARGUMENT.PATH_TO_MONO);
|
||||||
|
}
|
||||||
|
if (!line.hasOption(ARGUMENT.APP_NAME)) {
|
||||||
throw new ParseException("Missing 'app' argument; the scan cannot be run without the an application name.");
|
throw new ParseException("Missing 'app' argument; the scan cannot be run without the an application name.");
|
||||||
}
|
}
|
||||||
if (line.hasOption(ArgumentName.OUTPUT_FORMAT)) {
|
if (line.hasOption(ARGUMENT.OUTPUT_FORMAT)) {
|
||||||
final String format = line.getOptionValue(ArgumentName.OUTPUT_FORMAT);
|
final String format = line.getOptionValue(ARGUMENT.OUTPUT_FORMAT);
|
||||||
try {
|
try {
|
||||||
Format.valueOf(format);
|
Format.valueOf(format);
|
||||||
} catch (IllegalArgumentException ex) {
|
} catch (IllegalArgumentException ex) {
|
||||||
@@ -103,8 +113,8 @@ public final class CliParser {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Validates whether or not the path(s) points at a file that exists; if the path(s) does not point to an existing
|
* Validates whether or not the path(s) points at a file that exists; if the path(s) does not point to an existing file a
|
||||||
* file a FileNotFoundException is thrown.
|
* FileNotFoundException is thrown.
|
||||||
*
|
*
|
||||||
* @param paths the paths to validate if they exists
|
* @param paths the paths to validate if they exists
|
||||||
* @param optType the option being validated (e.g. scan, out, etc.)
|
* @param optType the option being validated (e.g. scan, out, etc.)
|
||||||
@@ -121,14 +131,38 @@ public final class CliParser {
|
|||||||
* FileNotFoundException is thrown.
|
* FileNotFoundException is thrown.
|
||||||
*
|
*
|
||||||
* @param path the paths to validate if they exists
|
* @param path the paths to validate if they exists
|
||||||
* @param optType the option being validated (e.g. scan, out, etc.)
|
* @param argumentName the argument being validated (e.g. scan, out, etc.)
|
||||||
* @throws FileNotFoundException is thrown if the path being validated does not exist.
|
* @throws FileNotFoundException is thrown if the path being validated does not exist.
|
||||||
*/
|
*/
|
||||||
private void validatePathExists(String path, String optType) throws FileNotFoundException {
|
private void validatePathExists(String path, String argumentName) throws FileNotFoundException {
|
||||||
final File f = new File(path);
|
if (path == null) {
|
||||||
if (!f.exists()) {
|
|
||||||
isValid = false;
|
isValid = false;
|
||||||
final String msg = String.format("Invalid '%s' argument: '%s'", optType, path);
|
final String msg = String.format("Invalid '%s' argument: null", argumentName);
|
||||||
|
throw new FileNotFoundException(msg);
|
||||||
|
} else if (!path.contains("*") && !path.contains("?")) {
|
||||||
|
File f = new File(path);
|
||||||
|
if ("o".equalsIgnoreCase(argumentName.substring(0, 1)) && !"ALL".equalsIgnoreCase(this.getReportFormat())) {
|
||||||
|
final String checkPath = path.toLowerCase();
|
||||||
|
if (checkPath.endsWith(".html") || checkPath.endsWith(".xml") || checkPath.endsWith(".htm")) {
|
||||||
|
if (f.getParentFile() == null) {
|
||||||
|
f = new File(".", path);
|
||||||
|
}
|
||||||
|
if (!f.getParentFile().isDirectory()) {
|
||||||
|
isValid = false;
|
||||||
|
final String msg = String.format("Invalid '%s' argument: '%s'", argumentName, path);
|
||||||
|
throw new FileNotFoundException(msg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (!f.exists()) {
|
||||||
|
isValid = false;
|
||||||
|
final String msg = String.format("Invalid '%s' argument: '%s'", argumentName, path);
|
||||||
|
throw new FileNotFoundException(msg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else if (path.startsWith("//") || path.startsWith("\\\\")) {
|
||||||
|
isValid = false;
|
||||||
|
final String msg = String.format("Invalid '%s' argument: '%s'%nUnable to scan paths that start with '//'.", argumentName, path);
|
||||||
throw new FileNotFoundException(msg);
|
throw new FileNotFoundException(msg);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -140,11 +174,10 @@ public final class CliParser {
|
|||||||
*/
|
*/
|
||||||
@SuppressWarnings("static-access")
|
@SuppressWarnings("static-access")
|
||||||
private Options createCommandLineOptions() {
|
private Options createCommandLineOptions() {
|
||||||
|
|
||||||
final Options options = new Options();
|
final Options options = new Options();
|
||||||
addStandardOptions(options);
|
addStandardOptions(options);
|
||||||
addAdvancedOptions(options);
|
addAdvancedOptions(options);
|
||||||
|
addDeprecatedOptions(options);
|
||||||
return options;
|
return options;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -156,59 +189,62 @@ public final class CliParser {
|
|||||||
*/
|
*/
|
||||||
@SuppressWarnings("static-access")
|
@SuppressWarnings("static-access")
|
||||||
private void addStandardOptions(final Options options) throws IllegalArgumentException {
|
private void addStandardOptions(final Options options) throws IllegalArgumentException {
|
||||||
final Option help = new Option(ArgumentName.HELP_SHORT, ArgumentName.HELP, false,
|
final Option help = new Option(ARGUMENT.HELP_SHORT, ARGUMENT.HELP, false,
|
||||||
"Print this message.");
|
"Print this message.");
|
||||||
|
|
||||||
final Option advancedHelp = OptionBuilder.withLongOpt(ArgumentName.ADVANCED_HELP)
|
final Option advancedHelp = OptionBuilder.withLongOpt(ARGUMENT.ADVANCED_HELP)
|
||||||
.withDescription("Print the advanced help message.").create();
|
.withDescription("Print the advanced help message.").create();
|
||||||
|
|
||||||
final Option version = new Option(ArgumentName.VERSION_SHORT, ArgumentName.VERSION,
|
final Option version = new Option(ARGUMENT.VERSION_SHORT, ARGUMENT.VERSION,
|
||||||
false, "Print the version information.");
|
false, "Print the version information.");
|
||||||
|
|
||||||
final Option noUpdate = new Option(ArgumentName.DISABLE_AUTO_UPDATE_SHORT, ArgumentName.DISABLE_AUTO_UPDATE,
|
final Option noUpdate = new Option(ARGUMENT.DISABLE_AUTO_UPDATE_SHORT, ARGUMENT.DISABLE_AUTO_UPDATE,
|
||||||
false, "Disables the automatic updating of the CPE data.");
|
false, "Disables the automatic updating of the CPE data.");
|
||||||
|
|
||||||
final Option appName = OptionBuilder.withArgName("name").hasArg().withLongOpt(ArgumentName.APP_NAME)
|
final Option appName = OptionBuilder.withArgName("name").hasArg().withLongOpt(ARGUMENT.APP_NAME)
|
||||||
.withDescription("The name of the application being scanned. This is a required argument.")
|
.withDescription("The name of the application being scanned. This is a required argument.")
|
||||||
.create(ArgumentName.APP_NAME_SHORT);
|
.create(ARGUMENT.APP_NAME_SHORT);
|
||||||
|
|
||||||
final Option path = OptionBuilder.withArgName("path").hasArg().withLongOpt(ArgumentName.SCAN)
|
final Option path = OptionBuilder.withArgName("path").hasArg().withLongOpt(ARGUMENT.SCAN)
|
||||||
.withDescription("The path to scan - this option can be specified multiple times.")
|
.withDescription("The path to scan - this option can be specified multiple times. Ant style"
|
||||||
.create(ArgumentName.SCAN_SHORT);
|
+ " paths are supported (e.g. path/**/*.jar).")
|
||||||
|
.create(ARGUMENT.SCAN_SHORT);
|
||||||
|
|
||||||
final Option props = OptionBuilder.withArgName("file").hasArg().withLongOpt(ArgumentName.PROP)
|
final Option excludes = OptionBuilder.withArgName("pattern").hasArg().withLongOpt(ARGUMENT.EXCLUDE)
|
||||||
|
.withDescription("Specify and exclusion pattern. This option can be specified multiple times"
|
||||||
|
+ " and it accepts Ant style excludsions.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option props = OptionBuilder.withArgName("file").hasArg().withLongOpt(ARGUMENT.PROP)
|
||||||
.withDescription("A property file to load.")
|
.withDescription("A property file to load.")
|
||||||
.create(ArgumentName.PROP_SHORT);
|
.create(ARGUMENT.PROP_SHORT);
|
||||||
|
|
||||||
final Option out = OptionBuilder.withArgName("folder").hasArg().withLongOpt(ArgumentName.OUT)
|
final Option out = OptionBuilder.withArgName("path").hasArg().withLongOpt(ARGUMENT.OUT)
|
||||||
.withDescription("The folder to write reports to. This defaults to the current directory.")
|
.withDescription("The folder to write reports to. This defaults to the current directory. "
|
||||||
.create(ArgumentName.OUT_SHORT);
|
+ "It is possible to set this to a specific file name if the format argument is not set to ALL.")
|
||||||
|
.create(ARGUMENT.OUT_SHORT);
|
||||||
|
|
||||||
final Option outputFormat = OptionBuilder.withArgName("format").hasArg().withLongOpt(ArgumentName.OUTPUT_FORMAT)
|
final Option outputFormat = OptionBuilder.withArgName("format").hasArg().withLongOpt(ARGUMENT.OUTPUT_FORMAT)
|
||||||
.withDescription("The output format to write to (XML, HTML, VULN, ALL). The default is HTML.")
|
.withDescription("The output format to write to (XML, HTML, VULN, ALL). The default is HTML.")
|
||||||
.create(ArgumentName.OUTPUT_FORMAT_SHORT);
|
.create(ARGUMENT.OUTPUT_FORMAT_SHORT);
|
||||||
|
|
||||||
final Option verboseLog = OptionBuilder.withArgName("file").hasArg().withLongOpt(ArgumentName.VERBOSE_LOG)
|
final Option verboseLog = OptionBuilder.withArgName("file").hasArg().withLongOpt(ARGUMENT.VERBOSE_LOG)
|
||||||
.withDescription("The file path to write verbose logging information.")
|
.withDescription("The file path to write verbose logging information.")
|
||||||
.create(ArgumentName.VERBOSE_LOG_SHORT);
|
.create(ARGUMENT.VERBOSE_LOG_SHORT);
|
||||||
|
|
||||||
final Option suppressionFile = OptionBuilder.withArgName("file").hasArg().withLongOpt(ArgumentName.SUPPRESION_FILE)
|
final Option suppressionFile = OptionBuilder.withArgName("file").hasArg().withLongOpt(ARGUMENT.SUPPRESSION_FILE)
|
||||||
.withDescription("The file path to the suppression XML file.")
|
.withDescription("The file path to the suppression XML file.")
|
||||||
.create();
|
.create();
|
||||||
|
|
||||||
final Option disableNexusAnalyzer = OptionBuilder.withLongOpt(ArgumentName.DISABLE_NEXUS)
|
|
||||||
.withDescription("Disable the Nexus Analyzer.")
|
|
||||||
.create();
|
|
||||||
|
|
||||||
final Option nexusUrl = OptionBuilder.withArgName("url").hasArg().withLongOpt(ArgumentName.NEXUS_URL)
|
|
||||||
.withDescription("The url to the Nexus Server.")
|
|
||||||
.create();
|
|
||||||
|
|
||||||
//This is an option group because it can be specified more then once.
|
//This is an option group because it can be specified more then once.
|
||||||
final OptionGroup og = new OptionGroup();
|
final OptionGroup og = new OptionGroup();
|
||||||
og.addOption(path);
|
og.addOption(path);
|
||||||
|
|
||||||
|
final OptionGroup exog = new OptionGroup();
|
||||||
|
exog.addOption(excludes);
|
||||||
|
|
||||||
options.addOptionGroup(og)
|
options.addOptionGroup(og)
|
||||||
|
.addOptionGroup(exog)
|
||||||
.addOption(out)
|
.addOption(out)
|
||||||
.addOption(outputFormat)
|
.addOption(outputFormat)
|
||||||
.addOption(appName)
|
.addOption(appName)
|
||||||
@@ -218,14 +254,12 @@ public final class CliParser {
|
|||||||
.addOption(noUpdate)
|
.addOption(noUpdate)
|
||||||
.addOption(props)
|
.addOption(props)
|
||||||
.addOption(verboseLog)
|
.addOption(verboseLog)
|
||||||
.addOption(suppressionFile)
|
.addOption(suppressionFile);
|
||||||
.addOption(disableNexusAnalyzer)
|
|
||||||
.addOption(nexusUrl);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Adds the advanced command line options to the given options collection. These are split out for purposes of being
|
* Adds the advanced command line options to the given options collection. These are split out for purposes of being able to
|
||||||
* able to display two different help messages.
|
* display two different help messages.
|
||||||
*
|
*
|
||||||
* @param options a collection of command line arguments
|
* @param options a collection of command line arguments
|
||||||
* @throws IllegalArgumentException thrown if there is an exception
|
* @throws IllegalArgumentException thrown if there is an exception
|
||||||
@@ -233,48 +267,104 @@ public final class CliParser {
|
|||||||
@SuppressWarnings("static-access")
|
@SuppressWarnings("static-access")
|
||||||
private void addAdvancedOptions(final Options options) throws IllegalArgumentException {
|
private void addAdvancedOptions(final Options options) throws IllegalArgumentException {
|
||||||
|
|
||||||
final Option data = OptionBuilder.withArgName("path").hasArg().withLongOpt(ArgumentName.DATA_DIRECTORY)
|
final Option updateOnly = OptionBuilder.withLongOpt(ARGUMENT.UPDATE_ONLY)
|
||||||
|
.withDescription("Only update the local NVD data cache; no scan will be executed.").create();
|
||||||
|
|
||||||
|
final Option data = OptionBuilder.withArgName("path").hasArg().withLongOpt(ARGUMENT.DATA_DIRECTORY)
|
||||||
.withDescription("The location of the H2 Database file. This option should generally not be set.")
|
.withDescription("The location of the H2 Database file. This option should generally not be set.")
|
||||||
.create(ArgumentName.DATA_DIRECTORY_SHORT);
|
.create(ARGUMENT.DATA_DIRECTORY_SHORT);
|
||||||
|
|
||||||
final Option connectionTimeout = OptionBuilder.withArgName("timeout").hasArg().withLongOpt(ArgumentName.CONNECTION_TIMEOUT)
|
final Option connectionTimeout = OptionBuilder.withArgName("timeout").hasArg().withLongOpt(ARGUMENT.CONNECTION_TIMEOUT)
|
||||||
.withDescription("The connection timeout (in milliseconds) to use when downloading resources.")
|
.withDescription("The connection timeout (in milliseconds) to use when downloading resources.")
|
||||||
.create(ArgumentName.CONNECTION_TIMEOUT_SHORT);
|
.create(ARGUMENT.CONNECTION_TIMEOUT_SHORT);
|
||||||
|
|
||||||
final Option proxyUrl = OptionBuilder.withArgName("url").hasArg().withLongOpt(ArgumentName.PROXY_URL)
|
final Option proxyServer = OptionBuilder.withArgName("server").hasArg().withLongOpt(ARGUMENT.PROXY_SERVER)
|
||||||
.withDescription("The proxy url to use when downloading resources.")
|
.withDescription("The proxy server to use when downloading resources.")
|
||||||
.create(ArgumentName.PROXY_URL_SHORT);
|
.create();
|
||||||
|
|
||||||
final Option proxyPort = OptionBuilder.withArgName("port").hasArg().withLongOpt(ArgumentName.PROXY_PORT)
|
final Option proxyPort = OptionBuilder.withArgName("port").hasArg().withLongOpt(ARGUMENT.PROXY_PORT)
|
||||||
.withDescription("The proxy port to use when downloading resources.")
|
.withDescription("The proxy port to use when downloading resources.")
|
||||||
.create(ArgumentName.PROXY_PORT_SHORT);
|
.create();
|
||||||
|
|
||||||
final Option proxyUsername = OptionBuilder.withArgName("user").hasArg().withLongOpt(ArgumentName.PROXY_USERNAME)
|
final Option proxyUsername = OptionBuilder.withArgName("user").hasArg().withLongOpt(ARGUMENT.PROXY_USERNAME)
|
||||||
.withDescription("The proxy username to use when downloading resources.")
|
.withDescription("The proxy username to use when downloading resources.")
|
||||||
.create();
|
.create();
|
||||||
|
|
||||||
final Option proxyPassword = OptionBuilder.withArgName("pass").hasArg().withLongOpt(ArgumentName.PROXY_PASSWORD)
|
final Option proxyPassword = OptionBuilder.withArgName("pass").hasArg().withLongOpt(ARGUMENT.PROXY_PASSWORD)
|
||||||
.withDescription("The proxy password to use when downloading resources.")
|
.withDescription("The proxy password to use when downloading resources.")
|
||||||
.create();
|
.create();
|
||||||
|
|
||||||
final Option connectionString = OptionBuilder.withArgName("connStr").hasArg().withLongOpt(ArgumentName.CONNECTION_STRING)
|
final Option connectionString = OptionBuilder.withArgName("connStr").hasArg().withLongOpt(ARGUMENT.CONNECTION_STRING)
|
||||||
.withDescription("The connection string to the database.")
|
.withDescription("The connection string to the database.")
|
||||||
.create();
|
.create();
|
||||||
final Option dbUser = OptionBuilder.withArgName("user").hasArg().withLongOpt(ArgumentName.DB_NAME)
|
|
||||||
|
final Option dbUser = OptionBuilder.withArgName("user").hasArg().withLongOpt(ARGUMENT.DB_NAME)
|
||||||
.withDescription("The username used to connect to the database.")
|
.withDescription("The username used to connect to the database.")
|
||||||
.create();
|
.create();
|
||||||
final Option dbPassword = OptionBuilder.withArgName("password").hasArg().withLongOpt(ArgumentName.DB_PASSWORD)
|
|
||||||
|
final Option dbPassword = OptionBuilder.withArgName("password").hasArg().withLongOpt(ARGUMENT.DB_PASSWORD)
|
||||||
.withDescription("The password for connecting to the database.")
|
.withDescription("The password for connecting to the database.")
|
||||||
.create();
|
.create();
|
||||||
final Option dbDriver = OptionBuilder.withArgName("driver").hasArg().withLongOpt(ArgumentName.DB_DRIVER)
|
|
||||||
|
final Option dbDriver = OptionBuilder.withArgName("driver").hasArg().withLongOpt(ARGUMENT.DB_DRIVER)
|
||||||
.withDescription("The database driver name.")
|
.withDescription("The database driver name.")
|
||||||
.create();
|
.create();
|
||||||
final Option dbDriverPath = OptionBuilder.withArgName("path").hasArg().withLongOpt(ArgumentName.DB_DRIVER_PATH)
|
|
||||||
|
final Option dbDriverPath = OptionBuilder.withArgName("path").hasArg().withLongOpt(ARGUMENT.DB_DRIVER_PATH)
|
||||||
.withDescription("The path to the database driver; note, this does not need to be set unless the JAR is outside of the classpath.")
|
.withDescription("The path to the database driver; note, this does not need to be set unless the JAR is outside of the classpath.")
|
||||||
.create();
|
.create();
|
||||||
|
|
||||||
options.addOption(proxyPort)
|
final Option disableJarAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_JAR)
|
||||||
.addOption(proxyUrl)
|
.withDescription("Disable the Jar Analyzer.")
|
||||||
|
.create();
|
||||||
|
final Option disableArchiveAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_ARCHIVE)
|
||||||
|
.withDescription("Disable the Archive Analyzer.")
|
||||||
|
.create();
|
||||||
|
final Option disableNuspecAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_NUSPEC)
|
||||||
|
.withDescription("Disable the Nuspec Analyzer.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option disableAssemblyAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_ASSEMBLY)
|
||||||
|
.withDescription("Disable the .NET Assembly Analyzer.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option disablePythonDistributionAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_PY_DIST)
|
||||||
|
.withDescription("Disable the Python Distribution Analyzer.").create();
|
||||||
|
|
||||||
|
final Option disablePythonPackageAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_PY_PKG)
|
||||||
|
.withDescription("Disable the Python Package Analyzer.").create();
|
||||||
|
|
||||||
|
final Option disableCentralAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_CENTRAL)
|
||||||
|
.withDescription("Disable the Central Analyzer. If this analyzer is disabled it is likely you also want to disable "
|
||||||
|
+ "the Nexus Analyzer.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option disableNexusAnalyzer = OptionBuilder.withLongOpt(ARGUMENT.DISABLE_NEXUS)
|
||||||
|
.withDescription("Disable the Nexus Analyzer.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option nexusUrl = OptionBuilder.withArgName("url").hasArg().withLongOpt(ARGUMENT.NEXUS_URL)
|
||||||
|
.withDescription("The url to the Nexus Server's REST API Endpoint (http://domain/nexus/service/local). "
|
||||||
|
+ "If not set the Nexus Analyzer will be disabled.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option nexusUsesProxy = OptionBuilder.withArgName("true/false").hasArg().withLongOpt(ARGUMENT.NEXUS_USES_PROXY)
|
||||||
|
.withDescription("Whether or not the configured proxy should be used when connecting to Nexus.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option additionalZipExtensions = OptionBuilder.withArgName("extensions").hasArg()
|
||||||
|
.withLongOpt(ARGUMENT.ADDITIONAL_ZIP_EXTENSIONS)
|
||||||
|
.withDescription("A comma separated list of additional extensions to be scanned as ZIP files "
|
||||||
|
+ "(ZIP, EAR, WAR are already treated as zip files)")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
final Option pathToMono = OptionBuilder.withArgName("path").hasArg().withLongOpt(ARGUMENT.PATH_TO_MONO)
|
||||||
|
.withDescription("The path to Mono for .NET Assembly analysis on non-windows systems.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
options.addOption(updateOnly)
|
||||||
|
.addOption(proxyPort)
|
||||||
|
.addOption(proxyServer)
|
||||||
.addOption(proxyUsername)
|
.addOption(proxyUsername)
|
||||||
.addOption(proxyPassword)
|
.addOption(proxyPassword)
|
||||||
.addOption(connectionTimeout)
|
.addOption(connectionTimeout)
|
||||||
@@ -283,7 +373,36 @@ public final class CliParser {
|
|||||||
.addOption(data)
|
.addOption(data)
|
||||||
.addOption(dbPassword)
|
.addOption(dbPassword)
|
||||||
.addOption(dbDriver)
|
.addOption(dbDriver)
|
||||||
.addOption(dbDriverPath);
|
.addOption(dbDriverPath)
|
||||||
|
.addOption(disableJarAnalyzer)
|
||||||
|
.addOption(disableArchiveAnalyzer)
|
||||||
|
.addOption(disableAssemblyAnalyzer)
|
||||||
|
.addOption(disablePythonDistributionAnalyzer)
|
||||||
|
.addOption(disablePythonPackageAnalyzer)
|
||||||
|
.addOption(disableNuspecAnalyzer)
|
||||||
|
.addOption(disableCentralAnalyzer)
|
||||||
|
.addOption(disableNexusAnalyzer)
|
||||||
|
.addOption(nexusUrl)
|
||||||
|
.addOption(nexusUsesProxy)
|
||||||
|
.addOption(additionalZipExtensions)
|
||||||
|
.addOption(pathToMono);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds the deprecated command line options to the given options collection. These are split out for purposes of not including
|
||||||
|
* them in the help message. We need to add the deprecated options so as not to break existing scripts.
|
||||||
|
*
|
||||||
|
* @param options a collection of command line arguments
|
||||||
|
* @throws IllegalArgumentException thrown if there is an exception
|
||||||
|
*/
|
||||||
|
@SuppressWarnings("static-access")
|
||||||
|
private void addDeprecatedOptions(final Options options) throws IllegalArgumentException {
|
||||||
|
|
||||||
|
final Option proxyServer = OptionBuilder.withArgName("url").hasArg().withLongOpt(ARGUMENT.PROXY_URL)
|
||||||
|
.withDescription("The proxy url argument is deprecated, use proxyserver instead.")
|
||||||
|
.create();
|
||||||
|
|
||||||
|
options.addOption(proxyServer);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -292,7 +411,7 @@ public final class CliParser {
|
|||||||
* @return whether or not the 'version' command line argument was passed in
|
* @return whether or not the 'version' command line argument was passed in
|
||||||
*/
|
*/
|
||||||
public boolean isGetVersion() {
|
public boolean isGetVersion() {
|
||||||
return (line != null) && line.hasOption(ArgumentName.VERSION);
|
return (line != null) && line.hasOption(ARGUMENT.VERSION);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -301,7 +420,7 @@ public final class CliParser {
|
|||||||
* @return whether or not the 'help' command line argument was passed in
|
* @return whether or not the 'help' command line argument was passed in
|
||||||
*/
|
*/
|
||||||
public boolean isGetHelp() {
|
public boolean isGetHelp() {
|
||||||
return (line != null) && line.hasOption(ArgumentName.HELP);
|
return (line != null) && line.hasOption(ARGUMENT.HELP);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -310,7 +429,61 @@ public final class CliParser {
|
|||||||
* @return whether or not the 'scan' command line argument was passed in
|
* @return whether or not the 'scan' command line argument was passed in
|
||||||
*/
|
*/
|
||||||
public boolean isRunScan() {
|
public boolean isRunScan() {
|
||||||
return (line != null) && isValid && line.hasOption(ArgumentName.SCAN);
|
return (line != null) && isValid && line.hasOption(ARGUMENT.SCAN);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the disableJar command line argument was specified.
|
||||||
|
*
|
||||||
|
* @return true if the disableJar command line argument was specified; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isJarDisabled() {
|
||||||
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_JAR);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the disableArchive command line argument was specified.
|
||||||
|
*
|
||||||
|
* @return true if the disableArchive command line argument was specified; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isArchiveDisabled() {
|
||||||
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_ARCHIVE);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the disableNuspec command line argument was specified.
|
||||||
|
*
|
||||||
|
* @return true if the disableNuspec command line argument was specified; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isNuspecDisabled() {
|
||||||
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_NUSPEC);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the disableAssembly command line argument was specified.
|
||||||
|
*
|
||||||
|
* @return true if the disableAssembly command line argument was specified; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isAssemblyDisabled() {
|
||||||
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_ASSEMBLY);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the disablePyDist command line argument was specified.
|
||||||
|
*
|
||||||
|
* @return true if the disablePyDist command line argument was specified; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isPythonDistributionDisabled() {
|
||||||
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_PY_DIST);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the disablePyPkg command line argument was specified.
|
||||||
|
*
|
||||||
|
* @return true if the disablePyPkg command line argument was specified; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isPythonPackageDisabled() {
|
||||||
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_PY_PKG);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -319,7 +492,16 @@ public final class CliParser {
|
|||||||
* @return true if the disableNexus command line argument was specified; otherwise false
|
* @return true if the disableNexus command line argument was specified; otherwise false
|
||||||
*/
|
*/
|
||||||
public boolean isNexusDisabled() {
|
public boolean isNexusDisabled() {
|
||||||
return (line != null) && line.hasOption(ArgumentName.DISABLE_NEXUS);
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_NEXUS);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the disableCentral command line argument was specified.
|
||||||
|
*
|
||||||
|
* @return true if the disableCentral command line argument was specified; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isCentralDisabled() {
|
||||||
|
return (line != null) && line.hasOption(ARGUMENT.DISABLE_CENTRAL);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -328,10 +510,29 @@ public final class CliParser {
|
|||||||
* @return the url to the nexus server; if none was specified this will return null;
|
* @return the url to the nexus server; if none was specified this will return null;
|
||||||
*/
|
*/
|
||||||
public String getNexusUrl() {
|
public String getNexusUrl() {
|
||||||
if (line == null || !line.hasOption(ArgumentName.NEXUS_URL)) {
|
if (line == null || !line.hasOption(ARGUMENT.NEXUS_URL)) {
|
||||||
return null;
|
return null;
|
||||||
} else {
|
} else {
|
||||||
return line.getOptionValue(ArgumentName.NEXUS_URL);
|
return line.getOptionValue(ARGUMENT.NEXUS_URL);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if the Nexus Analyzer should use the configured proxy to connect to Nexus; otherwise false is returned.
|
||||||
|
*
|
||||||
|
* @return true if the Nexus Analyzer should use the configured proxy to connect to Nexus; otherwise false
|
||||||
|
*/
|
||||||
|
public boolean isNexusUsesProxy() {
|
||||||
|
// If they didn't specify whether Nexus needs to use the proxy, we should
|
||||||
|
// still honor the property if it's set.
|
||||||
|
if (line == null || !line.hasOption(ARGUMENT.NEXUS_USES_PROXY)) {
|
||||||
|
try {
|
||||||
|
return Settings.getBoolean(Settings.KEYS.ANALYZER_NEXUS_PROXY);
|
||||||
|
} catch (InvalidSettingException ise) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
return Boolean.parseBoolean(line.getOptionValue(ARGUMENT.NEXUS_USES_PROXY));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -342,7 +543,7 @@ public final class CliParser {
|
|||||||
final HelpFormatter formatter = new HelpFormatter();
|
final HelpFormatter formatter = new HelpFormatter();
|
||||||
final Options options = new Options();
|
final Options options = new Options();
|
||||||
addStandardOptions(options);
|
addStandardOptions(options);
|
||||||
if (line != null && line.hasOption(ArgumentName.ADVANCED_HELP)) {
|
if (line != null && line.hasOption(ARGUMENT.ADVANCED_HELP)) {
|
||||||
addAdvancedOptions(options);
|
addAdvancedOptions(options);
|
||||||
}
|
}
|
||||||
final String helpMsg = String.format("%n%s"
|
final String helpMsg = String.format("%n%s"
|
||||||
@@ -356,7 +557,6 @@ public final class CliParser {
|
|||||||
options,
|
options,
|
||||||
"",
|
"",
|
||||||
true);
|
true);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -365,7 +565,16 @@ public final class CliParser {
|
|||||||
* @return the file paths specified on the command line for scan
|
* @return the file paths specified on the command line for scan
|
||||||
*/
|
*/
|
||||||
public String[] getScanFiles() {
|
public String[] getScanFiles() {
|
||||||
return line.getOptionValues(ArgumentName.SCAN);
|
return line.getOptionValues(ARGUMENT.SCAN);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Retrieves the list of excluded file patterns specified by the 'exclude' argument.
|
||||||
|
*
|
||||||
|
* @return the excluded file patterns
|
||||||
|
*/
|
||||||
|
public String[] getExcludeList() {
|
||||||
|
return line.getOptionValues(ARGUMENT.EXCLUDE);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -374,7 +583,16 @@ public final class CliParser {
|
|||||||
* @return the path to the reports directory.
|
* @return the path to the reports directory.
|
||||||
*/
|
*/
|
||||||
public String getReportDirectory() {
|
public String getReportDirectory() {
|
||||||
return line.getOptionValue(ArgumentName.OUT, ".");
|
return line.getOptionValue(ARGUMENT.OUT, ".");
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the path to Mono for .NET Assembly analysis on non-windows systems.
|
||||||
|
*
|
||||||
|
* @return the path to Mono
|
||||||
|
*/
|
||||||
|
public String getPathToMono() {
|
||||||
|
return line.getOptionValue(ARGUMENT.PATH_TO_MONO);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -383,7 +601,7 @@ public final class CliParser {
|
|||||||
* @return the output format name.
|
* @return the output format name.
|
||||||
*/
|
*/
|
||||||
public String getReportFormat() {
|
public String getReportFormat() {
|
||||||
return line.getOptionValue(ArgumentName.OUTPUT_FORMAT, "HTML");
|
return line.getOptionValue(ARGUMENT.OUTPUT_FORMAT, "HTML");
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -392,7 +610,7 @@ public final class CliParser {
|
|||||||
* @return the application name.
|
* @return the application name.
|
||||||
*/
|
*/
|
||||||
public String getApplicationName() {
|
public String getApplicationName() {
|
||||||
return line.getOptionValue(ArgumentName.APP_NAME);
|
return line.getOptionValue(ARGUMENT.APP_NAME);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -401,16 +619,24 @@ public final class CliParser {
|
|||||||
* @return the connection timeout
|
* @return the connection timeout
|
||||||
*/
|
*/
|
||||||
public String getConnectionTimeout() {
|
public String getConnectionTimeout() {
|
||||||
return line.getOptionValue(ArgumentName.CONNECTION_TIMEOUT);
|
return line.getOptionValue(ARGUMENT.CONNECTION_TIMEOUT);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the proxy url.
|
* Returns the proxy server.
|
||||||
*
|
*
|
||||||
* @return the proxy url
|
* @return the proxy server
|
||||||
*/
|
*/
|
||||||
public String getProxyUrl() {
|
public String getProxyServer() {
|
||||||
return line.getOptionValue(ArgumentName.PROXY_URL);
|
|
||||||
|
String server = line.getOptionValue(ARGUMENT.PROXY_SERVER);
|
||||||
|
if (server == null) {
|
||||||
|
server = line.getOptionValue(ARGUMENT.PROXY_URL);
|
||||||
|
if (server != null) {
|
||||||
|
LOGGER.warning("An old command line argument 'proxyurl' was detected; use proxyserver instead");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return server;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -419,7 +645,7 @@ public final class CliParser {
|
|||||||
* @return the proxy port
|
* @return the proxy port
|
||||||
*/
|
*/
|
||||||
public String getProxyPort() {
|
public String getProxyPort() {
|
||||||
return line.getOptionValue(ArgumentName.PROXY_PORT);
|
return line.getOptionValue(ARGUMENT.PROXY_PORT);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -428,7 +654,7 @@ public final class CliParser {
|
|||||||
* @return the proxy username
|
* @return the proxy username
|
||||||
*/
|
*/
|
||||||
public String getProxyUsername() {
|
public String getProxyUsername() {
|
||||||
return line.getOptionValue(ArgumentName.PROXY_USERNAME);
|
return line.getOptionValue(ARGUMENT.PROXY_USERNAME);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -437,7 +663,7 @@ public final class CliParser {
|
|||||||
* @return the proxy password
|
* @return the proxy password
|
||||||
*/
|
*/
|
||||||
public String getProxyPassword() {
|
public String getProxyPassword() {
|
||||||
return line.getOptionValue(ArgumentName.PROXY_PASSWORD);
|
return line.getOptionValue(ARGUMENT.PROXY_PASSWORD);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -446,7 +672,7 @@ public final class CliParser {
|
|||||||
* @return the value of dataDirectory
|
* @return the value of dataDirectory
|
||||||
*/
|
*/
|
||||||
public String getDataDirectory() {
|
public String getDataDirectory() {
|
||||||
return line.getOptionValue(ArgumentName.DATA_DIRECTORY);
|
return line.getOptionValue(ARGUMENT.DATA_DIRECTORY);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -455,7 +681,7 @@ public final class CliParser {
|
|||||||
* @return the properties file specified on the command line
|
* @return the properties file specified on the command line
|
||||||
*/
|
*/
|
||||||
public File getPropertiesFile() {
|
public File getPropertiesFile() {
|
||||||
final String path = line.getOptionValue(ArgumentName.PROP);
|
final String path = line.getOptionValue(ARGUMENT.PROP);
|
||||||
if (path != null) {
|
if (path != null) {
|
||||||
return new File(path);
|
return new File(path);
|
||||||
}
|
}
|
||||||
@@ -468,7 +694,7 @@ public final class CliParser {
|
|||||||
* @return the path to the verbose log file
|
* @return the path to the verbose log file
|
||||||
*/
|
*/
|
||||||
public String getVerboseLog() {
|
public String getVerboseLog() {
|
||||||
return line.getOptionValue(ArgumentName.VERBOSE_LOG);
|
return line.getOptionValue(ARGUMENT.VERBOSE_LOG);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -477,7 +703,7 @@ public final class CliParser {
|
|||||||
* @return the path to the suppression file
|
* @return the path to the suppression file
|
||||||
*/
|
*/
|
||||||
public String getSuppressionFile() {
|
public String getSuppressionFile() {
|
||||||
return line.getOptionValue(ArgumentName.SUPPRESION_FILE);
|
return line.getOptionValue(ARGUMENT.SUPPRESSION_FILE);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -488,19 +714,27 @@ public final class CliParser {
|
|||||||
*/
|
*/
|
||||||
public void printVersionInfo() {
|
public void printVersionInfo() {
|
||||||
final String version = String.format("%s version %s",
|
final String version = String.format("%s version %s",
|
||||||
Settings.getString("application.name", "DependencyCheck"),
|
Settings.getString(Settings.KEYS.APPLICATION_VAME, "dependency-check"),
|
||||||
Settings.getString("application.version", "Unknown"));
|
Settings.getString(Settings.KEYS.APPLICATION_VERSION, "Unknown"));
|
||||||
System.out.println(version);
|
System.out.println(version);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Checks if the auto update feature has been disabled. If it has been disabled via the command line this will
|
* Checks if the auto update feature has been disabled. If it has been disabled via the command line this will return false.
|
||||||
* return false.
|
|
||||||
*
|
*
|
||||||
* @return if auto-update is allowed.
|
* @return <code>true</code> if auto-update is allowed; otherwise <code>false</code>
|
||||||
*/
|
*/
|
||||||
public boolean isAutoUpdate() {
|
public boolean isAutoUpdate() {
|
||||||
return (line == null) || !line.hasOption(ArgumentName.DISABLE_AUTO_UPDATE);
|
return (line == null) || !line.hasOption(ARGUMENT.DISABLE_AUTO_UPDATE);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks if the update only flag has been set.
|
||||||
|
*
|
||||||
|
* @return <code>true</code> if the update only flag has been set; otherwise <code>false</code>.
|
||||||
|
*/
|
||||||
|
public boolean isUpdateOnly() {
|
||||||
|
return (line == null) || line.hasOption(ARGUMENT.UPDATE_ONLY);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -509,7 +743,7 @@ public final class CliParser {
|
|||||||
* @return the database driver name if specified; otherwise null is returned
|
* @return the database driver name if specified; otherwise null is returned
|
||||||
*/
|
*/
|
||||||
public String getDatabaseDriverName() {
|
public String getDatabaseDriverName() {
|
||||||
return line.getOptionValue(ArgumentName.DB_DRIVER);
|
return line.getOptionValue(ARGUMENT.DB_DRIVER);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -518,7 +752,7 @@ public final class CliParser {
|
|||||||
* @return the database driver name if specified; otherwise null is returned
|
* @return the database driver name if specified; otherwise null is returned
|
||||||
*/
|
*/
|
||||||
public String getDatabaseDriverPath() {
|
public String getDatabaseDriverPath() {
|
||||||
return line.getOptionValue(ArgumentName.DB_DRIVER_PATH);
|
return line.getOptionValue(ARGUMENT.DB_DRIVER_PATH);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -527,7 +761,7 @@ public final class CliParser {
|
|||||||
* @return the database connection string if specified; otherwise null is returned
|
* @return the database connection string if specified; otherwise null is returned
|
||||||
*/
|
*/
|
||||||
public String getConnectionString() {
|
public String getConnectionString() {
|
||||||
return line.getOptionValue(ArgumentName.CONNECTION_STRING);
|
return line.getOptionValue(ARGUMENT.CONNECTION_STRING);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -536,7 +770,7 @@ public final class CliParser {
|
|||||||
* @return the database database user name if specified; otherwise null is returned
|
* @return the database database user name if specified; otherwise null is returned
|
||||||
*/
|
*/
|
||||||
public String getDatabaseUser() {
|
public String getDatabaseUser() {
|
||||||
return line.getOptionValue(ArgumentName.DB_NAME);
|
return line.getOptionValue(ARGUMENT.DB_NAME);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -545,13 +779,22 @@ public final class CliParser {
|
|||||||
* @return the database database password if specified; otherwise null is returned
|
* @return the database database password if specified; otherwise null is returned
|
||||||
*/
|
*/
|
||||||
public String getDatabasePassword() {
|
public String getDatabasePassword() {
|
||||||
return line.getOptionValue(ArgumentName.DB_PASSWORD);
|
return line.getOptionValue(ARGUMENT.DB_PASSWORD);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the additional Extensions if specified; otherwise null is returned.
|
||||||
|
*
|
||||||
|
* @return the additional Extensions; otherwise null is returned
|
||||||
|
*/
|
||||||
|
public String getAdditionalZipExtensions() {
|
||||||
|
return line.getOptionValue(ARGUMENT.ADDITIONAL_ZIP_EXTENSIONS);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A collection of static final strings that represent the possible command line arguments.
|
* A collection of static final strings that represent the possible command line arguments.
|
||||||
*/
|
*/
|
||||||
public static class ArgumentName {
|
public static class ARGUMENT {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The long CLI argument name specifying the directory/file to scan.
|
* The long CLI argument name specifying the directory/file to scan.
|
||||||
@@ -569,6 +812,10 @@ public final class CliParser {
|
|||||||
* The short CLI argument name specifying that the CPE/CVE/etc. data should not be automatically updated.
|
* The short CLI argument name specifying that the CPE/CVE/etc. data should not be automatically updated.
|
||||||
*/
|
*/
|
||||||
public static final String DISABLE_AUTO_UPDATE_SHORT = "n";
|
public static final String DISABLE_AUTO_UPDATE_SHORT = "n";
|
||||||
|
/**
|
||||||
|
* The long CLI argument name specifying that only the update phase should be executed; no scan should be run.
|
||||||
|
*/
|
||||||
|
public static final String UPDATE_ONLY = "updateonly";
|
||||||
/**
|
/**
|
||||||
* The long CLI argument name specifying the directory to write the reports to.
|
* The long CLI argument name specifying the directory to write the reports to.
|
||||||
*/
|
*/
|
||||||
@@ -613,21 +860,20 @@ public final class CliParser {
|
|||||||
* The short CLI argument name asking for the version.
|
* The short CLI argument name asking for the version.
|
||||||
*/
|
*/
|
||||||
public static final String VERSION = "version";
|
public static final String VERSION = "version";
|
||||||
/**
|
|
||||||
* The short CLI argument name indicating the proxy port.
|
|
||||||
*/
|
|
||||||
public static final String PROXY_PORT_SHORT = "p";
|
|
||||||
/**
|
/**
|
||||||
* The CLI argument name indicating the proxy port.
|
* The CLI argument name indicating the proxy port.
|
||||||
*/
|
*/
|
||||||
public static final String PROXY_PORT = "proxyport";
|
public static final String PROXY_PORT = "proxyport";
|
||||||
/**
|
/**
|
||||||
* The short CLI argument name indicating the proxy url.
|
* The CLI argument name indicating the proxy server.
|
||||||
*/
|
*/
|
||||||
public static final String PROXY_URL_SHORT = "u";
|
public static final String PROXY_SERVER = "proxyserver";
|
||||||
/**
|
/**
|
||||||
* The CLI argument name indicating the proxy url.
|
* The CLI argument name indicating the proxy url.
|
||||||
|
*
|
||||||
|
* @deprecated use {@link org.owasp.dependencycheck.cli.CliParser.ArgumentName#PROXY_SERVER} instead
|
||||||
*/
|
*/
|
||||||
|
@Deprecated
|
||||||
public static final String PROXY_URL = "proxyurl";
|
public static final String PROXY_URL = "proxyurl";
|
||||||
/**
|
/**
|
||||||
* The CLI argument name indicating the proxy username.
|
* The CLI argument name indicating the proxy username.
|
||||||
@@ -648,7 +894,7 @@ public final class CliParser {
|
|||||||
/**
|
/**
|
||||||
* The short CLI argument name for setting the location of an additional properties file.
|
* The short CLI argument name for setting the location of an additional properties file.
|
||||||
*/
|
*/
|
||||||
public static final String PROP_SHORT = "p";
|
public static final String PROP_SHORT = "P";
|
||||||
/**
|
/**
|
||||||
* The CLI argument name for setting the location of an additional properties file.
|
* The CLI argument name for setting the location of an additional properties file.
|
||||||
*/
|
*/
|
||||||
@@ -672,7 +918,35 @@ public final class CliParser {
|
|||||||
/**
|
/**
|
||||||
* The CLI argument name for setting the location of the suppression file.
|
* The CLI argument name for setting the location of the suppression file.
|
||||||
*/
|
*/
|
||||||
public static final String SUPPRESION_FILE = "suppression";
|
public static final String SUPPRESSION_FILE = "suppression";
|
||||||
|
/**
|
||||||
|
* Disables the Jar Analyzer.
|
||||||
|
*/
|
||||||
|
public static final String DISABLE_JAR = "disableJar";
|
||||||
|
/**
|
||||||
|
* Disables the Archive Analyzer.
|
||||||
|
*/
|
||||||
|
public static final String DISABLE_ARCHIVE = "disableArchive";
|
||||||
|
/**
|
||||||
|
* Disables the Python Distribution Analyzer.
|
||||||
|
*/
|
||||||
|
public static final String DISABLE_PY_DIST = "disablePyDist";
|
||||||
|
/**
|
||||||
|
* Disables the Python Package Analyzer.
|
||||||
|
*/
|
||||||
|
public static final String DISABLE_PY_PKG = "disablePyPkg";
|
||||||
|
/**
|
||||||
|
* Disables the Assembly Analyzer.
|
||||||
|
*/
|
||||||
|
public static final String DISABLE_ASSEMBLY = "disableAssembly";
|
||||||
|
/**
|
||||||
|
* Disables the Nuspec Analyzer.
|
||||||
|
*/
|
||||||
|
public static final String DISABLE_NUSPEC = "disableNuspec";
|
||||||
|
/**
|
||||||
|
* Disables the Central Analyzer.
|
||||||
|
*/
|
||||||
|
public static final String DISABLE_CENTRAL = "disableCentral";
|
||||||
/**
|
/**
|
||||||
* Disables the Nexus Analyzer.
|
* Disables the Nexus Analyzer.
|
||||||
*/
|
*/
|
||||||
@@ -681,6 +955,10 @@ public final class CliParser {
|
|||||||
* The URL of the nexus server.
|
* The URL of the nexus server.
|
||||||
*/
|
*/
|
||||||
public static final String NEXUS_URL = "nexus";
|
public static final String NEXUS_URL = "nexus";
|
||||||
|
/**
|
||||||
|
* Whether or not the defined proxy should be used when connecting to Nexus.
|
||||||
|
*/
|
||||||
|
public static final String NEXUS_USES_PROXY = "nexusUsesProxy";
|
||||||
/**
|
/**
|
||||||
* The CLI argument name for setting the connection string.
|
* The CLI argument name for setting the connection string.
|
||||||
*/
|
*/
|
||||||
@@ -701,5 +979,17 @@ public final class CliParser {
|
|||||||
* The CLI argument name for setting the path to the database driver; in case it is not on the class path.
|
* The CLI argument name for setting the path to the database driver; in case it is not on the class path.
|
||||||
*/
|
*/
|
||||||
public static final String DB_DRIVER_PATH = "dbDriverPath";
|
public static final String DB_DRIVER_PATH = "dbDriverPath";
|
||||||
|
/**
|
||||||
|
* The CLI argument name for setting the path to mono for .NET Assembly analysis on non-windows systems.
|
||||||
|
*/
|
||||||
|
public static final String PATH_TO_MONO = "mono";
|
||||||
|
/**
|
||||||
|
* The CLI argument name for setting extra extensions.
|
||||||
|
*/
|
||||||
|
public static final String ADDITIONAL_ZIP_EXTENSIONS = "zipExtensions";
|
||||||
|
/**
|
||||||
|
* Exclude path argument.
|
||||||
|
*/
|
||||||
|
public static final String EXCLUDE = "exclude";
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -0,0 +1,61 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-cli.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Thrown if an invalid path is encountered.
|
||||||
|
*
|
||||||
|
* @author Jeremy Long
|
||||||
|
*/
|
||||||
|
class InvalidScanPathException extends Exception {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a new InvalidScanPathException.
|
||||||
|
*/
|
||||||
|
public InvalidScanPathException() {
|
||||||
|
super();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a new InvalidScanPathException.
|
||||||
|
*
|
||||||
|
* @param msg a message for the exception
|
||||||
|
*/
|
||||||
|
public InvalidScanPathException(String msg) {
|
||||||
|
super(msg);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a new InvalidScanPathException.
|
||||||
|
*
|
||||||
|
* @param ex the cause of the exception
|
||||||
|
*/
|
||||||
|
public InvalidScanPathException(Throwable ex) {
|
||||||
|
super(ex);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a new InvalidScanPathException.
|
||||||
|
*
|
||||||
|
* @param msg a message for the exception
|
||||||
|
* @param ex the cause of the exception
|
||||||
|
*/
|
||||||
|
public InvalidScanPathException(String msg, Throwable ex) {
|
||||||
|
super(msg, ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
/**
|
|
||||||
* <html>
|
|
||||||
* <head>
|
|
||||||
* <title>org.owasp.dependencycheck.cli</title>
|
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* Includes utility classes such as the CLI Parser,
|
|
||||||
* </body>
|
|
||||||
* </html>
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.owasp.dependencycheck.cli;
|
|
||||||
@@ -1,12 +1,4 @@
|
|||||||
/**
|
/**
|
||||||
* <html>
|
|
||||||
* <head>
|
|
||||||
* <title>org.owasp.dependencycheck</title>
|
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* Includes the main entry point for the DependencyChecker.
|
* Includes the main entry point for the DependencyChecker.
|
||||||
* </body>
|
*/
|
||||||
* </html>
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.owasp.dependencycheck;
|
package org.owasp.dependencycheck;
|
||||||
|
|||||||
@@ -1,30 +1,48 @@
|
|||||||
Command Line Arguments
|
Command Line Arguments
|
||||||
====================
|
======================
|
||||||
|
|
||||||
The following table lists the command line arguments:
|
The following table lists the command line arguments:
|
||||||
|
|
||||||
Short | Argument Name | Parameter | Description | Requirement
|
Short | Argument Name | Parameter | Description | Requirement
|
||||||
-------|-----------------------|-------------|-------------|------------
|
-------|-----------------------|-----------------|-------------|------------
|
||||||
\-a | \-\-app | \<name\> | The name of the application being scanned. This is a required argument. |
|
\-a | \-\-app | \<name\> | The name of the application being scanned. This is a required argument. | Required
|
||||||
\-c | \-\-connectiontimeout | \<timeout\> | The connection timeout (in milliseconds) to use when downloading resources. | Optional
|
\-s | \-\-scan | \<path\> | The path to scan \- this option can be specified multiple times. It is also possible to specify Ant style paths (e.g. directory/**/*.jar). | Required
|
||||||
\-d | \-\-data | \<path\> | The location of the data directory used to store persistent data. This option should generally not be set. | Optional
|
| \-\-exclude | \<pattern\> | The path patterns to exclude from the scan \- this option can be specified multiple times. This accepts Ant style path patterns (e.g. **/exclude/**) . | Optional
|
||||||
\-f | \-\-format | \<format\> | The output format to write to (XML, HTML, VULN, ALL). The default is HTML. |
|
\-o | \-\-out | \<path\> | The folder to write reports to. This defaults to the current directory. If the format is not set to ALL one could specify a specific file name. | Optional
|
||||||
\-h | \-\-help | | Print the help message. | Optional
|
\-f | \-\-format | \<format\> | The output format to write to (XML, HTML, VULN, ALL). The default is HTML. | Required
|
||||||
\-l | \-\-log | \<file\> | The file path to write verbose logging information. | Optional
|
\-l | \-\-log | \<file\> | The file path to write verbose logging information. | Optional
|
||||||
\-n | \-\-noupdate | | Disables the automatic updating of the CPE data. | Optional
|
\-n | \-\-noupdate | | Disables the automatic updating of the CPE data. | Optional
|
||||||
\-o | \-\-out | \<folder\> | The folder to write reports to. This defaults to the current directory. | Optional
|
| \-\-suppression | \<file\> | The file path to the suppression XML file; used to suppress [false positives](../suppression.html). | Optional
|
||||||
\-p | \-\-proxyport | \<port\> | The proxy port to use when downloading resources. | Optional
|
\-h | \-\-help | | Print the help message. | Optional
|
||||||
| \-\-proxypass | \<pass\> | The proxy password to use when downloading resources. | Optional
|
| \-\-advancedHelp | | Print the advanced help message. | Optional
|
||||||
| \-\-proxyuser | \<user\> | The proxy username to use when downloading resources. | Optional
|
\-v | \-\-version | | Print the version information. | Optional
|
||||||
\-s | \-\-scan | \<path\> | The path to scan \- this option can be specified multiple times. |
|
|
||||||
| \-\-suppression | \<file\> | The file path to the suppression XML file; used to suppress [false positives](../suppression.html). | Optional
|
Advanced Options
|
||||||
\-u | \-\-proxyurl | \<url\> | The proxy url to use when downloading resources. | Optional
|
================
|
||||||
\-v | \-\-version | | Print the version information. | Optional
|
Short | Argument Name | Parameter | Description | Default Value
|
||||||
| \-\-advancedHelp | | Print the advanced help message. | Optional
|
-------|-----------------------|-----------------|----------------------------------------------------------------------------------|-------------------
|
||||||
| \-\-connectionString | \<connStr\> | The connection string to the database. | Optional
|
\-P | \-\-propertyfile | \<file\> | Specifies a file that contains properties to use instead of applicaion defaults. |
|
||||||
| \-\-dbDriverName | \<driver\> | The database driver name. | Optional
|
| \-\-updateonly | | If set only the update phase of dependency-check will be executed; no scan will be executed and no report will be generated. |
|
||||||
| \-\-dbDriverPath | \<path\> | The path to the database driver; note, this does not need to be set unless the JAR is outside of the class path. | Optional
|
| \-\-disablePyDist | | Sets whether the Python Distribution Analyzer will be used. | false
|
||||||
| \-\-dbPassword | \<password\>| The password for connecting to the database. | Optional
|
| \-\-disablePyPkg | | Sets whether the Python Package Analyzer will be used. | false
|
||||||
| \-\-dbUser | \<user\> | The username used to connect to the database. | Optional
|
| \-\-disableArchive | | Sets whether the Archive Analyzer will be used. | false
|
||||||
| \-\-disableNexus | | Disable the Nexus Analyzer. | Optional
|
| \-\-zipExtensions | \<strings\> | A comma-separated list of additional file extensions to be treated like a ZIP file, the contents will be extracted and analyzed. |
|
||||||
| \-\-nexus | \<url\> | The url to the Nexus Server. | Optional
|
| \-\-disableJar | | Sets whether the Jar Analyzer will be used. | false
|
||||||
|
| \-\-disableCentral | | Sets whether the Central Analyzer will be used. **Disabling this analyzer is not recommended as it could lead to false negatives (e.g. libraries that have vulnerabilities may not be reported correctly).** If this analyzer is being disabled there is a good chance you also want to disable the Nexus Analyzer. | false
|
||||||
|
| \-\-disableNexus | | Sets whether the Nexus Analyzer will be used. Note, this has been superceded by the Central Analyzer. However, you can configure the Nexus URL to utilize an internally hosted Nexus Pro server. | false
|
||||||
|
| \-\-nexus | \<url\> | The url to the Nexus Server's web service end point (example: http://domain.enterprise/nexus/service/local/). If not set the Nexus Analyzer will be disabled. |
|
||||||
|
| \-\-nexusUsesProxy | \<true\|false\> | Whether or not the defined proxy should be used when connecting to Nexus. | true
|
||||||
|
| \-\-disableNuspec | | Sets whether or not the .NET Nuget Nuspec Analyzer will be used. | false
|
||||||
|
| \-\-disableAssembly | | Sets whether or not the .NET Assembly Analyzer should be used. | false
|
||||||
|
| \-\-pathToMono | \<path\> | The path to Mono for .NET Assembly analysis on non-windows systems. |
|
||||||
|
| \-\-proxyserver | \<server\> | The proxy server to use when downloading resources. |
|
||||||
|
| \-\-proxyport | \<port\> | The proxy port to use when downloading resources. |
|
||||||
|
| \-\-connectiontimeout | \<timeout\> | The connection timeout (in milliseconds) to use when downloading resources. |
|
||||||
|
| \-\-proxypass | \<pass\> | The proxy password to use when downloading resources. |
|
||||||
|
| \-\-proxyuser | \<user\> | The proxy username to use when downloading resources. |
|
||||||
|
| \-\-connectionString | \<connStr\> | The connection string to the database. |
|
||||||
|
| \-\-dbDriverName | \<driver\> | The database driver name. |
|
||||||
|
| \-\-dbDriverPath | \<path\> | The path to the database driver; note, this does not need to be set unless the JAR is outside of the class path. |
|
||||||
|
| \-\-dbPassword | \<password\> | The password for connecting to the database. |
|
||||||
|
| \-\-dbUser | \<user\> | The username used to connect to the database. |
|
||||||
|
\-d | \-\-data | \<path\> | The location of the data directory used to store persistent data. This option should generally not be set. |
|
||||||
|
|||||||
@@ -1,5 +1,12 @@
|
|||||||
|
About
|
||||||
|
====================
|
||||||
|
OWASP dependency-check-cli is an command line tool that uses dependency-check-core to detect
|
||||||
|
publicly disclosed vulnerabilities associated with the scanned project dependencies. The tool
|
||||||
|
will generate a report listing the dependency, any identified Common Platform Enumeration (CPE)
|
||||||
|
identifiers, and the associated Common Vulnerability and Exposure (CVE) entries.
|
||||||
|
|
||||||
Installation & Usage
|
Installation & Usage
|
||||||
--------------------
|
====================
|
||||||
Download the dependency-check command line tool [here](http://dl.bintray.com/jeremy-long/owasp/dependency-check-${project.version}-release.zip).
|
Download the dependency-check command line tool [here](http://dl.bintray.com/jeremy-long/owasp/dependency-check-${project.version}-release.zip).
|
||||||
Extract the zip file to a location on your computer and put the 'bin' directory into the
|
Extract the zip file to a location on your computer and put the 'bin' directory into the
|
||||||
path environment variable. On \*nix systems you will likely need to make the shell
|
path environment variable. On \*nix systems you will likely need to make the shell
|
||||||
@@ -8,16 +15,18 @@ script executable:
|
|||||||
$ chmod +777 dependency-check.sh
|
$ chmod +777 dependency-check.sh
|
||||||
|
|
||||||
To scan a folder on the system you can run:
|
To scan a folder on the system you can run:
|
||||||
|
#set( $H = '#' )
|
||||||
|
|
||||||
<h3>Windows</h3>
|
$H$H$H Windows
|
||||||
dependency-check.bat --app "My App Name" --scan "c:\java\application\lib"
|
dependency-check.bat --app "My App Name" --scan "c:\java\application\lib"
|
||||||
|
|
||||||
<h3>\*nix</h3>
|
$H$H$H *nix
|
||||||
dependency-check.sh --app "My App Name" --scan "/java/application/lib"
|
dependency-check.sh --app "My App Name" --scan "/java/application/lib"
|
||||||
|
|
||||||
To view the command line arguments, see the <a href="arguments.html">arguments page</a>, or you can run:
|
To view the command line arguments, see the <a href="arguments.html">arguments page</a>, or you can run:
|
||||||
<h3>Windows</h3>
|
|
||||||
|
$H$H$H Windows
|
||||||
dependency-check.bat --help
|
dependency-check.bat --help
|
||||||
|
|
||||||
<h3>\*nix</h3>
|
$H$H$H *nix
|
||||||
dependency-check.sh --help
|
dependency-check.sh --help
|
||||||
File diff suppressed because one or more lines are too long
|
After Width: | Height: | Size: 10 KiB |
@@ -18,17 +18,18 @@ Copyright (c) 2013 Jeremy Long. All Rights Reserved.
|
|||||||
-->
|
-->
|
||||||
<project name="dependency-check-cli">
|
<project name="dependency-check-cli">
|
||||||
<bannerLeft>
|
<bannerLeft>
|
||||||
<name>dependency-check-cli</name>
|
<name>OWASP dependency-check-cli</name>
|
||||||
|
<alt>OWASP dependency-check-cli</alt>
|
||||||
|
<src>./images/dc-cli.svg</src>
|
||||||
</bannerLeft>
|
</bannerLeft>
|
||||||
<body>
|
<body>
|
||||||
<breadcrumbs>
|
<breadcrumbs>
|
||||||
<item name="dependency-check" href="../index.html"/>
|
<item name="dependency-check" href="../index.html"/>
|
||||||
</breadcrumbs>
|
</breadcrumbs>
|
||||||
<menu name="Getting Started">
|
<menu name="Getting Started">
|
||||||
<item name="Installation" href="installation.html"/>
|
<item name="Installation" href="index.html"/>
|
||||||
<item name="Configuration" href="arguments.html"/>
|
<item name="Configuration" href="arguments.html"/>
|
||||||
</menu>
|
</menu>
|
||||||
<menu ref="Project Documentation" />
|
|
||||||
<menu ref="reports" />
|
<menu ref="reports" />
|
||||||
</body>
|
</body>
|
||||||
</project>
|
</project>
|
||||||
@@ -15,8 +15,9 @@
|
|||||||
*
|
*
|
||||||
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.cli;
|
package org.owasp.dependencycheck;
|
||||||
|
|
||||||
|
import org.owasp.dependencycheck.CliParser;
|
||||||
import java.io.ByteArrayOutputStream;
|
import java.io.ByteArrayOutputStream;
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
@@ -29,19 +30,22 @@ import org.junit.Assert;
|
|||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.BeforeClass;
|
import org.junit.BeforeClass;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class CliParserTest {
|
public class CliParserTest {
|
||||||
|
|
||||||
@BeforeClass
|
@BeforeClass
|
||||||
public static void setUpClass() throws Exception {
|
public static void setUpClass() throws Exception {
|
||||||
|
Settings.initialize();
|
||||||
}
|
}
|
||||||
|
|
||||||
@AfterClass
|
@AfterClass
|
||||||
public static void tearDownClass() throws Exception {
|
public static void tearDownClass() throws Exception {
|
||||||
|
Settings.cleanup(true);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Before
|
@Before
|
||||||
@@ -1,223 +0,0 @@
|
|||||||
<?xml version="1.0"?>
|
|
||||||
<!DOCTYPE module PUBLIC
|
|
||||||
"-//Puppy Crawl//DTD Check Configuration 1.3//EN"
|
|
||||||
"http://www.puppycrawl.com/dtds/configuration_1_3.dtd">
|
|
||||||
|
|
||||||
<module name="Checker">
|
|
||||||
<!--
|
|
||||||
If you set the basedir property below, then all reported file
|
|
||||||
names will be relative to the specified directory. See
|
|
||||||
http://checkstyle.sourceforge.net/5.x/config.html#Checker
|
|
||||||
|
|
||||||
<property name="basedir" value="${basedir}"/>
|
|
||||||
-->
|
|
||||||
|
|
||||||
<property name="severity" value="error"/>
|
|
||||||
|
|
||||||
<module name="SuppressionFilter">
|
|
||||||
<property name="file" value="${checkstyle.suppressions.file}"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="JavadocPackage">
|
|
||||||
<property name="allowLegacy" value="false"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="Translation">
|
|
||||||
<property name="severity" value="warning"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="FileTabCharacter">
|
|
||||||
<property name="eachLine" value="false"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="FileLength">
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NewlineAtEndOfFile">
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
<property name="lineSeparator" value="lf"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="RegexpHeader">
|
|
||||||
<property name="headerFile" value="${checkstyle.header.file}"/>
|
|
||||||
<property name="fileExtensions" value="java"/>
|
|
||||||
<property name="id" value="header"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="RegexpSingleline">
|
|
||||||
<property name="format" value="\s+$"/>
|
|
||||||
<property name="minimum" value="0"/>
|
|
||||||
<property name="maximum" value="0"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="TreeWalker">
|
|
||||||
<property name="tabWidth" value="4"/>
|
|
||||||
|
|
||||||
<module name="AvoidStarImport"/>
|
|
||||||
<module name="ConstantName"/>
|
|
||||||
<module name="EmptyBlock"/>
|
|
||||||
<module name="EmptyForIteratorPad"/>
|
|
||||||
<module name="EqualsHashCode"/>
|
|
||||||
<module name="OneStatementPerLine"/>
|
|
||||||
|
|
||||||
<!-- module name="IllegalCatch"/ -->
|
|
||||||
<!--module name="ImportControl">
|
|
||||||
<property name="file" value="${checkstyle.importcontrol.file}"/>
|
|
||||||
</module-->
|
|
||||||
<module name="IllegalImport"/>
|
|
||||||
<module name="IllegalInstantiation"/>
|
|
||||||
<module name="IllegalThrows"/>
|
|
||||||
<module name="InnerAssignment"/>
|
|
||||||
<module name="JavadocType">
|
|
||||||
<property name="authorFormat" value="\S"/>
|
|
||||||
</module>
|
|
||||||
<module name="JavadocMethod">
|
|
||||||
<property name="allowUndeclaredRTE" value="true"/>
|
|
||||||
<property name="allowThrowsTagsForSubclasses" value="true"/>
|
|
||||||
<property name="allowMissingPropertyJavadoc" value="true"/>
|
|
||||||
</module>
|
|
||||||
<module name="JavadocVariable"/>
|
|
||||||
<module name="JavadocStyle">
|
|
||||||
<property name="scope" value="public"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="LeftCurly">
|
|
||||||
<property name="option" value="eol"/>
|
|
||||||
<property name="tokens" value="CLASS_DEF"/>
|
|
||||||
<property name="tokens" value="CTOR_DEF"/>
|
|
||||||
<property name="tokens" value="INTERFACE_DEF"/>
|
|
||||||
<property name="tokens" value="METHOD_DEF"/>
|
|
||||||
<property name="tokens" value="LITERAL_CATCH"/>
|
|
||||||
<property name="tokens" value="LITERAL_DO"/>
|
|
||||||
<property name="tokens" value="LITERAL_ELSE"/>
|
|
||||||
<property name="tokens" value="LITERAL_FINALLY"/>
|
|
||||||
<property name="tokens" value="LITERAL_FOR"/>
|
|
||||||
<property name="tokens" value="LITERAL_IF"/>
|
|
||||||
<property name="tokens" value="LITERAL_SWITCH"/>
|
|
||||||
<property name="tokens" value="LITERAL_SYNCHRONIZED"/>
|
|
||||||
<property name="tokens" value="LITERAL_TRY"/>
|
|
||||||
<property name="tokens" value="LITERAL_WHILE"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="OuterTypeNumber"/>
|
|
||||||
<module name="LineLength">
|
|
||||||
<property name="ignorePattern" value="^ *\* *[^ ]+$"/>
|
|
||||||
<property name="max" value="150"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="MethodCount">
|
|
||||||
<property name="maxTotal" value="40"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="LocalFinalVariableName"/>
|
|
||||||
<module name="LocalVariableName"/>
|
|
||||||
<module name="MemberName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="MethodLength">
|
|
||||||
<property name="max" value="160"/>
|
|
||||||
<property name="countEmpty" value="false"/>
|
|
||||||
</module>
|
|
||||||
<module name="MethodName"/>
|
|
||||||
<module name="MethodParamPad"/>
|
|
||||||
<module name="ModifierOrder"/>
|
|
||||||
<module name="NeedBraces"/>
|
|
||||||
<module name="NoWhitespaceAfter">
|
|
||||||
<property name="tokens" value="ARRAY_INIT"/>
|
|
||||||
<property name="tokens" value="BNOT"/>
|
|
||||||
<property name="tokens" value="DEC"/>
|
|
||||||
<property name="tokens" value="DOT"/>
|
|
||||||
<property name="tokens" value="INC"/>
|
|
||||||
<property name="tokens" value="LNOT"/>
|
|
||||||
<property name="tokens" value="UNARY_MINUS"/>
|
|
||||||
<property name="tokens" value="UNARY_PLUS"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NoWhitespaceBefore"/>
|
|
||||||
<module name="NoWhitespaceBefore">
|
|
||||||
<property name="tokens" value="DOT"/>
|
|
||||||
<property name="allowLineBreaks" value="true"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="OperatorWrap"/>
|
|
||||||
<module name="OperatorWrap">
|
|
||||||
<property name="tokens" value="ASSIGN"/>
|
|
||||||
<property name="tokens" value="DIV_ASSIGN"/>
|
|
||||||
<property name="tokens" value="PLUS_ASSIGN"/>
|
|
||||||
<property name="tokens" value="MINUS_ASSIGN"/>
|
|
||||||
<property name="tokens" value="STAR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="MOD_ASSIGN"/>
|
|
||||||
<property name="tokens" value="SR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BSR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="SL_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BXOR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BOR_ASSIGN"/>
|
|
||||||
<property name="tokens" value="BAND_ASSIGN"/>
|
|
||||||
<property name="option" value="eol"/>
|
|
||||||
</module>
|
|
||||||
<module name="PackageName"/>
|
|
||||||
<module name="ParameterName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="ParameterNumber">
|
|
||||||
<property name="id" value="paramNum"/>
|
|
||||||
</module>
|
|
||||||
<module name="ParenPad"/>
|
|
||||||
<module name="TypecastParenPad"/>
|
|
||||||
<module name="RedundantImport"/>
|
|
||||||
<module name="RedundantModifier"/>
|
|
||||||
<module name="RightCurly">
|
|
||||||
<property name="option" value="same"/>
|
|
||||||
</module>
|
|
||||||
<module name="SimplifyBooleanExpression"/>
|
|
||||||
<module name="SimplifyBooleanReturn"/>
|
|
||||||
<module name="StaticVariableName">
|
|
||||||
<property name="format" value="^[a-z][a-zA-Z0-9]*$"/>
|
|
||||||
</module>
|
|
||||||
<module name="TypeName"/>
|
|
||||||
<module name="UnusedImports"/>
|
|
||||||
<module name="UpperEll"/>
|
|
||||||
<module name="VisibilityModifier"/>
|
|
||||||
<module name="WhitespaceAfter"/>
|
|
||||||
<module name="WhitespaceAround"/>
|
|
||||||
<module name="GenericWhitespace"/>
|
|
||||||
<module name="FinalClass"/>
|
|
||||||
<module name="MissingSwitchDefault"/>
|
|
||||||
<!--module name="MagicNumber"/-->
|
|
||||||
<!--module name="Indentation">
|
|
||||||
<property name="basicOffset" value="4"/>
|
|
||||||
<property name="braceAdjustment" value="0"/>
|
|
||||||
<property name="caseIndent" value="0"/>
|
|
||||||
</module-->
|
|
||||||
<module name="ArrayTrailingComma"/>
|
|
||||||
<module name="FinalLocalVariable"/>
|
|
||||||
<module name="EqualsAvoidNull"/>
|
|
||||||
<module name="ParameterAssignment"/>
|
|
||||||
|
|
||||||
<!-- Generates quite a few errors -->
|
|
||||||
<module name="CyclomaticComplexity">
|
|
||||||
<property name="severity" value="ignore"/>
|
|
||||||
</module>
|
|
||||||
|
|
||||||
<module name="NestedForDepth">
|
|
||||||
<property name="max" value="2"/>
|
|
||||||
</module>
|
|
||||||
<module name="NestedIfDepth">
|
|
||||||
<property name="max" value="4"/>
|
|
||||||
</module>
|
|
||||||
<module name="NestedTryDepth">
|
|
||||||
<property name="max" value="2"/>
|
|
||||||
</module>
|
|
||||||
<!--module name="ExplicitInitialization"/-->
|
|
||||||
<module name="AnnotationUseStyle"/>
|
|
||||||
<module name="MissingDeprecated"/>
|
|
||||||
<module name="MissingOverride">
|
|
||||||
<property name="javaFiveCompatibility" value="true"/>
|
|
||||||
</module>
|
|
||||||
<module name="PackageAnnotation"/>
|
|
||||||
<module name="SuppressWarnings"/>
|
|
||||||
<module name="OuterTypeFilename"/>
|
|
||||||
<module name="HideUtilityClassConstructor"/>
|
|
||||||
</module>
|
|
||||||
</module>
|
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
^/\*\s*$
|
|
||||||
^ \* This file is part of dependency-check-core\.\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \* Licensed under the Apache License, Version 2\.0 \(the "License"\);\s*$
|
|
||||||
^ \* you may not use this file except in compliance with the License.\s*$
|
|
||||||
^ \* You may obtain a copy of the License at\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \*\s*http://www.apache.org/licenses/LICENSE-2\.0\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \* Unless required by applicable law or agreed to in writing, software\s*$
|
|
||||||
^ \* distributed under the License is distributed on an "AS IS" BASIS,\s*$
|
|
||||||
^ \* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied\.\s*$
|
|
||||||
^ \* See the License for the specific language governing permissions and\s*$
|
|
||||||
^ \* limitations under the License\.\s*$
|
|
||||||
^ \*\s*$
|
|
||||||
^ \* Copyright \(c\) 201[234] (Jeremy Long|Steve Springett)\. All Rights Reserved\.\s*$
|
|
||||||
^ \*/\s*$
|
|
||||||
^package
|
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
<?xml version="1.0"?>
|
|
||||||
|
|
||||||
<!DOCTYPE suppressions PUBLIC
|
|
||||||
"-//Puppy Crawl//DTD Suppressions 1.0//EN"
|
|
||||||
"http://www.puppycrawl.com/dtds/suppressions_1_0.dtd">
|
|
||||||
|
|
||||||
<suppressions>
|
|
||||||
<suppress checks=".*" files=".*[\\/]package-info\.java" />
|
|
||||||
<suppress checks=".*" files=".*org[\\/]owasp[\\/]dependencycheck[\\/]utils[\\/]Filter.java" />
|
|
||||||
<suppress checks=".*" files=".*org[\\/]owasp[\\/]dependencycheck[\\/]utils[\\/]Checksum.java" />
|
|
||||||
<suppress checks=".*" files=".*[\\/]generated[\\/].*.java" />
|
|
||||||
</suppressions>
|
|
||||||
@@ -15,19 +15,19 @@ limitations under the License.
|
|||||||
|
|
||||||
Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
||||||
-->
|
-->
|
||||||
|
|
||||||
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
|
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
|
||||||
<modelVersion>4.0.0</modelVersion>
|
<modelVersion>4.0.0</modelVersion>
|
||||||
<parent>
|
<parent>
|
||||||
<groupId>org.owasp</groupId>
|
<groupId>org.owasp</groupId>
|
||||||
<artifactId>dependency-check-parent</artifactId>
|
<artifactId>dependency-check-parent</artifactId>
|
||||||
<version>1.1.0</version>
|
<version>1.2.11</version>
|
||||||
</parent>
|
</parent>
|
||||||
|
|
||||||
<artifactId>dependency-check-core</artifactId>
|
<artifactId>dependency-check-core</artifactId>
|
||||||
<packaging>jar</packaging>
|
<packaging>jar</packaging>
|
||||||
|
|
||||||
<name>Dependency-Check Core</name>
|
<name>Dependency-Check Core</name>
|
||||||
|
<description>dependency-check-core is the engine and reporting tool used to identify and report if there are any known, publicly disclosed vulnerabilities in the scanned project's dependencies. The engine extracts meta-data from the dependencies and uses this to do fuzzy key-word matching against the Common Platfrom Enumeration (CPE), if any CPE identifiers are found the associated Common Vulnerability and Exposure (CVE) entries are added to the generated report.</description>
|
||||||
<!-- begin copy from http://minds.coremedia.com/2012/09/11/problem-solved-deploy-multi-module-maven-project-site-as-github-pages/ -->
|
<!-- begin copy from http://minds.coremedia.com/2012/09/11/problem-solved-deploy-multi-module-maven-project-site-as-github-pages/ -->
|
||||||
<distributionManagement>
|
<distributionManagement>
|
||||||
<site>
|
<site>
|
||||||
@@ -93,7 +93,6 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-dependency-plugin</artifactId>
|
<artifactId>maven-dependency-plugin</artifactId>
|
||||||
<version>2.8</version>
|
|
||||||
<executions>
|
<executions>
|
||||||
<execution>
|
<execution>
|
||||||
<phase>generate-resources</phase>
|
<phase>generate-resources</phase>
|
||||||
@@ -110,7 +109,6 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-jar-plugin</artifactId>
|
<artifactId>maven-jar-plugin</artifactId>
|
||||||
<version>2.4</version>
|
|
||||||
<executions>
|
<executions>
|
||||||
<execution>
|
<execution>
|
||||||
<id>jar</id>
|
<id>jar</id>
|
||||||
@@ -127,23 +125,13 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
</goals>
|
</goals>
|
||||||
</execution>
|
</execution>
|
||||||
</executions>
|
</executions>
|
||||||
<configuration>
|
|
||||||
<archive>
|
|
||||||
<manifest>
|
|
||||||
<addDefaultImplementationEntries>true</addDefaultImplementationEntries>
|
|
||||||
</manifest>
|
|
||||||
</archive>
|
|
||||||
<excludes>
|
|
||||||
<exclude>**/checkstyle*</exclude>
|
|
||||||
</excludes>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
</plugin>
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
<artifactId>cobertura-maven-plugin</artifactId>
|
<artifactId>cobertura-maven-plugin</artifactId>
|
||||||
<version>2.6</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<instrumentation>
|
<instrumentation>
|
||||||
|
<!--ignoreTrivial>true</ignoreTrivial-->
|
||||||
<ignores>
|
<ignores>
|
||||||
<ignore>.*\$KEYS\.class</ignore>
|
<ignore>.*\$KEYS\.class</ignore>
|
||||||
<ignore>.*\$Element\.class</ignore>
|
<ignore>.*\$Element\.class</ignore>
|
||||||
@@ -191,7 +179,6 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-surefire-plugin</artifactId>
|
<artifactId>maven-surefire-plugin</artifactId>
|
||||||
<version>2.16</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<systemProperties>
|
<systemProperties>
|
||||||
<property>
|
<property>
|
||||||
@@ -212,7 +199,6 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-failsafe-plugin</artifactId>
|
<artifactId>maven-failsafe-plugin</artifactId>
|
||||||
<version>2.16</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<systemProperties>
|
<systemProperties>
|
||||||
<property>
|
<property>
|
||||||
@@ -220,194 +206,183 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<value>${project.build.directory}/data</value>
|
<value>${project.build.directory}/data</value>
|
||||||
</property>
|
</property>
|
||||||
</systemProperties>
|
</systemProperties>
|
||||||
<includes>
|
|
||||||
<include>**/*IntegrationTest.java</include>
|
|
||||||
</includes>
|
|
||||||
</configuration>
|
|
||||||
<executions>
|
|
||||||
<execution>
|
|
||||||
<goals>
|
|
||||||
<goal>integration-test</goal>
|
|
||||||
<goal>verify</goal>
|
|
||||||
</goals>
|
|
||||||
</execution>
|
|
||||||
</executions>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-site-plugin</artifactId>
|
|
||||||
<version>3.3</version>
|
|
||||||
<dependencies>
|
|
||||||
<dependency>
|
|
||||||
<groupId>org.apache.maven.doxia</groupId>
|
|
||||||
<artifactId>doxia-module-markdown</artifactId>
|
|
||||||
<version>1.5</version>
|
|
||||||
</dependency>
|
|
||||||
</dependencies>
|
|
||||||
<configuration>
|
|
||||||
<skipDeploy>true</skipDeploy>
|
|
||||||
<reportPlugins>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-project-info-reports-plugin</artifactId>
|
|
||||||
<version>2.7</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>index</report>
|
|
||||||
<report>summary</report>
|
|
||||||
<report>license</report>
|
|
||||||
<report>help</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-javadoc-plugin</artifactId>
|
|
||||||
<version>2.9.1</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<id>default</id>
|
|
||||||
<reports>
|
|
||||||
<report>javadoc</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>versions-maven-plugin</artifactId>
|
|
||||||
<version>2.1</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>dependency-updates-report</report>
|
|
||||||
<report>plugin-updates-report</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-jxr-plugin</artifactId>
|
|
||||||
<version>2.4</version>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>cobertura-maven-plugin</artifactId>
|
|
||||||
<version>2.6</version>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-surefire-report-plugin</artifactId>
|
|
||||||
<version>2.16</version>
|
|
||||||
<reportSets>
|
|
||||||
<reportSet>
|
|
||||||
<reports>
|
|
||||||
<report>report-only</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
<reportSet>
|
|
||||||
<id>integration-tests</id>
|
|
||||||
<reports>
|
|
||||||
<report>report-only</report>
|
|
||||||
<report>failsafe-report-only</report>
|
|
||||||
</reports>
|
|
||||||
</reportSet>
|
|
||||||
</reportSets>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>taglist-maven-plugin</artifactId>
|
|
||||||
<version>2.4</version>
|
|
||||||
<configuration>
|
|
||||||
<tagListOptions>
|
|
||||||
<tagClasses>
|
|
||||||
<tagClass>
|
|
||||||
<displayName>Todo Work</displayName>
|
|
||||||
<tags>
|
|
||||||
<tag>
|
|
||||||
<matchString>todo</matchString>
|
|
||||||
<matchType>ignoreCase</matchType>
|
|
||||||
</tag>
|
|
||||||
<tag>
|
|
||||||
<matchString>FIXME</matchString>
|
|
||||||
<matchType>exact</matchType>
|
|
||||||
</tag>
|
|
||||||
</tags>
|
|
||||||
</tagClass>
|
|
||||||
</tagClasses>
|
|
||||||
</tagListOptions>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-checkstyle-plugin</artifactId>
|
|
||||||
<version>2.11</version>
|
|
||||||
<configuration>
|
|
||||||
<enableRulesSummary>false</enableRulesSummary>
|
|
||||||
<configLocation>${basedir}/config/checkstyle-checks.xml</configLocation>
|
|
||||||
<headerLocation>${basedir}/config/checkstyle-header.txt</headerLocation>
|
|
||||||
<suppressionsLocation>${basedir}/config/checkstyle-suppressions.xml</suppressionsLocation>
|
|
||||||
<suppressionsFileExpression>checkstyle.suppressions.file</suppressionsFileExpression>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
|
||||||
<artifactId>maven-pmd-plugin</artifactId>
|
|
||||||
<version>3.0.1</version>
|
|
||||||
<configuration>
|
|
||||||
<targetJdk>1.6</targetJdk>
|
|
||||||
<linkXref>true</linkXref>
|
|
||||||
<sourceEncoding>utf-8</sourceEncoding>
|
|
||||||
<excludes>
|
|
||||||
<exclude>**/generated/*.java</exclude>
|
|
||||||
</excludes>
|
|
||||||
</configuration>
|
|
||||||
</plugin>
|
|
||||||
<plugin>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>findbugs-maven-plugin</artifactId>
|
|
||||||
<version>2.5.3</version>
|
|
||||||
</plugin>
|
|
||||||
<dependency>
|
|
||||||
<groupId>org.codehaus.mojo</groupId>
|
|
||||||
<artifactId>javancss-maven-plugin</artifactId>
|
|
||||||
<version>2.0</version>
|
|
||||||
</dependency>
|
|
||||||
</reportPlugins>
|
|
||||||
</configuration>
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-compiler-plugin</artifactId>
|
<artifactId>maven-compiler-plugin</artifactId>
|
||||||
<version>3.1</version>
|
|
||||||
<configuration>
|
<configuration>
|
||||||
<showDeprecation>false</showDeprecation>
|
<compilerArgument>-Xlint:unchecked</compilerArgument>
|
||||||
<source>1.6</source>
|
|
||||||
<target>1.6</target>
|
|
||||||
</configuration>
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
</plugins>
|
</plugins>
|
||||||
</build>
|
</build>
|
||||||
|
<reporting>
|
||||||
|
<plugins>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-project-info-reports-plugin</artifactId>
|
||||||
|
<version>2.7</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>summary</report>
|
||||||
|
<report>license</report>
|
||||||
|
<report>help</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-javadoc-plugin</artifactId>
|
||||||
|
<version>2.9.1</version>
|
||||||
|
<configuration>
|
||||||
|
<failOnError>false</failOnError>
|
||||||
|
<bottom>Copyright© 2012-15 Jeremy Long. All Rights Reserved.</bottom>
|
||||||
|
</configuration>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<id>default</id>
|
||||||
|
<reports>
|
||||||
|
<report>javadoc</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>versions-maven-plugin</artifactId>
|
||||||
|
<version>2.1</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>dependency-updates-report</report>
|
||||||
|
<report>plugin-updates-report</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-jxr-plugin</artifactId>
|
||||||
|
<version>2.4</version>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>cobertura-maven-plugin</artifactId>
|
||||||
|
<version>2.6</version>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-surefire-report-plugin</artifactId>
|
||||||
|
<version>2.16</version>
|
||||||
|
<reportSets>
|
||||||
|
<reportSet>
|
||||||
|
<reports>
|
||||||
|
<report>report-only</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
<reportSet>
|
||||||
|
<id>integration-tests</id>
|
||||||
|
<reports>
|
||||||
|
<report>report-only</report>
|
||||||
|
<report>failsafe-report-only</report>
|
||||||
|
</reports>
|
||||||
|
</reportSet>
|
||||||
|
</reportSets>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>taglist-maven-plugin</artifactId>
|
||||||
|
<version>2.4</version>
|
||||||
|
<configuration>
|
||||||
|
<tagListOptions>
|
||||||
|
<tagClasses>
|
||||||
|
<tagClass>
|
||||||
|
<displayName>Todo Work</displayName>
|
||||||
|
<tags>
|
||||||
|
<tag>
|
||||||
|
<matchString>todo</matchString>
|
||||||
|
<matchType>ignoreCase</matchType>
|
||||||
|
</tag>
|
||||||
|
<tag>
|
||||||
|
<matchString>FIXME</matchString>
|
||||||
|
<matchType>exact</matchType>
|
||||||
|
</tag>
|
||||||
|
</tags>
|
||||||
|
</tagClass>
|
||||||
|
</tagClasses>
|
||||||
|
</tagListOptions>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-checkstyle-plugin</artifactId>
|
||||||
|
<version>2.11</version>
|
||||||
|
<configuration>
|
||||||
|
<enableRulesSummary>false</enableRulesSummary>
|
||||||
|
<enableFilesSummary>false</enableFilesSummary>
|
||||||
|
<configLocation>${basedir}/../src/main/config/checkstyle-checks.xml</configLocation>
|
||||||
|
<headerLocation>${basedir}/../src/main/config/checkstyle-header.txt</headerLocation>
|
||||||
|
<suppressionsLocation>${basedir}/../src/main/config/checkstyle-suppressions.xml</suppressionsLocation>
|
||||||
|
<suppressionsFileExpression>checkstyle.suppressions.file</suppressionsFileExpression>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
|
<artifactId>maven-pmd-plugin</artifactId>
|
||||||
|
<version>3.1</version>
|
||||||
|
<configuration>
|
||||||
|
<targetJdk>1.6</targetJdk>
|
||||||
|
<linkXref>true</linkXref>
|
||||||
|
<sourceEncoding>utf-8</sourceEncoding>
|
||||||
|
<excludes>
|
||||||
|
<exclude>**/generated/*.java</exclude>
|
||||||
|
</excludes>
|
||||||
|
<rulesets>
|
||||||
|
<ruleset>../src/main/config/dcrules.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/basic.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/imports.xml</ruleset>
|
||||||
|
<ruleset>/rulesets/java/unusedcode.xml</ruleset>
|
||||||
|
</rulesets>
|
||||||
|
</configuration>
|
||||||
|
</plugin>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.codehaus.mojo</groupId>
|
||||||
|
<artifactId>findbugs-maven-plugin</artifactId>
|
||||||
|
<version>2.5.3</version>
|
||||||
|
</plugin>
|
||||||
|
</plugins>
|
||||||
|
</reporting>
|
||||||
<dependencies>
|
<dependencies>
|
||||||
|
<!-- Note, to stay compatible with Jenkins installations only JARs compiled to 1.6 can be used -->
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.owasp</groupId>
|
||||||
|
<artifactId>dependency-check-utils</artifactId>
|
||||||
|
<version>${project.parent.version}</version>
|
||||||
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.lucene</groupId>
|
<groupId>org.apache.lucene</groupId>
|
||||||
<artifactId>lucene-test-framework</artifactId>
|
<artifactId>lucene-test-framework</artifactId>
|
||||||
<version>4.3.1</version>
|
<version>${apache.lucene.version}</version>
|
||||||
|
<scope>test</scope>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.jmockit</groupId>
|
||||||
|
<artifactId>jmockit</artifactId>
|
||||||
<scope>test</scope>
|
<scope>test</scope>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.google.code.findbugs</groupId>
|
<groupId>com.google.code.findbugs</groupId>
|
||||||
<artifactId>annotations</artifactId>
|
<artifactId>annotations</artifactId>
|
||||||
<version>2.0.1</version>
|
<version>3.0.0</version>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>commons-cli</groupId>
|
<groupId>org.apache.commons</groupId>
|
||||||
<artifactId>commons-cli</artifactId>
|
<artifactId>commons-compress</artifactId>
|
||||||
<version>1.2</version>
|
<version>1.9</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>commons-io</groupId>
|
<groupId>commons-io</groupId>
|
||||||
@@ -417,76 +392,32 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>commons-lang</groupId>
|
<groupId>commons-lang</groupId>
|
||||||
<artifactId>commons-lang</artifactId>
|
<artifactId>commons-lang</artifactId>
|
||||||
<version>2.5</version>
|
<version>2.6</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.lucene</groupId>
|
<groupId>org.apache.lucene</groupId>
|
||||||
<artifactId>lucene-core</artifactId>
|
<artifactId>lucene-core</artifactId>
|
||||||
<version>4.5.1</version>
|
<version>${apache.lucene.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.lucene</groupId>
|
<groupId>org.apache.lucene</groupId>
|
||||||
<artifactId>lucene-analyzers-common</artifactId>
|
<artifactId>lucene-analyzers-common</artifactId>
|
||||||
<version>4.5.1</version>
|
<version>${apache.lucene.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.lucene</groupId>
|
<groupId>org.apache.lucene</groupId>
|
||||||
<artifactId>lucene-queryparser</artifactId>
|
<artifactId>lucene-queryparser</artifactId>
|
||||||
<version>4.5.1</version>
|
<version>${apache.lucene.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.velocity</groupId>
|
<groupId>org.apache.velocity</groupId>
|
||||||
<artifactId>velocity</artifactId>
|
<artifactId>velocity</artifactId>
|
||||||
<version>1.7</version>
|
<version>1.7</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
|
||||||
<groupId>org.apache.velocity</groupId>
|
|
||||||
<artifactId>velocity-tools</artifactId>
|
|
||||||
<version>2.0</version>
|
|
||||||
<!-- very limited use of the velocity-tools, not all of the dependencies are needed-->
|
|
||||||
<exclusions>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>commons-chain</groupId>
|
|
||||||
<artifactId>commons-chain</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>javax.servlet</groupId>
|
|
||||||
<artifactId>servlet-api</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>commons-validator</groupId>
|
|
||||||
<artifactId>commons-validator</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>dom4j</groupId>
|
|
||||||
<artifactId>dom4j</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>sslext</groupId>
|
|
||||||
<artifactId>sslext</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>org.apache.struts</groupId>
|
|
||||||
<artifactId>struts-core</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>antlr</groupId>
|
|
||||||
<artifactId>antlr</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>org.apache.struts</groupId>
|
|
||||||
<artifactId>struts-taglib</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
<exclusion>
|
|
||||||
<groupId>org.apache.struts</groupId>
|
|
||||||
<artifactId>struts-tiles</artifactId>
|
|
||||||
</exclusion>
|
|
||||||
</exclusions>
|
|
||||||
</dependency>
|
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.h2database</groupId>
|
<groupId>com.h2database</groupId>
|
||||||
<artifactId>h2</artifactId>
|
<artifactId>h2</artifactId>
|
||||||
<version>1.3.172</version>
|
<version>1.3.176</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.jsoup</groupId>
|
<groupId>org.jsoup</groupId>
|
||||||
@@ -494,11 +425,6 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<version>1.7.2</version>
|
<version>1.7.2</version>
|
||||||
<type>jar</type>
|
<type>jar</type>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
|
||||||
<groupId>org.apache.commons</groupId>
|
|
||||||
<artifactId>commons-compress</artifactId>
|
|
||||||
<version>1.5</version>
|
|
||||||
</dependency>
|
|
||||||
<!-- The following dependencies are only used during testing -->
|
<!-- The following dependencies are only used during testing -->
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.maven.scm</groupId>
|
<groupId>org.apache.maven.scm</groupId>
|
||||||
@@ -514,6 +440,13 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<scope>provided</scope>
|
<scope>provided</scope>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.security</groupId>
|
||||||
|
<artifactId>spring-security-web</artifactId>
|
||||||
|
<version>3.0.0.RELEASE</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.hazelcast</groupId>
|
<groupId>com.hazelcast</groupId>
|
||||||
<artifactId>hazelcast</artifactId>
|
<artifactId>hazelcast</artifactId>
|
||||||
@@ -580,6 +513,39 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<scope>provided</scope>
|
<scope>provided</scope>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.apache.openjpa</groupId>
|
||||||
|
<artifactId>openjpa</artifactId>
|
||||||
|
<version>2.0.1</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.google.inject</groupId>
|
||||||
|
<artifactId>guice</artifactId>
|
||||||
|
<version>3.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.retry</groupId>
|
||||||
|
<artifactId>spring-retry</artifactId>
|
||||||
|
<version>1.1.0.RELEASE</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>uk.ltd.getahead</groupId>
|
||||||
|
<artifactId>dwr</artifactId>
|
||||||
|
<version>1.1.1</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.sun.mail</groupId>
|
||||||
|
<artifactId>mailapi</artifactId>
|
||||||
|
<version>1.5.2</version>
|
||||||
|
</dependency>
|
||||||
</dependencies>
|
</dependencies>
|
||||||
<profiles>
|
<profiles>
|
||||||
<profile>
|
<profile>
|
||||||
@@ -595,7 +561,7 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-surefire-plugin</artifactId>
|
<artifactId>maven-surefire-plugin</artifactId>
|
||||||
<version>2.16</version>
|
<version>2.18.1</version>
|
||||||
<configuration>
|
<configuration>
|
||||||
<skip>true</skip>
|
<skip>true</skip>
|
||||||
</configuration>
|
</configuration>
|
||||||
@@ -603,7 +569,7 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-failsafe-plugin</artifactId>
|
<artifactId>maven-failsafe-plugin</artifactId>
|
||||||
<version>2.16</version>
|
<version>2.18.1</version>
|
||||||
<configuration>
|
<configuration>
|
||||||
<systemProperties>
|
<systemProperties>
|
||||||
<property>
|
<property>
|
||||||
@@ -635,5 +601,174 @@ Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|||||||
</plugins>
|
</plugins>
|
||||||
</build>
|
</build>
|
||||||
</profile>
|
</profile>
|
||||||
|
<profile>
|
||||||
|
<!-- The following profile adds additional
|
||||||
|
dependencies that are only used during testing.
|
||||||
|
Additionally, these are only added when using "allTests" to
|
||||||
|
make the build slightly faster in most cases. -->
|
||||||
|
<id>False Positive Tests</id>
|
||||||
|
<activation>
|
||||||
|
<property>
|
||||||
|
<name>allTests</name>
|
||||||
|
</property>
|
||||||
|
</activation>
|
||||||
|
<dependencies>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.apache.xmlgraphics</groupId>
|
||||||
|
<artifactId>batik-util</artifactId>
|
||||||
|
<version>1.7</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.thoughtworks.xstream</groupId>
|
||||||
|
<artifactId>xstream</artifactId>
|
||||||
|
<version>1.4.2</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.apache.ws.security</groupId>
|
||||||
|
<artifactId>wss4j</artifactId>
|
||||||
|
<version>1.5.7</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.ganyo</groupId>
|
||||||
|
<artifactId>gcm-server</artifactId>
|
||||||
|
<version>1.0.2</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.python</groupId>
|
||||||
|
<artifactId>jython-standalone</artifactId>
|
||||||
|
<version>2.7-b1</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.jruby</groupId>
|
||||||
|
<artifactId>jruby-complete</artifactId>
|
||||||
|
<version>1.7.4</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.jruby</groupId>
|
||||||
|
<artifactId>jruby</artifactId>
|
||||||
|
<version>1.6.3</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.glassfish.jersey.core</groupId>
|
||||||
|
<artifactId>jersey-client</artifactId>
|
||||||
|
<version>2.12</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.sun.jersey</groupId>
|
||||||
|
<artifactId>jersey-client</artifactId>
|
||||||
|
<version>1.11.1</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.sun.faces</groupId>
|
||||||
|
<artifactId>jsf-impl</artifactId>
|
||||||
|
<version>2.2.8-02</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.google.inject</groupId>
|
||||||
|
<artifactId>guice</artifactId>
|
||||||
|
<version>3.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.opensaml</groupId>
|
||||||
|
<artifactId>xmltooling</artifactId>
|
||||||
|
<version>1.4.1</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework</groupId>
|
||||||
|
<artifactId>spring-webmvc</artifactId>
|
||||||
|
<version>3.2.12.RELEASE</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.google.code.gson</groupId>
|
||||||
|
<artifactId>gson</artifactId>
|
||||||
|
<version>2.3.1</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.google.gerrit</groupId>
|
||||||
|
<artifactId>gerrit-extension-api</artifactId>
|
||||||
|
<version>2.11</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.google.apis</groupId>
|
||||||
|
<artifactId>google-api-services-sqladmin</artifactId>
|
||||||
|
<version>v1beta4-rev5-1.20.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.google.gwt.google-apis</groupId>
|
||||||
|
<artifactId>gwt-gears</artifactId>
|
||||||
|
<version>1.2.1</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.mozilla</groupId>
|
||||||
|
<artifactId>rhino</artifactId>
|
||||||
|
<version>1.7.6</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
|
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.microsoft.windowsazure</groupId>
|
||||||
|
<artifactId>microsoft-azure-api-media</artifactId>
|
||||||
|
<version>0.5.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.microsoft.windowsazure</groupId>
|
||||||
|
<artifactId>microsoft-azure-api-management-sql</artifactId>
|
||||||
|
<version>0.5.0</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>com.microsoft.bingads</groupId>
|
||||||
|
<artifactId>microsoft.bingads</artifactId>
|
||||||
|
<version>9.3.4</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
<optional>true</optional>
|
||||||
|
</dependency>
|
||||||
|
</dependencies>
|
||||||
|
</profile>
|
||||||
</profiles>
|
</profiles>
|
||||||
|
<properties>
|
||||||
|
<!-- new versions of lucene are compiled with JDK 1.7 and cannot be used ubiquitously in Jenkins
|
||||||
|
this, we cannot upgrade beyond 4.7.2 -->
|
||||||
|
<apache.lucene.version>4.7.2</apache.lucene.version>
|
||||||
|
</properties>
|
||||||
</project>
|
</project>
|
||||||
|
|||||||
@@ -26,12 +26,12 @@ import java.util.List;
|
|||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
import org.owasp.dependencycheck.analyzer.AnalysisException;
|
|
||||||
import org.owasp.dependencycheck.analyzer.AnalysisPhase;
|
import org.owasp.dependencycheck.analyzer.AnalysisPhase;
|
||||||
import org.owasp.dependencycheck.analyzer.Analyzer;
|
import org.owasp.dependencycheck.analyzer.Analyzer;
|
||||||
import org.owasp.dependencycheck.analyzer.AnalyzerService;
|
import org.owasp.dependencycheck.analyzer.AnalyzerService;
|
||||||
import org.owasp.dependencycheck.data.cpe.CpeMemoryIndex;
|
import org.owasp.dependencycheck.analyzer.FileTypeAnalyzer;
|
||||||
import org.owasp.dependencycheck.data.cpe.IndexException;
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.data.nvdcve.ConnectionFactory;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.DatabaseException;
|
import org.owasp.dependencycheck.data.nvdcve.DatabaseException;
|
||||||
import org.owasp.dependencycheck.data.update.CachedWebDataSource;
|
import org.owasp.dependencycheck.data.update.CachedWebDataSource;
|
||||||
@@ -44,63 +44,91 @@ import org.owasp.dependencycheck.utils.InvalidSettingException;
|
|||||||
import org.owasp.dependencycheck.utils.Settings;
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Scans files, directories, etc. for Dependencies. Analyzers are loaded and used to process the files found by the
|
* Scans files, directories, etc. for Dependencies. Analyzers are loaded and used to process the files found by the scan, if a
|
||||||
* scan, if a file is encountered and an Analyzer is associated with the file type then the file is turned into a
|
* file is encountered and an Analyzer is associated with the file type then the file is turned into a dependency.
|
||||||
* dependency.
|
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class Engine {
|
public class Engine {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The list of dependencies.
|
* The list of dependencies.
|
||||||
*/
|
*/
|
||||||
private final List<Dependency> dependencies;
|
private List<Dependency> dependencies = new ArrayList<Dependency>();
|
||||||
/**
|
/**
|
||||||
* A Map of analyzers grouped by Analysis phase.
|
* A Map of analyzers grouped by Analysis phase.
|
||||||
*/
|
*/
|
||||||
private final EnumMap<AnalysisPhase, List<Analyzer>> analyzers;
|
private EnumMap<AnalysisPhase, List<Analyzer>> analyzers = new EnumMap<AnalysisPhase, List<Analyzer>>(AnalysisPhase.class);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A set of extensions supported by the analyzers.
|
* A Map of analyzers grouped by Analysis phase.
|
||||||
*/
|
*/
|
||||||
private final Set<String> extensions;
|
private Set<FileTypeAnalyzer> fileTypeAnalyzers = new HashSet<FileTypeAnalyzer>();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The ClassLoader to use when dynamically loading Analyzer and Update services.
|
||||||
|
*/
|
||||||
|
private ClassLoader serviceClassLoader = Thread.currentThread().getContextClassLoader();
|
||||||
|
/**
|
||||||
|
* The Logger for use throughout the class.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(Engine.class.getName());
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a new Engine.
|
* Creates a new Engine.
|
||||||
|
*
|
||||||
|
* @throws DatabaseException thrown if there is an error connecting to the database
|
||||||
*/
|
*/
|
||||||
public Engine() {
|
public Engine() throws DatabaseException {
|
||||||
this.extensions = new HashSet<String>();
|
initializeEngine();
|
||||||
this.dependencies = new ArrayList<Dependency>();
|
}
|
||||||
this.analyzers = new EnumMap<AnalysisPhase, List<Analyzer>>(AnalysisPhase.class);
|
|
||||||
|
|
||||||
boolean autoUpdate = true;
|
/**
|
||||||
try {
|
* Creates a new Engine.
|
||||||
autoUpdate = Settings.getBoolean(Settings.KEYS.AUTO_UPDATE);
|
*
|
||||||
} catch (InvalidSettingException ex) {
|
* @param serviceClassLoader a reference the class loader being used
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, "Invalid setting for auto-update; using true.");
|
* @throws DatabaseException thrown if there is an error connecting to the database
|
||||||
}
|
*/
|
||||||
if (autoUpdate) {
|
public Engine(ClassLoader serviceClassLoader) throws DatabaseException {
|
||||||
doUpdates();
|
this.serviceClassLoader = serviceClassLoader;
|
||||||
}
|
initializeEngine();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a new Engine using the specified classloader to dynamically load Analyzer and Update services.
|
||||||
|
*
|
||||||
|
* @throws DatabaseException thrown if there is an error connecting to the database
|
||||||
|
*/
|
||||||
|
protected final void initializeEngine() throws DatabaseException {
|
||||||
|
ConnectionFactory.initialize();
|
||||||
loadAnalyzers();
|
loadAnalyzers();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Properly cleans up resources allocated during analysis.
|
||||||
|
*/
|
||||||
|
public void cleanup() {
|
||||||
|
ConnectionFactory.cleanup();
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Loads the analyzers specified in the configuration file (or system properties).
|
* Loads the analyzers specified in the configuration file (or system properties).
|
||||||
*/
|
*/
|
||||||
private void loadAnalyzers() {
|
private void loadAnalyzers() {
|
||||||
|
if (!analyzers.isEmpty()) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
||||||
analyzers.put(phase, new ArrayList<Analyzer>());
|
analyzers.put(phase, new ArrayList<Analyzer>());
|
||||||
}
|
}
|
||||||
|
|
||||||
final AnalyzerService service = AnalyzerService.getInstance();
|
final AnalyzerService service = new AnalyzerService(serviceClassLoader);
|
||||||
final Iterator<Analyzer> iterator = service.getAnalyzers();
|
final Iterator<Analyzer> iterator = service.getAnalyzers();
|
||||||
while (iterator.hasNext()) {
|
while (iterator.hasNext()) {
|
||||||
final Analyzer a = iterator.next();
|
final Analyzer a = iterator.next();
|
||||||
analyzers.get(a.getAnalysisPhase()).add(a);
|
analyzers.get(a.getAnalysisPhase()).add(a);
|
||||||
if (a.getSupportedExtensions() != null) {
|
if (a instanceof FileTypeAnalyzer) {
|
||||||
extensions.addAll(a.getSupportedExtensions());
|
this.fileTypeAnalyzers.add((FileTypeAnalyzer) a);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -125,150 +153,212 @@ public class Engine {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Scans an array of files or directories. If a directory is specified, it will be scanned recursively. Any
|
* Sets the dependencies.
|
||||||
* dependencies identified are added to the dependency collection.
|
*
|
||||||
|
* @param dependencies the dependencies
|
||||||
|
*/
|
||||||
|
public void setDependencies(List<Dependency> dependencies) {
|
||||||
|
this.dependencies = dependencies;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Scans an array of files or directories. If a directory is specified, it will be scanned recursively. Any dependencies
|
||||||
|
* identified are added to the dependency collection.
|
||||||
|
*
|
||||||
|
* @param paths an array of paths to files or directories to be analyzed
|
||||||
|
* @return the list of dependencies scanned
|
||||||
*
|
*
|
||||||
* @since v0.3.2.5
|
* @since v0.3.2.5
|
||||||
*
|
|
||||||
* @param paths an array of paths to files or directories to be analyzed.
|
|
||||||
*/
|
*/
|
||||||
public void scan(String[] paths) {
|
public List<Dependency> scan(String[] paths) {
|
||||||
|
final List<Dependency> deps = new ArrayList<Dependency>();
|
||||||
for (String path : paths) {
|
for (String path : paths) {
|
||||||
final File file = new File(path);
|
final File file = new File(path);
|
||||||
scan(file);
|
final List<Dependency> d = scan(file);
|
||||||
|
if (d != null) {
|
||||||
|
deps.addAll(d);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
return deps;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Scans a given file or directory. If a directory is specified, it will be scanned recursively. Any dependencies
|
* Scans a given file or directory. If a directory is specified, it will be scanned recursively. Any dependencies identified
|
||||||
* identified are added to the dependency collection.
|
* are added to the dependency collection.
|
||||||
*
|
*
|
||||||
* @param path the path to a file or directory to be analyzed.
|
* @param path the path to a file or directory to be analyzed
|
||||||
|
* @return the list of dependencies scanned
|
||||||
*/
|
*/
|
||||||
public void scan(String path) {
|
public List<Dependency> scan(String path) {
|
||||||
final File file = new File(path);
|
final File file = new File(path);
|
||||||
scan(file);
|
return scan(file);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Scans an array of files or directories. If a directory is specified, it will be scanned recursively. Any
|
* Scans an array of files or directories. If a directory is specified, it will be scanned recursively. Any dependencies
|
||||||
* dependencies identified are added to the dependency collection.
|
* identified are added to the dependency collection.
|
||||||
*
|
|
||||||
* @since v0.3.2.5
|
|
||||||
*
|
*
|
||||||
* @param files an array of paths to files or directories to be analyzed.
|
* @param files an array of paths to files or directories to be analyzed.
|
||||||
*/
|
* @return the list of dependencies
|
||||||
public void scan(File[] files) {
|
|
||||||
for (File file : files) {
|
|
||||||
scan(file);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Scans a list of files or directories. If a directory is specified, it will be scanned recursively. Any
|
|
||||||
* dependencies identified are added to the dependency collection.
|
|
||||||
*
|
*
|
||||||
* @since v0.3.2.5
|
* @since v0.3.2.5
|
||||||
*
|
|
||||||
* @param files a set of paths to files or directories to be analyzed.
|
|
||||||
*/
|
*/
|
||||||
public void scan(Set<File> files) {
|
public List<Dependency> scan(File[] files) {
|
||||||
|
final List<Dependency> deps = new ArrayList<Dependency>();
|
||||||
for (File file : files) {
|
for (File file : files) {
|
||||||
scan(file);
|
final List<Dependency> d = scan(file);
|
||||||
|
if (d != null) {
|
||||||
|
deps.addAll(d);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
return deps;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Scans a list of files or directories. If a directory is specified, it will be scanned recursively. Any
|
* Scans a list of files or directories. If a directory is specified, it will be scanned recursively. Any dependencies
|
||||||
* dependencies identified are added to the dependency collection.
|
|
||||||
*
|
|
||||||
* @since v0.3.2.5
|
|
||||||
*
|
|
||||||
* @param files a set of paths to files or directories to be analyzed.
|
|
||||||
*/
|
|
||||||
public void scan(List<File> files) {
|
|
||||||
for (File file : files) {
|
|
||||||
scan(file);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Scans a given file or directory. If a directory is specified, it will be scanned recursively. Any dependencies
|
|
||||||
* identified are added to the dependency collection.
|
* identified are added to the dependency collection.
|
||||||
*
|
*
|
||||||
|
* @param files a set of paths to files or directories to be analyzed
|
||||||
|
* @return the list of dependencies scanned
|
||||||
|
*
|
||||||
|
* @since v0.3.2.5
|
||||||
|
*/
|
||||||
|
public List<Dependency> scan(Set<File> files) {
|
||||||
|
final List<Dependency> deps = new ArrayList<Dependency>();
|
||||||
|
for (File file : files) {
|
||||||
|
final List<Dependency> d = scan(file);
|
||||||
|
if (d != null) {
|
||||||
|
deps.addAll(d);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return deps;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Scans a list of files or directories. If a directory is specified, it will be scanned recursively. Any dependencies
|
||||||
|
* identified are added to the dependency collection.
|
||||||
|
*
|
||||||
|
* @param files a set of paths to files or directories to be analyzed
|
||||||
|
* @return the list of dependencies scanned
|
||||||
|
*
|
||||||
|
* @since v0.3.2.5
|
||||||
|
*/
|
||||||
|
public List<Dependency> scan(List<File> files) {
|
||||||
|
final List<Dependency> deps = new ArrayList<Dependency>();
|
||||||
|
for (File file : files) {
|
||||||
|
final List<Dependency> d = scan(file);
|
||||||
|
if (d != null) {
|
||||||
|
deps.addAll(d);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return deps;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Scans a given file or directory. If a directory is specified, it will be scanned recursively. Any dependencies identified
|
||||||
|
* are added to the dependency collection.
|
||||||
|
*
|
||||||
|
* @param file the path to a file or directory to be analyzed
|
||||||
|
* @return the list of dependencies scanned
|
||||||
|
*
|
||||||
* @since v0.3.2.4
|
* @since v0.3.2.4
|
||||||
*
|
*
|
||||||
* @param file the path to a file or directory to be analyzed.
|
|
||||||
*/
|
*/
|
||||||
public void scan(File file) {
|
public List<Dependency> scan(File file) {
|
||||||
if (file.exists()) {
|
if (file.exists()) {
|
||||||
if (file.isDirectory()) {
|
if (file.isDirectory()) {
|
||||||
scanDirectory(file);
|
return scanDirectory(file);
|
||||||
} else {
|
} else {
|
||||||
scanFile(file);
|
final Dependency d = scanFile(file);
|
||||||
|
if (d != null) {
|
||||||
|
final List<Dependency> deps = new ArrayList<Dependency>();
|
||||||
|
deps.add(d);
|
||||||
|
return deps;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Recursively scans files and directories. Any dependencies identified are added to the dependency collection.
|
* Recursively scans files and directories. Any dependencies identified are added to the dependency collection.
|
||||||
*
|
*
|
||||||
* @param dir the directory to scan.
|
* @param dir the directory to scan
|
||||||
|
* @return the list of Dependency objects scanned
|
||||||
*/
|
*/
|
||||||
protected void scanDirectory(File dir) {
|
protected List<Dependency> scanDirectory(File dir) {
|
||||||
final File[] files = dir.listFiles();
|
final File[] files = dir.listFiles();
|
||||||
|
final List<Dependency> deps = new ArrayList<Dependency>();
|
||||||
if (files != null) {
|
if (files != null) {
|
||||||
for (File f : files) {
|
for (File f : files) {
|
||||||
if (f.isDirectory()) {
|
if (f.isDirectory()) {
|
||||||
scanDirectory(f);
|
final List<Dependency> d = scanDirectory(f);
|
||||||
|
if (d != null) {
|
||||||
|
deps.addAll(d);
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
scanFile(f);
|
final Dependency d = scanFile(f);
|
||||||
|
deps.add(d);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
return deps;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Scans a specified file. If a dependency is identified it is added to the dependency collection.
|
* Scans a specified file. If a dependency is identified it is added to the dependency collection.
|
||||||
*
|
*
|
||||||
* @param file The file to scan.
|
* @param file The file to scan
|
||||||
|
* @return the scanned dependency
|
||||||
*/
|
*/
|
||||||
protected void scanFile(File file) {
|
protected Dependency scanFile(File file) {
|
||||||
if (!file.isFile()) {
|
if (!file.isFile()) {
|
||||||
final String msg = String.format("Path passed to scanFile(File) is not a file: %s. Skipping the file.", file.toString());
|
final String msg = String.format("Path passed to scanFile(File) is not a file: %s. Skipping the file.", file.toString());
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, msg);
|
LOGGER.log(Level.FINE, msg);
|
||||||
return;
|
return null;
|
||||||
}
|
}
|
||||||
final String fileName = file.getName();
|
final String fileName = file.getName();
|
||||||
final String extension = FileUtils.getFileExtension(fileName);
|
String extension = FileUtils.getFileExtension(fileName);
|
||||||
if (extension != null) {
|
if (null == extension) {
|
||||||
if (extensions.contains(extension)) {
|
extension = fileName;
|
||||||
final Dependency dependency = new Dependency(file);
|
|
||||||
dependencies.add(dependency);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
final String msg = String.format("No file extension found on file '%s'. The file was not analyzed.",
|
|
||||||
file.toString());
|
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINEST, msg);
|
|
||||||
}
|
}
|
||||||
|
Dependency dependency = null;
|
||||||
|
if (supportsExtension(extension)) {
|
||||||
|
dependency = new Dependency(file);
|
||||||
|
if (extension == null ? fileName == null : extension.equals(fileName)) {
|
||||||
|
dependency.setFileExtension(extension);
|
||||||
|
}
|
||||||
|
dependencies.add(dependency);
|
||||||
|
}
|
||||||
|
return dependency;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Runs the analyzers against all of the dependencies.
|
* Runs the analyzers against all of the dependencies.
|
||||||
*/
|
*/
|
||||||
public void analyzeDependencies() {
|
public void analyzeDependencies() {
|
||||||
|
boolean autoUpdate = true;
|
||||||
|
try {
|
||||||
|
autoUpdate = Settings.getBoolean(Settings.KEYS.AUTO_UPDATE);
|
||||||
|
} catch (InvalidSettingException ex) {
|
||||||
|
LOGGER.log(Level.FINE, "Invalid setting for auto-update; using true.");
|
||||||
|
}
|
||||||
|
if (autoUpdate) {
|
||||||
|
doUpdates();
|
||||||
|
}
|
||||||
|
|
||||||
//need to ensure that data exists
|
//need to ensure that data exists
|
||||||
try {
|
try {
|
||||||
ensureDataExists();
|
ensureDataExists();
|
||||||
} catch (NoDataException ex) {
|
} catch (NoDataException ex) {
|
||||||
final String msg = String.format("%s%n%nUnable to continue dependency-check analysis.", ex.getMessage());
|
final String msg = String.format("%s%n%nUnable to continue dependency-check analysis.", ex.getMessage());
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
return;
|
return;
|
||||||
} catch (DatabaseException ex) {
|
} catch (DatabaseException ex) {
|
||||||
final String msg = String.format("%s%n%nUnable to continue dependency-check analysis.", ex.getMessage());
|
final String msg = String.format("%s%n%nUnable to continue dependency-check analysis.", ex.getMessage());
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
return;
|
return;
|
||||||
|
|
||||||
}
|
}
|
||||||
@@ -277,74 +367,54 @@ public class Engine {
|
|||||||
+ "----------------------------------------------------%n"
|
+ "----------------------------------------------------%n"
|
||||||
+ "BEGIN ANALYSIS%n"
|
+ "BEGIN ANALYSIS%n"
|
||||||
+ "----------------------------------------------------");
|
+ "----------------------------------------------------");
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, logHeader);
|
LOGGER.log(Level.FINE, logHeader);
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.INFO, "Analysis Starting");
|
LOGGER.log(Level.INFO, "Analysis Starting");
|
||||||
|
|
||||||
//phase one initialize
|
|
||||||
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
|
||||||
final List<Analyzer> analyzerList = analyzers.get(phase);
|
|
||||||
for (Analyzer a : analyzerList) {
|
|
||||||
try {
|
|
||||||
final String msg = String.format("Initializing %s", a.getName());
|
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, msg);
|
|
||||||
a.initialize();
|
|
||||||
} catch (Exception ex) {
|
|
||||||
final String msg = String.format("Exception occurred initializing %s.", a.getName());
|
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.SEVERE, msg);
|
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.INFO, null, ex);
|
|
||||||
try {
|
|
||||||
a.close();
|
|
||||||
} catch (Exception ex1) {
|
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINEST, null, ex1);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// analysis phases
|
// analysis phases
|
||||||
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
||||||
final List<Analyzer> analyzerList = analyzers.get(phase);
|
final List<Analyzer> analyzerList = analyzers.get(phase);
|
||||||
|
|
||||||
for (Analyzer a : analyzerList) {
|
for (Analyzer a : analyzerList) {
|
||||||
|
a = initializeAnalyzer(a);
|
||||||
|
|
||||||
/* need to create a copy of the collection because some of the
|
/* need to create a copy of the collection because some of the
|
||||||
* analyzers may modify it. This prevents ConcurrentModificationExceptions.
|
* analyzers may modify it. This prevents ConcurrentModificationExceptions.
|
||||||
* This is okay for adds/deletes because it happens per analyzer.
|
* This is okay for adds/deletes because it happens per analyzer.
|
||||||
*/
|
*/
|
||||||
final String msg = String.format("Begin Analyzer '%s'", a.getName());
|
final String msg = String.format("Begin Analyzer '%s'", a.getName());
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, msg);
|
LOGGER.log(Level.FINE, msg);
|
||||||
final Set<Dependency> dependencySet = new HashSet<Dependency>();
|
final Set<Dependency> dependencySet = new HashSet<Dependency>();
|
||||||
dependencySet.addAll(dependencies);
|
dependencySet.addAll(dependencies);
|
||||||
for (Dependency d : dependencySet) {
|
for (Dependency d : dependencySet) {
|
||||||
if (a.supportsExtension(d.getFileExtension())) {
|
boolean shouldAnalyze = true;
|
||||||
|
if (a instanceof FileTypeAnalyzer) {
|
||||||
|
final FileTypeAnalyzer fAnalyzer = (FileTypeAnalyzer) a;
|
||||||
|
shouldAnalyze = fAnalyzer.supportsExtension(d.getFileExtension());
|
||||||
|
}
|
||||||
|
if (shouldAnalyze) {
|
||||||
final String msgFile = String.format("Begin Analysis of '%s'", d.getActualFilePath());
|
final String msgFile = String.format("Begin Analysis of '%s'", d.getActualFilePath());
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, msgFile);
|
LOGGER.log(Level.FINE, msgFile);
|
||||||
try {
|
try {
|
||||||
a.analyze(d, this);
|
a.analyze(d, this);
|
||||||
} catch (AnalysisException ex) {
|
} catch (AnalysisException ex) {
|
||||||
d.addAnalysisException(ex);
|
final String exMsg = String.format("An error occurred while analyzing '%s'.", d.getActualFilePath());
|
||||||
|
LOGGER.log(Level.WARNING, exMsg);
|
||||||
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
} catch (Throwable ex) {
|
} catch (Throwable ex) {
|
||||||
final String axMsg = String.format("An unexpected error occurred during analysis of '%s'", d.getActualFilePath());
|
final String axMsg = String.format("An unexpected error occurred during analysis of '%s'", d.getActualFilePath());
|
||||||
final AnalysisException ax = new AnalysisException(axMsg, ex);
|
//final AnalysisException ax = new AnalysisException(axMsg, ex);
|
||||||
d.addAnalysisException(ax);
|
LOGGER.log(Level.WARNING, axMsg);
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.SEVERE, axMsg);
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, axMsg, ex);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
//close/cleanup
|
|
||||||
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
||||||
final List<Analyzer> analyzerList = analyzers.get(phase);
|
final List<Analyzer> analyzerList = analyzers.get(phase);
|
||||||
|
|
||||||
for (Analyzer a : analyzerList) {
|
for (Analyzer a : analyzerList) {
|
||||||
final String msg = String.format("Closing Analyzer '%s'", a.getName());
|
closeAnalyzer(a);
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, msg);
|
|
||||||
try {
|
|
||||||
a.close();
|
|
||||||
} catch (Exception ex) {
|
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINEST, null, ex);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -352,27 +422,67 @@ public class Engine {
|
|||||||
+ "----------------------------------------------------%n"
|
+ "----------------------------------------------------%n"
|
||||||
+ "END ANALYSIS%n"
|
+ "END ANALYSIS%n"
|
||||||
+ "----------------------------------------------------");
|
+ "----------------------------------------------------");
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE, logFooter);
|
LOGGER.log(Level.FINE, logFooter);
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.INFO, "Analysis Complete");
|
LOGGER.log(Level.INFO, "Analysis Complete");
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes the given analyzer.
|
||||||
|
*
|
||||||
|
* @param analyzer the analyzer to initialize
|
||||||
|
* @return the initialized analyzer
|
||||||
|
*/
|
||||||
|
protected Analyzer initializeAnalyzer(Analyzer analyzer) {
|
||||||
|
try {
|
||||||
|
final String msg = String.format("Initializing %s", analyzer.getName());
|
||||||
|
LOGGER.log(Level.FINE, msg);
|
||||||
|
analyzer.initialize();
|
||||||
|
} catch (Throwable ex) {
|
||||||
|
final String msg = String.format("Exception occurred initializing %s.", analyzer.getName());
|
||||||
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
|
try {
|
||||||
|
analyzer.close();
|
||||||
|
} catch (Throwable ex1) {
|
||||||
|
LOGGER.log(Level.FINEST, null, ex1);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return analyzer;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Closes the given analyzer.
|
||||||
|
*
|
||||||
|
* @param analyzer the analyzer to close
|
||||||
|
*/
|
||||||
|
protected void closeAnalyzer(Analyzer analyzer) {
|
||||||
|
final String msg = String.format("Closing Analyzer '%s'", analyzer.getName());
|
||||||
|
LOGGER.log(Level.FINE, msg);
|
||||||
|
try {
|
||||||
|
analyzer.close();
|
||||||
|
} catch (Throwable ex) {
|
||||||
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Cycles through the cached web data sources and calls update on all of them.
|
* Cycles through the cached web data sources and calls update on all of them.
|
||||||
*/
|
*/
|
||||||
private void doUpdates() {
|
public void doUpdates() {
|
||||||
final UpdateService service = UpdateService.getInstance();
|
LOGGER.info("Checking for updates");
|
||||||
|
final UpdateService service = new UpdateService(serviceClassLoader);
|
||||||
final Iterator<CachedWebDataSource> iterator = service.getDataSources();
|
final Iterator<CachedWebDataSource> iterator = service.getDataSources();
|
||||||
while (iterator.hasNext()) {
|
while (iterator.hasNext()) {
|
||||||
final CachedWebDataSource source = iterator.next();
|
final CachedWebDataSource source = iterator.next();
|
||||||
try {
|
try {
|
||||||
source.update();
|
source.update();
|
||||||
} catch (UpdateException ex) {
|
} catch (UpdateException ex) {
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.WARNING,
|
LOGGER.log(Level.WARNING,
|
||||||
"Unable to update Cached Web DataSource, using local data instead. Results may not include recent vulnerabilities.");
|
"Unable to update Cached Web DataSource, using local data instead. Results may not include recent vulnerabilities.");
|
||||||
Logger.getLogger(Engine.class.getName()).log(Level.FINE,
|
LOGGER.log(Level.FINE, String.format("Unable to update details for %s", source.getClass().getName()), ex);
|
||||||
String.format("Unable to update details for %s", source.getClass().getName()), ex);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
LOGGER.info("Check for updates complete");
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -399,15 +509,22 @@ public class Engine {
|
|||||||
if (ext == null) {
|
if (ext == null) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
for (AnalysisPhase phase : AnalysisPhase.values()) {
|
boolean scan = false;
|
||||||
final List<Analyzer> analyzerList = analyzers.get(phase);
|
for (FileTypeAnalyzer a : this.fileTypeAnalyzers) {
|
||||||
for (Analyzer a : analyzerList) {
|
/* note, we can't break early on this loop as the analyzers need to know if
|
||||||
if (a.getSupportedExtensions() != null && a.supportsExtension(ext)) {
|
they have files to work on prior to initialization */
|
||||||
return true;
|
scan |= a.supportsExtension(ext);
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return false;
|
return scan;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the set of file type analyzers.
|
||||||
|
*
|
||||||
|
* @return the set of file type analyzers
|
||||||
|
*/
|
||||||
|
public Set<FileTypeAnalyzer> getFileTypeAnalyzers() {
|
||||||
|
return this.fileTypeAnalyzers;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -417,22 +534,16 @@ public class Engine {
|
|||||||
* @throws DatabaseException thrown if there is an exception opening the database
|
* @throws DatabaseException thrown if there is an exception opening the database
|
||||||
*/
|
*/
|
||||||
private void ensureDataExists() throws NoDataException, DatabaseException {
|
private void ensureDataExists() throws NoDataException, DatabaseException {
|
||||||
final CpeMemoryIndex cpe = CpeMemoryIndex.getInstance();
|
|
||||||
final CveDB cve = new CveDB();
|
final CveDB cve = new CveDB();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
cve.open();
|
cve.open();
|
||||||
cpe.open(cve);
|
if (!cve.dataExists()) {
|
||||||
} catch (IndexException ex) {
|
throw new NoDataException("No documents exist");
|
||||||
throw new NoDataException(ex.getMessage(), ex);
|
}
|
||||||
} catch (DatabaseException ex) {
|
} catch (DatabaseException ex) {
|
||||||
throw new NoDataException(ex.getMessage(), ex);
|
throw new NoDataException(ex.getMessage(), ex);
|
||||||
} finally {
|
} finally {
|
||||||
cve.close();
|
cve.close();
|
||||||
}
|
}
|
||||||
if (cpe.numDocs() <= 0) {
|
|
||||||
cpe.close();
|
|
||||||
throw new NoDataException("No documents exist");
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@@ -0,0 +1,6 @@
|
|||||||
|
/**
|
||||||
|
* The agent package holds an agent API that can be used by other applications that have information about dependencies; but would
|
||||||
|
* rather implement something in their code directly rather then spawn a process to run the entire dependency-check engine. This
|
||||||
|
* basically provides programmatic access to running a scan.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.agent;
|
||||||
@@ -17,33 +17,12 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public abstract class AbstractAnalyzer implements Analyzer {
|
public abstract class AbstractAnalyzer implements Analyzer {
|
||||||
|
|
||||||
/**
|
|
||||||
* Utility method to help in the creation of the extensions set. This constructs a new Set that can be used in a
|
|
||||||
* final static declaration.<br/><br/>
|
|
||||||
*
|
|
||||||
* This implementation was copied from
|
|
||||||
* http://stackoverflow.com/questions/2041778/initialize-java-hashset-values-by-construction
|
|
||||||
*
|
|
||||||
* @param strings a list of strings to add to the set.
|
|
||||||
* @return a Set of strings.
|
|
||||||
*/
|
|
||||||
protected static Set<String> newHashSet(String... strings) {
|
|
||||||
final Set<String> set = new HashSet<String>();
|
|
||||||
|
|
||||||
Collections.addAll(set, strings);
|
|
||||||
return set;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The initialize method does nothing for this Analyzer.
|
* The initialize method does nothing for this Analyzer.
|
||||||
*
|
*
|
||||||
|
|||||||
@@ -0,0 +1,237 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.utils.InvalidSettingException;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The base FileTypeAnalyzer that all analyzers that have specific file types they analyze should extend.
|
||||||
|
*
|
||||||
|
* @author Jeremy Long
|
||||||
|
*/
|
||||||
|
public abstract class AbstractFileTypeAnalyzer extends AbstractAnalyzer implements FileTypeAnalyzer {
|
||||||
|
|
||||||
|
//<editor-fold defaultstate="collapsed" desc="Constructor">
|
||||||
|
/**
|
||||||
|
* Base constructor that all children must call. This checks the configuration to determine if the analyzer is
|
||||||
|
* enabled.
|
||||||
|
*/
|
||||||
|
public AbstractFileTypeAnalyzer() {
|
||||||
|
reset();
|
||||||
|
}
|
||||||
|
//</editor-fold>
|
||||||
|
|
||||||
|
//<editor-fold defaultstate="collapsed" desc="Field definitions">
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(AbstractFileTypeAnalyzer.class.getName());
|
||||||
|
/**
|
||||||
|
* Whether the file type analyzer detected any files it needs to analyze.
|
||||||
|
*/
|
||||||
|
private boolean filesMatched = false;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of filesMatched. A flag indicating whether the scan included any file types this analyzer supports.
|
||||||
|
*
|
||||||
|
* @return the value of filesMatched
|
||||||
|
*/
|
||||||
|
protected boolean isFilesMatched() {
|
||||||
|
return filesMatched;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of filesMatched. A flag indicating whether the scan included any file types this analyzer supports.
|
||||||
|
*
|
||||||
|
* @param filesMatched new value of filesMatched
|
||||||
|
*/
|
||||||
|
protected void setFilesMatched(boolean filesMatched) {
|
||||||
|
this.filesMatched = filesMatched;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A flag indicating whether or not the analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private boolean enabled = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of enabled.
|
||||||
|
*
|
||||||
|
* @return the value of enabled
|
||||||
|
*/
|
||||||
|
public boolean isEnabled() {
|
||||||
|
return enabled;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of enabled.
|
||||||
|
*
|
||||||
|
* @param enabled new value of enabled
|
||||||
|
*/
|
||||||
|
public void setEnabled(boolean enabled) {
|
||||||
|
this.enabled = enabled;
|
||||||
|
}
|
||||||
|
//</editor-fold>
|
||||||
|
|
||||||
|
//<editor-fold defaultstate="collapsed" desc="Abstract methods children must implement">
|
||||||
|
/**
|
||||||
|
* <p>
|
||||||
|
* Returns a list of supported file extensions. An example would be an analyzer that inspected java jar files. The
|
||||||
|
* getSupportedExtensions function would return a set with a single element "jar".</p>
|
||||||
|
*
|
||||||
|
* <p>
|
||||||
|
* <b>Note:</b> when implementing this the extensions returned MUST be lowercase.</p>
|
||||||
|
*
|
||||||
|
* @return The file extensions supported by this analyzer.
|
||||||
|
*
|
||||||
|
* <p>
|
||||||
|
* If the analyzer returns null it will not cause additional files to be analyzed but will be executed against every
|
||||||
|
* file loaded</p>
|
||||||
|
*/
|
||||||
|
protected abstract Set<String> getSupportedExtensions();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes the file type analyzer.
|
||||||
|
*
|
||||||
|
* @throws Exception thrown if there is an exception during initialization
|
||||||
|
*/
|
||||||
|
protected abstract void initializeFileTypeAnalyzer() throws Exception;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Analyzes a given dependency. If the dependency is an archive, such as a WAR or EAR, the contents are extracted,
|
||||||
|
* scanned, and added to the list of dependencies within the engine.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency to analyze
|
||||||
|
* @param engine the engine scanning
|
||||||
|
* @throws AnalysisException thrown if there is an analysis exception
|
||||||
|
*/
|
||||||
|
protected abstract void analyzeFileType(Dependency dependency, Engine engine) throws AnalysisException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* <p>
|
||||||
|
* Returns the setting key to determine if the analyzer is enabled.</p>
|
||||||
|
*
|
||||||
|
* @return the key for the analyzer's enabled property
|
||||||
|
*/
|
||||||
|
protected abstract String getAnalyzerEnabledSettingKey();
|
||||||
|
|
||||||
|
//</editor-fold>
|
||||||
|
//<editor-fold defaultstate="collapsed" desc="Final implementations for the Analyzer interface">
|
||||||
|
/**
|
||||||
|
* Initializes the analyzer.
|
||||||
|
*
|
||||||
|
* @throws Exception thrown if there is an exception during initialization
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public final void initialize() throws Exception {
|
||||||
|
if (filesMatched) {
|
||||||
|
initializeFileTypeAnalyzer();
|
||||||
|
} else {
|
||||||
|
enabled = false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Resets the enabled flag on the analyzer.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public final void reset() {
|
||||||
|
final String key = getAnalyzerEnabledSettingKey();
|
||||||
|
try {
|
||||||
|
enabled = Settings.getBoolean(key, true);
|
||||||
|
} catch (InvalidSettingException ex) {
|
||||||
|
String msg = String.format("Invalid setting for property '%s'", key);
|
||||||
|
LOGGER.log(Level.WARNING, msg);
|
||||||
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
|
msg = String.format("%s has been disabled", getName());
|
||||||
|
LOGGER.log(Level.WARNING, msg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Analyzes a given dependency. If the dependency is an archive, such as a WAR or EAR, the contents are extracted,
|
||||||
|
* scanned, and added to the list of dependencies within the engine.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency to analyze
|
||||||
|
* @param engine the engine scanning
|
||||||
|
* @throws AnalysisException thrown if there is an analysis exception
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public final void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
|
if (enabled) {
|
||||||
|
analyzeFileType(dependency, engine);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether or not this analyzer can process the given extension.
|
||||||
|
*
|
||||||
|
* @param extension the file extension to test for support.
|
||||||
|
* @return whether or not the specified file extension is supported by this analyzer.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public final boolean supportsExtension(String extension) {
|
||||||
|
if (!enabled) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
final Set<String> ext = getSupportedExtensions();
|
||||||
|
if (ext == null) {
|
||||||
|
final String msg = String.format("The '%s' analyzer is misconfigured and does not have any file extensions;"
|
||||||
|
+ " it will be disabled", getName());
|
||||||
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
|
return false;
|
||||||
|
} else {
|
||||||
|
final boolean match = ext.contains(extension);
|
||||||
|
if (match) {
|
||||||
|
filesMatched = match;
|
||||||
|
}
|
||||||
|
return match;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
//</editor-fold>
|
||||||
|
|
||||||
|
//<editor-fold defaultstate="collapsed" desc="Static utility methods">
|
||||||
|
/**
|
||||||
|
* <p>
|
||||||
|
* Utility method to help in the creation of the extensions set. This constructs a new Set that can be used in a
|
||||||
|
* final static declaration.</p>
|
||||||
|
*
|
||||||
|
* <p>
|
||||||
|
* This implementation was copied from
|
||||||
|
* http://stackoverflow.com/questions/2041778/initialize-java-hashset-values-by-construction</p>
|
||||||
|
*
|
||||||
|
* @param strings a list of strings to add to the set.
|
||||||
|
* @return a Set of strings.
|
||||||
|
*/
|
||||||
|
protected static Set<String> newHashSet(String... strings) {
|
||||||
|
final Set<String> set = new HashSet<String>();
|
||||||
|
|
||||||
|
Collections.addAll(set, strings);
|
||||||
|
return set;
|
||||||
|
}
|
||||||
|
//</editor-fold>
|
||||||
|
}
|
||||||
@@ -18,22 +18,35 @@
|
|||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.io.InputStream;
|
||||||
|
import java.net.MalformedURLException;
|
||||||
|
import java.net.URL;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
import org.owasp.dependencycheck.suppression.SuppressionParseException;
|
import org.owasp.dependencycheck.suppression.SuppressionParseException;
|
||||||
import org.owasp.dependencycheck.suppression.SuppressionParser;
|
import org.owasp.dependencycheck.suppression.SuppressionParser;
|
||||||
import org.owasp.dependencycheck.suppression.SuppressionRule;
|
import org.owasp.dependencycheck.suppression.SuppressionRule;
|
||||||
|
import org.owasp.dependencycheck.utils.DownloadFailedException;
|
||||||
|
import org.owasp.dependencycheck.utils.Downloader;
|
||||||
|
import org.owasp.dependencycheck.utils.FileUtils;
|
||||||
import org.owasp.dependencycheck.utils.Settings;
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Abstract base suppression analyzer that contains methods for parsing the suppression xml file.
|
* Abstract base suppression analyzer that contains methods for parsing the suppression xml file.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public abstract class AbstractSuppressionAnalyzer extends AbstractAnalyzer {
|
public abstract class AbstractSuppressionAnalyzer extends AbstractAnalyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The Logger for use throughout the class
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(AbstractSuppressionAnalyzer.class.getName());
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
/**
|
||||||
* Returns a list of file EXTENSIONS supported by this analyzer.
|
* Returns a list of file EXTENSIONS supported by this analyzer.
|
||||||
@@ -44,17 +57,6 @@ public abstract class AbstractSuppressionAnalyzer extends AbstractAnalyzer {
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support.
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
//</editor-fold>
|
//</editor-fold>
|
||||||
/**
|
/**
|
||||||
* The initialize method loads the suppression XML file.
|
* The initialize method loads the suppression XML file.
|
||||||
@@ -66,6 +68,7 @@ public abstract class AbstractSuppressionAnalyzer extends AbstractAnalyzer {
|
|||||||
super.initialize();
|
super.initialize();
|
||||||
loadSuppressionData();
|
loadSuppressionData();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The list of suppression rules
|
* The list of suppression rules
|
||||||
*/
|
*/
|
||||||
@@ -95,18 +98,81 @@ public abstract class AbstractSuppressionAnalyzer extends AbstractAnalyzer {
|
|||||||
* @throws SuppressionParseException thrown if the XML cannot be parsed.
|
* @throws SuppressionParseException thrown if the XML cannot be parsed.
|
||||||
*/
|
*/
|
||||||
private void loadSuppressionData() throws SuppressionParseException {
|
private void loadSuppressionData() throws SuppressionParseException {
|
||||||
final File file = Settings.getFile(Settings.KEYS.SUPPRESSION_FILE);
|
final SuppressionParser parser = new SuppressionParser();
|
||||||
if (file != null) {
|
File file = null;
|
||||||
final SuppressionParser parser = new SuppressionParser();
|
try {
|
||||||
try {
|
rules = parser.parseSuppressionRules(this.getClass().getClassLoader().getResourceAsStream("dependencycheck-base-suppression.xml"));
|
||||||
rules = parser.parseSuppressionRules(file);
|
} catch (SuppressionParseException ex) {
|
||||||
} catch (SuppressionParseException ex) {
|
LOGGER.log(Level.FINE, "Unable to parse the base suppression data file", ex);
|
||||||
final String msg = String.format("Unable to parse suppression xml file '%s'", file.getPath());
|
}
|
||||||
Logger.getLogger(AbstractSuppressionAnalyzer.class.getName()).log(Level.WARNING, msg);
|
final String suppressionFilePath = Settings.getString(Settings.KEYS.SUPPRESSION_FILE);
|
||||||
Logger.getLogger(AbstractSuppressionAnalyzer.class.getName()).log(Level.WARNING, ex.getMessage());
|
if (suppressionFilePath == null) {
|
||||||
Logger.getLogger(AbstractSuppressionAnalyzer.class.getName()).log(Level.FINE, null, ex);
|
return;
|
||||||
throw ex;
|
}
|
||||||
|
boolean deleteTempFile = false;
|
||||||
|
try {
|
||||||
|
final Pattern uriRx = Pattern.compile("^(https?|file)\\:.*", Pattern.CASE_INSENSITIVE);
|
||||||
|
if (uriRx.matcher(suppressionFilePath).matches()) {
|
||||||
|
deleteTempFile = true;
|
||||||
|
file = FileUtils.getTempFile("suppression", "xml");
|
||||||
|
final URL url = new URL(suppressionFilePath);
|
||||||
|
try {
|
||||||
|
Downloader.fetchFile(url, file, false);
|
||||||
|
} catch (DownloadFailedException ex) {
|
||||||
|
Downloader.fetchFile(url, file, true);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
file = new File(suppressionFilePath);
|
||||||
|
if (!file.exists()) {
|
||||||
|
final InputStream suppressionsFromClasspath = this.getClass().getClassLoader().getResourceAsStream(suppressionFilePath);
|
||||||
|
if (suppressionsFromClasspath != null) {
|
||||||
|
deleteTempFile = true;
|
||||||
|
file = FileUtils.getTempFile("suppression", "xml");
|
||||||
|
try {
|
||||||
|
org.apache.commons.io.FileUtils.copyInputStreamToFile(suppressionsFromClasspath, file);
|
||||||
|
} catch (IOException ex) {
|
||||||
|
throwSuppressionParseException("Unable to locate suppressions file in classpath", ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (file != null) {
|
||||||
|
try {
|
||||||
|
//rules = parser.parseSuppressionRules(file);
|
||||||
|
rules.addAll(parser.parseSuppressionRules(file));
|
||||||
|
LOGGER.log(Level.FINE, rules.size() + " suppression rules were loaded.");
|
||||||
|
} catch (SuppressionParseException ex) {
|
||||||
|
final String msg = String.format("Unable to parse suppression xml file '%s'", file.getPath());
|
||||||
|
LOGGER.log(Level.WARNING, msg);
|
||||||
|
LOGGER.log(Level.WARNING, ex.getMessage());
|
||||||
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
|
throw ex;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (DownloadFailedException ex) {
|
||||||
|
throwSuppressionParseException("Unable to fetch the configured suppression file", ex);
|
||||||
|
} catch (MalformedURLException ex) {
|
||||||
|
throwSuppressionParseException("Configured suppression file has an invalid URL", ex);
|
||||||
|
} catch (IOException ex) {
|
||||||
|
throwSuppressionParseException("Unable to create temp file for suppressions", ex);
|
||||||
|
} finally {
|
||||||
|
if (deleteTempFile && file != null) {
|
||||||
|
FileUtils.delete(file);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Utility method to throw parse exceptions.
|
||||||
|
*
|
||||||
|
* @param message the exception message
|
||||||
|
* @param exception the cause of the exception
|
||||||
|
* @throws SuppressionParseException throws the generated SuppressionParseException
|
||||||
|
*/
|
||||||
|
private void throwSuppressionParseException(String message, Exception exception) throws SuppressionParseException {
|
||||||
|
LOGGER.log(Level.WARNING, message);
|
||||||
|
LOGGER.log(Level.FINE, "", exception);
|
||||||
|
throw new SuppressionParseException(message, exception);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ package org.owasp.dependencycheck.analyzer;
|
|||||||
/**
|
/**
|
||||||
* An enumeration defining the phases of analysis.
|
* An enumeration defining the phases of analysis.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public enum AnalysisPhase {
|
public enum AnalysisPhase {
|
||||||
|
|
||||||
|
|||||||
@@ -17,15 +17,15 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
import java.util.Set;
|
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* An interface that defines an Analyzer that is used to identify Dependencies. An analyzer will collect information
|
* An interface that defines an Analyzer that is used to identify Dependencies. An analyzer will collect information
|
||||||
* about the dependency in the form of Evidence.
|
* about the dependency in the form of Evidence.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public interface Analyzer {
|
public interface Analyzer {
|
||||||
|
|
||||||
@@ -41,22 +41,6 @@ public interface Analyzer {
|
|||||||
*/
|
*/
|
||||||
void analyze(Dependency dependency, Engine engine) throws AnalysisException;
|
void analyze(Dependency dependency, Engine engine) throws AnalysisException;
|
||||||
|
|
||||||
/**
|
|
||||||
* <p>
|
|
||||||
* Returns a list of supported file extensions. An example would be an analyzer that inspected java jar files. The
|
|
||||||
* getSupportedExtensions function would return a set with a single element "jar".</p>
|
|
||||||
*
|
|
||||||
* <p>
|
|
||||||
* <b>Note:</b> when implementing this the extensions returned MUST be lowercase.</p>
|
|
||||||
*
|
|
||||||
* @return The file extensions supported by this analyzer.
|
|
||||||
*
|
|
||||||
* <p>
|
|
||||||
* If the analyzer returns null it will not cause additional files to be analyzed but will be executed against every
|
|
||||||
* file loaded</p>
|
|
||||||
*/
|
|
||||||
Set<String> getSupportedExtensions();
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the name of the analyzer.
|
* Returns the name of the analyzer.
|
||||||
*
|
*
|
||||||
@@ -64,14 +48,6 @@ public interface Analyzer {
|
|||||||
*/
|
*/
|
||||||
String getName();
|
String getName();
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support.
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
boolean supportsExtension(String extension);
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the phase that the analyzer is intended to run in.
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
*
|
*
|
||||||
|
|||||||
@@ -21,15 +21,13 @@ import java.util.Iterator;
|
|||||||
import java.util.ServiceLoader;
|
import java.util.ServiceLoader;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
* The Analyzer Service Loader. This class loads all services that implement
|
||||||
|
* org.owasp.dependencycheck.analyzer.Analyzer.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class AnalyzerService {
|
public class AnalyzerService {
|
||||||
|
|
||||||
/**
|
|
||||||
* The analyzer service singleton.
|
|
||||||
*/
|
|
||||||
private static AnalyzerService service;
|
|
||||||
/**
|
/**
|
||||||
* The service loader for analyzers.
|
* The service loader for analyzers.
|
||||||
*/
|
*/
|
||||||
@@ -37,21 +35,11 @@ public final class AnalyzerService {
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a new instance of AnalyzerService.
|
* Creates a new instance of AnalyzerService.
|
||||||
*/
|
|
||||||
private AnalyzerService() {
|
|
||||||
loader = ServiceLoader.load(Analyzer.class);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Retrieve the singleton instance of AnalyzerService.
|
|
||||||
*
|
*
|
||||||
* @return a singleton AnalyzerService.
|
* @param classLoader the ClassLoader to use when dynamically loading Analyzer and Update services
|
||||||
*/
|
*/
|
||||||
public static synchronized AnalyzerService getInstance() {
|
public AnalyzerService(ClassLoader classLoader) {
|
||||||
if (service == null) {
|
loader = ServiceLoader.load(Analyzer.class, classLoader);
|
||||||
service = new AnalyzerService();
|
|
||||||
}
|
|
||||||
return service;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|||||||
@@ -25,7 +25,9 @@ import java.io.FileNotFoundException;
|
|||||||
import java.io.FileOutputStream;
|
import java.io.FileOutputStream;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
|
import java.util.Arrays;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
|
import java.util.Enumeration;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
@@ -34,13 +36,17 @@ import java.util.logging.Logger;
|
|||||||
import org.apache.commons.compress.archivers.ArchiveEntry;
|
import org.apache.commons.compress.archivers.ArchiveEntry;
|
||||||
import org.apache.commons.compress.archivers.ArchiveInputStream;
|
import org.apache.commons.compress.archivers.ArchiveInputStream;
|
||||||
import org.apache.commons.compress.archivers.tar.TarArchiveInputStream;
|
import org.apache.commons.compress.archivers.tar.TarArchiveInputStream;
|
||||||
|
import org.apache.commons.compress.archivers.zip.ZipArchiveEntry;
|
||||||
import org.apache.commons.compress.archivers.zip.ZipArchiveInputStream;
|
import org.apache.commons.compress.archivers.zip.ZipArchiveInputStream;
|
||||||
|
import org.apache.commons.compress.archivers.zip.ZipFile;
|
||||||
import org.apache.commons.compress.compressors.CompressorInputStream;
|
import org.apache.commons.compress.compressors.CompressorInputStream;
|
||||||
import org.apache.commons.compress.compressors.gzip.GzipCompressorInputStream;
|
import org.apache.commons.compress.compressors.gzip.GzipCompressorInputStream;
|
||||||
import org.apache.commons.compress.compressors.gzip.GzipUtils;
|
import org.apache.commons.compress.compressors.gzip.GzipUtils;
|
||||||
import org.h2.store.fs.FileUtils;
|
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.ArchiveExtractionException;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.utils.FileUtils;
|
||||||
import org.owasp.dependencycheck.utils.Settings;
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -48,10 +54,14 @@ import org.owasp.dependencycheck.utils.Settings;
|
|||||||
* An analyzer that extracts files from archives and ensures any supported files contained within the archive are added
|
* An analyzer that extracts files from archives and ensures any supported files contained within the archive are added
|
||||||
* to the dependency list.</p>
|
* to the dependency list.</p>
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
public class ArchiveAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(ArchiveAnalyzer.class.getName());
|
||||||
/**
|
/**
|
||||||
* The buffer size to use when extracting files from the archive.
|
* The buffer size to use when extracting files from the archive.
|
||||||
*/
|
*/
|
||||||
@@ -72,6 +82,7 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
* Tracks the current scan/extraction depth for nested archives.
|
* Tracks the current scan/extraction depth for nested archives.
|
||||||
*/
|
*/
|
||||||
private int scanDepth = 0;
|
private int scanDepth = 0;
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer.
|
* The name of the analyzer.
|
||||||
@@ -82,15 +93,35 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
*/
|
*/
|
||||||
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INITIAL;
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INITIAL;
|
||||||
/**
|
/**
|
||||||
* The set of file extensions supported by this analyzer.
|
* The set of things we can handle with Zip methods
|
||||||
*/
|
*/
|
||||||
private static final Set<String> EXTENSIONS = newHashSet("zip", "ear", "war", "tar", "gz", "tgz");
|
private static final Set<String> ZIPPABLES = newHashSet("zip", "ear", "war", "jar", "sar", "apk", "nupkg");
|
||||||
|
/**
|
||||||
|
* The set of file extensions supported by this analyzer. Note for developers, any additions to this list will need
|
||||||
|
* to be explicitly handled in extractFiles().
|
||||||
|
*/
|
||||||
|
private static final Set<String> EXTENSIONS = newHashSet("tar", "gz", "tgz");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The set of file extensions to remove from the engine's collection of dependencies.
|
||||||
|
*/
|
||||||
|
private static final Set<String> REMOVE_FROM_ANALYSIS = newHashSet("zip", "tar", "gz", "tgz"); //TODO add nupkg, apk, sar?
|
||||||
|
|
||||||
|
static {
|
||||||
|
final String additionalZipExt = Settings.getString(Settings.KEYS.ADDITIONAL_ZIP_EXTENSIONS);
|
||||||
|
if (additionalZipExt != null) {
|
||||||
|
final Set<String> ext = new HashSet<String>(Arrays.asList(additionalZipExt));
|
||||||
|
ZIPPABLES.addAll(ext);
|
||||||
|
}
|
||||||
|
EXTENSIONS.addAll(ZIPPABLES);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a list of file EXTENSIONS supported by this analyzer.
|
* Returns a list of file EXTENSIONS supported by this analyzer.
|
||||||
*
|
*
|
||||||
* @return a list of file EXTENSIONS supported by this analyzer.
|
* @return a list of file EXTENSIONS supported by this analyzer.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public Set<String> getSupportedExtensions() {
|
public Set<String> getSupportedExtensions() {
|
||||||
return EXTENSIONS;
|
return EXTENSIONS;
|
||||||
}
|
}
|
||||||
@@ -100,44 +131,40 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
*
|
*
|
||||||
* @return the name of the analyzer.
|
* @return the name of the analyzer.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public String getName() {
|
public String getName() {
|
||||||
return ANALYZER_NAME;
|
return ANALYZER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support.
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return EXTENSIONS.contains(extension);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the phase that the analyzer is intended to run in.
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
*
|
*
|
||||||
* @return the phase that the analyzer is intended to run in.
|
* @return the phase that the analyzer is intended to run in.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public AnalysisPhase getAnalysisPhase() {
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
return ANALYSIS_PHASE;
|
return ANALYSIS_PHASE;
|
||||||
}
|
}
|
||||||
//</editor-fold>
|
//</editor-fold>
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the key used in the properties file to reference the analyzer's enabled property.
|
||||||
|
*
|
||||||
|
* @return the analyzer's enabled property setting key
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_ARCHIVE_ENABLED;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The initialize method does nothing for this Analyzer.
|
* The initialize method does nothing for this Analyzer.
|
||||||
*
|
*
|
||||||
* @throws Exception is thrown if there is an exception deleting or creating temporary files
|
* @throws Exception is thrown if there is an exception deleting or creating temporary files
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public void initialize() throws Exception {
|
public void initializeFileTypeAnalyzer() throws Exception {
|
||||||
final File baseDir = Settings.getTempDirectory();
|
final File baseDir = Settings.getTempDirectory();
|
||||||
if (!baseDir.exists()) {
|
|
||||||
if (!baseDir.mkdirs()) {
|
|
||||||
final String msg = String.format("Unable to make a temporary folder '%s'", baseDir.getPath());
|
|
||||||
throw new AnalysisException(msg);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
tempFileLocation = File.createTempFile("check", "tmp", baseDir);
|
tempFileLocation = File.createTempFile("check", "tmp", baseDir);
|
||||||
if (!tempFileLocation.delete()) {
|
if (!tempFileLocation.delete()) {
|
||||||
final String msg = String.format("Unable to delete temporary file '%s'.", tempFileLocation.getAbsolutePath());
|
final String msg = String.format("Unable to delete temporary file '%s'.", tempFileLocation.getAbsolutePath());
|
||||||
@@ -150,14 +177,18 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The close method does nothing for this Analyzer.
|
* The close method deletes any temporary files and directories created during analysis.
|
||||||
*
|
*
|
||||||
* @throws Exception thrown if there is an exception deleting temporary files
|
* @throws Exception thrown if there is an exception deleting temporary files
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public void close() throws Exception {
|
public void close() throws Exception {
|
||||||
if (tempFileLocation != null && tempFileLocation.exists()) {
|
if (tempFileLocation != null && tempFileLocation.exists()) {
|
||||||
FileUtils.deleteRecursive(tempFileLocation.getAbsolutePath(), true);
|
LOGGER.log(Level.FINE, "Attempting to delete temporary files");
|
||||||
|
final boolean success = FileUtils.delete(tempFileLocation);
|
||||||
|
if (!success && tempFileLocation != null && tempFileLocation.exists() && tempFileLocation.list().length > 0) {
|
||||||
|
LOGGER.log(Level.WARNING, "Failed to delete some temporary files, see the log for more details");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -170,15 +201,15 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
* @throws AnalysisException thrown if there is an analysis exception
|
* @throws AnalysisException thrown if there is an analysis exception
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
public void analyzeFileType(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
final File f = new File(dependency.getActualFilePath());
|
final File f = new File(dependency.getActualFilePath());
|
||||||
final File tmpDir = getNextTempDirectory();
|
final File tmpDir = getNextTempDirectory();
|
||||||
extractFiles(f, tmpDir, engine);
|
extractFiles(f, tmpDir, engine);
|
||||||
|
|
||||||
//make a copy
|
//make a copy
|
||||||
final List<Dependency> dependencies = new ArrayList<Dependency>(engine.getDependencies());
|
List<Dependency> dependencies = new ArrayList<Dependency>(engine.getDependencies());
|
||||||
engine.scan(tmpDir);
|
engine.scan(tmpDir);
|
||||||
final List<Dependency> newDependencies = engine.getDependencies();
|
List<Dependency> newDependencies = engine.getDependencies();
|
||||||
if (dependencies.size() != newDependencies.size()) {
|
if (dependencies.size() != newDependencies.size()) {
|
||||||
//get the new dependencies
|
//get the new dependencies
|
||||||
final Set<Dependency> dependencySet = new HashSet<Dependency>();
|
final Set<Dependency> dependencySet = new HashSet<Dependency>();
|
||||||
@@ -190,9 +221,8 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
final String displayPath = String.format("%s%s",
|
final String displayPath = String.format("%s%s",
|
||||||
dependency.getFilePath(),
|
dependency.getFilePath(),
|
||||||
d.getActualFilePath().substring(tmpDir.getAbsolutePath().length()));
|
d.getActualFilePath().substring(tmpDir.getAbsolutePath().length()));
|
||||||
final String displayName = String.format("%s%s%s",
|
final String displayName = String.format("%s: %s",
|
||||||
dependency.getFileName(),
|
dependency.getFileName(),
|
||||||
File.separator,
|
|
||||||
d.getFileName());
|
d.getFileName());
|
||||||
d.setFilePath(displayPath);
|
d.setFilePath(displayPath);
|
||||||
d.setFileName(displayName);
|
d.setFileName(displayName);
|
||||||
@@ -206,6 +236,40 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if (this.REMOVE_FROM_ANALYSIS.contains(dependency.getFileExtension())) {
|
||||||
|
if ("zip".equals(dependency.getFileExtension()) && isZipFileActuallyJarFile(dependency)) {
|
||||||
|
final File tdir = getNextTempDirectory();
|
||||||
|
final String fileName = dependency.getFileName();
|
||||||
|
|
||||||
|
LOGGER.info(String.format("The zip file '%s' appears to be a JAR file, making a copy and analyzing it as a JAR.", fileName));
|
||||||
|
|
||||||
|
final File tmpLoc = new File(tdir, fileName.substring(0, fileName.length() - 3) + "jar");
|
||||||
|
try {
|
||||||
|
org.apache.commons.io.FileUtils.copyFile(tdir, tmpLoc);
|
||||||
|
dependencies = new ArrayList<Dependency>(engine.getDependencies());
|
||||||
|
engine.scan(tmpLoc);
|
||||||
|
newDependencies = engine.getDependencies();
|
||||||
|
if (dependencies.size() != newDependencies.size()) {
|
||||||
|
//get the new dependencies
|
||||||
|
final Set<Dependency> dependencySet = new HashSet<Dependency>();
|
||||||
|
dependencySet.addAll(newDependencies);
|
||||||
|
dependencySet.removeAll(dependencies);
|
||||||
|
if (dependencySet.size() != 1) {
|
||||||
|
LOGGER.info("Deep copy of ZIP to JAR file resulted in more then one dependency?");
|
||||||
|
}
|
||||||
|
for (Dependency d : dependencySet) {
|
||||||
|
//fix the dependency's display name and path
|
||||||
|
d.setFilePath(dependency.getFilePath());
|
||||||
|
d.setDisplayFileName(dependency.getFileName());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (IOException ex) {
|
||||||
|
final String msg = String.format("Unable to perform deep copy on '%s'", dependency.getActualFile().getPath());
|
||||||
|
LOGGER.log(Level.FINE, msg, ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
engine.getDependencies().remove(dependency);
|
||||||
|
}
|
||||||
Collections.sort(engine.getDependencies());
|
Collections.sort(engine.getDependencies());
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -246,35 +310,35 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
try {
|
try {
|
||||||
fis = new FileInputStream(archive);
|
fis = new FileInputStream(archive);
|
||||||
} catch (FileNotFoundException ex) {
|
} catch (FileNotFoundException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.INFO, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new AnalysisException("Archive file was not found.", ex);
|
throw new AnalysisException("Archive file was not found.", ex);
|
||||||
}
|
}
|
||||||
final String archiveExt = org.owasp.dependencycheck.utils.FileUtils.getFileExtension(archive.getName()).toLowerCase();
|
final String archiveExt = FileUtils.getFileExtension(archive.getName()).toLowerCase();
|
||||||
try {
|
try {
|
||||||
if ("zip".equals(archiveExt) || "war".equals(archiveExt) || "ear".equals(archiveExt)) {
|
if (ZIPPABLES.contains(archiveExt)) {
|
||||||
extractArchive(new ZipArchiveInputStream(new BufferedInputStream(fis)), destination, engine);
|
extractArchive(new ZipArchiveInputStream(new BufferedInputStream(fis)), destination, engine);
|
||||||
} else if ("tar".equals(archiveExt)) {
|
} else if ("tar".equals(archiveExt)) {
|
||||||
extractArchive(new TarArchiveInputStream(new BufferedInputStream(fis)), destination, engine);
|
extractArchive(new TarArchiveInputStream(new BufferedInputStream(fis)), destination, engine);
|
||||||
} else if ("gz".equals(archiveExt) || "tgz".equals(archiveExt)) {
|
} else if ("gz".equals(archiveExt) || "tgz".equals(archiveExt)) {
|
||||||
final String uncompressedName = GzipUtils.getUncompressedFilename(archive.getName());
|
final String uncompressedName = GzipUtils.getUncompressedFilename(archive.getName());
|
||||||
final String uncompressedExt = org.owasp.dependencycheck.utils.FileUtils.getFileExtension(uncompressedName).toLowerCase();
|
final String uncompressedExt = FileUtils.getFileExtension(uncompressedName).toLowerCase();
|
||||||
if (engine.supportsExtension(uncompressedExt)) {
|
if (engine.supportsExtension(uncompressedExt)) {
|
||||||
decompressFile(new GzipCompressorInputStream(new BufferedInputStream(fis)), new File(destination, uncompressedName));
|
decompressFile(new GzipCompressorInputStream(new BufferedInputStream(fis)), new File(destination, uncompressedName));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} catch (ArchiveExtractionException ex) {
|
} catch (ArchiveExtractionException ex) {
|
||||||
final String msg = String.format("Exception extracting archive '%s'.", archive.getName());
|
final String msg = String.format("Exception extracting archive '%s'.", archive.getName());
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.WARNING, msg);
|
LOGGER.log(Level.WARNING, msg);
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
final String msg = String.format("Exception reading archive '%s'.", archive.getName());
|
final String msg = String.format("Exception reading archive '%s'.", archive.getName());
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.WARNING, msg);
|
LOGGER.log(Level.WARNING, msg);
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} finally {
|
} finally {
|
||||||
try {
|
try {
|
||||||
fis.close();
|
fis.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -301,10 +365,12 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
final File file = new File(destination, entry.getName());
|
final File file = new File(destination, entry.getName());
|
||||||
final String ext = org.owasp.dependencycheck.utils.FileUtils.getFileExtension(file.getName());
|
final String ext = FileUtils.getFileExtension(file.getName());
|
||||||
if (engine.supportsExtension(ext)) {
|
if (engine.supportsExtension(ext)) {
|
||||||
|
final String extracting = String.format("Extracting '%s'", file.getPath());
|
||||||
|
LOGGER.fine(extracting);
|
||||||
BufferedOutputStream bos = null;
|
BufferedOutputStream bos = null;
|
||||||
FileOutputStream fos;
|
FileOutputStream fos = null;
|
||||||
try {
|
try {
|
||||||
final File parent = file.getParentFile();
|
final File parent = file.getParentFile();
|
||||||
if (!parent.isDirectory()) {
|
if (!parent.isDirectory()) {
|
||||||
@@ -316,19 +382,17 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
fos = new FileOutputStream(file);
|
fos = new FileOutputStream(file);
|
||||||
bos = new BufferedOutputStream(fos, BUFFER_SIZE);
|
bos = new BufferedOutputStream(fos, BUFFER_SIZE);
|
||||||
int count;
|
int count;
|
||||||
final byte data[] = new byte[BUFFER_SIZE];
|
final byte[] data = new byte[BUFFER_SIZE];
|
||||||
while ((count = input.read(data, 0, BUFFER_SIZE)) != -1) {
|
while ((count = input.read(data, 0, BUFFER_SIZE)) != -1) {
|
||||||
bos.write(data, 0, count);
|
bos.write(data, 0, count);
|
||||||
}
|
}
|
||||||
bos.flush();
|
bos.flush();
|
||||||
} catch (FileNotFoundException ex) {
|
} catch (FileNotFoundException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
.getName()).log(Level.FINE, null, ex);
|
|
||||||
final String msg = String.format("Unable to find file '%s'.", file.getName());
|
final String msg = String.format("Unable to find file '%s'.", file.getName());
|
||||||
throw new AnalysisException(msg, ex);
|
throw new AnalysisException(msg, ex);
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
.getName()).log(Level.FINE, null, ex);
|
|
||||||
final String msg = String.format("IO Exception while parsing file '%s'.", file.getName());
|
final String msg = String.format("IO Exception while parsing file '%s'.", file.getName());
|
||||||
throw new AnalysisException(msg, ex);
|
throw new AnalysisException(msg, ex);
|
||||||
} finally {
|
} finally {
|
||||||
@@ -336,8 +400,14 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
try {
|
try {
|
||||||
bos.close();
|
bos.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
.getName()).log(Level.FINEST, null, ex);
|
}
|
||||||
|
}
|
||||||
|
if (fos != null) {
|
||||||
|
try {
|
||||||
|
fos.close();
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -353,7 +423,7 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
try {
|
try {
|
||||||
input.close();
|
input.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -367,6 +437,8 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
* @throws ArchiveExtractionException thrown if there is an exception decompressing the file
|
* @throws ArchiveExtractionException thrown if there is an exception decompressing the file
|
||||||
*/
|
*/
|
||||||
private void decompressFile(CompressorInputStream inputStream, File outputFile) throws ArchiveExtractionException {
|
private void decompressFile(CompressorInputStream inputStream, File outputFile) throws ArchiveExtractionException {
|
||||||
|
final String msg = String.format("Decompressing '%s'", outputFile.getPath());
|
||||||
|
LOGGER.fine(msg);
|
||||||
FileOutputStream out = null;
|
FileOutputStream out = null;
|
||||||
try {
|
try {
|
||||||
out = new FileOutputStream(outputFile);
|
out = new FileOutputStream(outputFile);
|
||||||
@@ -376,19 +448,53 @@ public class ArchiveAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
out.write(buffer, 0, n);
|
out.write(buffer, 0, n);
|
||||||
}
|
}
|
||||||
} catch (FileNotFoundException ex) {
|
} catch (FileNotFoundException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new ArchiveExtractionException(ex);
|
throw new ArchiveExtractionException(ex);
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new ArchiveExtractionException(ex);
|
throw new ArchiveExtractionException(ex);
|
||||||
} finally {
|
} finally {
|
||||||
if (out != null) {
|
if (out != null) {
|
||||||
try {
|
try {
|
||||||
out.close();
|
out.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(ArchiveAnalyzer.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Attempts to determine if a zip file is actually a JAR file.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency to check
|
||||||
|
* @return true if the dependency appears to be a JAR file; otherwise false
|
||||||
|
*/
|
||||||
|
private boolean isZipFileActuallyJarFile(Dependency dependency) {
|
||||||
|
boolean isJar = false;
|
||||||
|
ZipFile zip = null;
|
||||||
|
try {
|
||||||
|
zip = new ZipFile(dependency.getActualFilePath());
|
||||||
|
if (zip.getEntry("META-INF/MANIFEST.MF") != null
|
||||||
|
|| zip.getEntry("META-INF/maven") != null) {
|
||||||
|
final Enumeration<ZipArchiveEntry> entries = zip.getEntries();
|
||||||
|
while (entries.hasMoreElements()) {
|
||||||
|
final ZipArchiveEntry entry = entries.nextElement();
|
||||||
|
if (!entry.isDirectory()) {
|
||||||
|
final String name = entry.getName().toLowerCase();
|
||||||
|
if (name.endsWith(".class")) {
|
||||||
|
isJar = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.FINE, String.format("Unable to unzip zip file '%s'", dependency.getFilePath()), ex);
|
||||||
|
} finally {
|
||||||
|
ZipFile.closeQuietly(zip);
|
||||||
|
}
|
||||||
|
|
||||||
|
return isJar;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -0,0 +1,325 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.io.BufferedReader;
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileOutputStream;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.io.InputStream;
|
||||||
|
import java.io.InputStreamReader;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
import javax.xml.parsers.DocumentBuilder;
|
||||||
|
import javax.xml.parsers.DocumentBuilderFactory;
|
||||||
|
import javax.xml.xpath.XPath;
|
||||||
|
import javax.xml.xpath.XPathExpressionException;
|
||||||
|
import javax.xml.xpath.XPathFactory;
|
||||||
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.dependency.Evidence;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
import org.w3c.dom.Document;
|
||||||
|
import org.xml.sax.SAXException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Analyzer for getting company, product, and version information from a .NET assembly.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class AssemblyAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The analyzer name
|
||||||
|
*/
|
||||||
|
private static final String ANALYZER_NAME = "Assembly Analyzer";
|
||||||
|
/**
|
||||||
|
* The analysis phase
|
||||||
|
*/
|
||||||
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
||||||
|
/**
|
||||||
|
* The list of supported extensions
|
||||||
|
*/
|
||||||
|
private static final Set<String> SUPPORTED_EXTENSIONS = newHashSet("dll", "exe");
|
||||||
|
/**
|
||||||
|
* The temp value for GrokAssembly.exe
|
||||||
|
*/
|
||||||
|
private File grokAssemblyExe = null;
|
||||||
|
/**
|
||||||
|
* The DocumentBuilder for parsing the XML
|
||||||
|
*/
|
||||||
|
private DocumentBuilder builder;
|
||||||
|
/**
|
||||||
|
* Logger
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(AssemblyAnalyzer.class.getName(), "dependencycheck-resources");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Builds the beginnings of a List for ProcessBuilder
|
||||||
|
*
|
||||||
|
* @return the list of arguments to begin populating the ProcessBuilder
|
||||||
|
*/
|
||||||
|
private List<String> buildArgumentList() {
|
||||||
|
// Use file.separator as a wild guess as to whether this is Windows
|
||||||
|
final List<String> args = new ArrayList<String>();
|
||||||
|
if (!"\\".equals(System.getProperty("file.separator"))) {
|
||||||
|
if (Settings.getString(Settings.KEYS.ANALYZER_ASSEMBLY_MONO_PATH) != null) {
|
||||||
|
args.add(Settings.getString(Settings.KEYS.ANALYZER_ASSEMBLY_MONO_PATH));
|
||||||
|
} else {
|
||||||
|
args.add("mono");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
args.add(grokAssemblyExe.getPath());
|
||||||
|
|
||||||
|
return args;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Performs the analysis on a single Dependency.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency to analyze
|
||||||
|
* @param engine the engine to perform the analysis under
|
||||||
|
* @throws AnalysisException if anything goes sideways
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void analyzeFileType(Dependency dependency, Engine engine)
|
||||||
|
throws AnalysisException {
|
||||||
|
if (grokAssemblyExe == null) {
|
||||||
|
LOGGER.warning("analyzer.AssemblyAnalyzer.notdeployed");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
final List<String> args = buildArgumentList();
|
||||||
|
args.add(dependency.getActualFilePath());
|
||||||
|
final ProcessBuilder pb = new ProcessBuilder(args);
|
||||||
|
BufferedReader rdr = null;
|
||||||
|
Document doc = null;
|
||||||
|
try {
|
||||||
|
final Process proc = pb.start();
|
||||||
|
// Try evacuating the error stream
|
||||||
|
rdr = new BufferedReader(new InputStreamReader(proc.getErrorStream(), "UTF-8"));
|
||||||
|
String line = null;
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
while (rdr.ready() && (line = rdr.readLine()) != null) {
|
||||||
|
LOGGER.log(Level.WARNING, "analyzer.AssemblyAnalyzer.grokassembly.stderr", line);
|
||||||
|
}
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
int rc = 0;
|
||||||
|
doc = builder.parse(proc.getInputStream());
|
||||||
|
|
||||||
|
try {
|
||||||
|
rc = proc.waitFor();
|
||||||
|
} catch (InterruptedException ie) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
if (rc == 3) {
|
||||||
|
LOGGER.log(Level.FINE, "analyzer.AssemblyAnalyzer.notassembly", dependency.getActualFilePath());
|
||||||
|
return;
|
||||||
|
} else if (rc != 0) {
|
||||||
|
LOGGER.log(Level.WARNING, "analyzer.AssemblyAnalyzer.grokassembly.rc", rc);
|
||||||
|
}
|
||||||
|
|
||||||
|
final XPath xpath = XPathFactory.newInstance().newXPath();
|
||||||
|
|
||||||
|
// First, see if there was an error
|
||||||
|
final String error = xpath.evaluate("/assembly/error", doc);
|
||||||
|
if (error != null && !"".equals(error)) {
|
||||||
|
throw new AnalysisException(error);
|
||||||
|
}
|
||||||
|
|
||||||
|
final String version = xpath.evaluate("/assembly/version", doc);
|
||||||
|
if (version != null) {
|
||||||
|
dependency.getVersionEvidence().addEvidence(new Evidence("grokassembly", "version",
|
||||||
|
version, Confidence.HIGHEST));
|
||||||
|
}
|
||||||
|
|
||||||
|
final String vendor = xpath.evaluate("/assembly/company", doc);
|
||||||
|
if (vendor != null) {
|
||||||
|
dependency.getVendorEvidence().addEvidence(new Evidence("grokassembly", "vendor",
|
||||||
|
vendor, Confidence.HIGH));
|
||||||
|
}
|
||||||
|
|
||||||
|
final String product = xpath.evaluate("/assembly/product", doc);
|
||||||
|
if (product != null) {
|
||||||
|
dependency.getProductEvidence().addEvidence(new Evidence("grokassembly", "product",
|
||||||
|
product, Confidence.HIGH));
|
||||||
|
}
|
||||||
|
|
||||||
|
} catch (IOException ioe) {
|
||||||
|
throw new AnalysisException(ioe);
|
||||||
|
} catch (SAXException saxe) {
|
||||||
|
throw new AnalysisException("Couldn't parse GrokAssembly result", saxe);
|
||||||
|
} catch (XPathExpressionException xpe) {
|
||||||
|
// This shouldn't happen
|
||||||
|
throw new AnalysisException(xpe);
|
||||||
|
} finally {
|
||||||
|
if (rdr != null) {
|
||||||
|
try {
|
||||||
|
rdr.close();
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.FINEST, "ignore", ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initialize the analyzer. In this case, extract GrokAssembly.exe to a temporary location.
|
||||||
|
*
|
||||||
|
* @throws Exception if anything goes wrong
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void initializeFileTypeAnalyzer() throws Exception {
|
||||||
|
final File tempFile = File.createTempFile("GKA", ".exe", Settings.getTempDirectory());
|
||||||
|
FileOutputStream fos = null;
|
||||||
|
InputStream is = null;
|
||||||
|
try {
|
||||||
|
fos = new FileOutputStream(tempFile);
|
||||||
|
is = AssemblyAnalyzer.class.getClassLoader().getResourceAsStream("GrokAssembly.exe");
|
||||||
|
final byte[] buff = new byte[4096];
|
||||||
|
int bread = -1;
|
||||||
|
while ((bread = is.read(buff)) >= 0) {
|
||||||
|
fos.write(buff, 0, bread);
|
||||||
|
}
|
||||||
|
grokAssemblyExe = tempFile;
|
||||||
|
// Set the temp file to get deleted when we're done
|
||||||
|
grokAssemblyExe.deleteOnExit();
|
||||||
|
LOGGER.log(Level.FINE, "analyzer.AssemblyAnalyzer.grokassembly.deployed", grokAssemblyExe.getPath());
|
||||||
|
} catch (IOException ioe) {
|
||||||
|
this.setEnabled(false);
|
||||||
|
LOGGER.log(Level.WARNING, "analyzer.AssemblyAnalyzer.grokassembly.notdeployed", ioe.getMessage());
|
||||||
|
throw new AnalysisException("Could not extract GrokAssembly.exe", ioe);
|
||||||
|
} finally {
|
||||||
|
if (fos != null) {
|
||||||
|
try {
|
||||||
|
fos.close();
|
||||||
|
} catch (Throwable e) {
|
||||||
|
LOGGER.fine("Error closing output stream");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (is != null) {
|
||||||
|
try {
|
||||||
|
is.close();
|
||||||
|
} catch (Throwable e) {
|
||||||
|
LOGGER.fine("Error closing input stream");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Now, need to see if GrokAssembly actually runs from this location.
|
||||||
|
final List<String> args = buildArgumentList();
|
||||||
|
BufferedReader rdr = null;
|
||||||
|
try {
|
||||||
|
final ProcessBuilder pb = new ProcessBuilder(args);
|
||||||
|
final Process p = pb.start();
|
||||||
|
// Try evacuating the error stream
|
||||||
|
rdr = new BufferedReader(new InputStreamReader(p.getErrorStream(), "UTF-8"));
|
||||||
|
// CHECKSTYLE:OFF
|
||||||
|
while (rdr.ready() && rdr.readLine() != null) {
|
||||||
|
// We expect this to complain
|
||||||
|
}
|
||||||
|
// CHECKSTYLE:ON
|
||||||
|
final Document doc = DocumentBuilderFactory.newInstance().newDocumentBuilder().parse(p.getInputStream());
|
||||||
|
final XPath xpath = XPathFactory.newInstance().newXPath();
|
||||||
|
final String error = xpath.evaluate("/assembly/error", doc);
|
||||||
|
if (p.waitFor() != 1 || error == null || "".equals(error)) {
|
||||||
|
LOGGER.warning("An error occurred with the .NET AssemblyAnalyzer, please see the log for more details.");
|
||||||
|
LOGGER.fine("GrokAssembly.exe is not working properly");
|
||||||
|
grokAssemblyExe = null;
|
||||||
|
this.setEnabled(false);
|
||||||
|
throw new AnalysisException("Could not execute .NET AssemblyAnalyzer");
|
||||||
|
}
|
||||||
|
} catch (Throwable e) {
|
||||||
|
if (e instanceof AnalysisException) {
|
||||||
|
throw (AnalysisException) e;
|
||||||
|
} else {
|
||||||
|
LOGGER.warning("analyzer.AssemblyAnalyzer.grokassembly.initialization.failed");
|
||||||
|
LOGGER.log(Level.FINE, "analyzer.AssemblyAnalyzer.grokassembly.initialization.message", e.getMessage());
|
||||||
|
this.setEnabled(false);
|
||||||
|
throw new AnalysisException("An error occured with the .NET AssemblyAnalyzer", e);
|
||||||
|
}
|
||||||
|
} finally {
|
||||||
|
if (rdr != null) {
|
||||||
|
try {
|
||||||
|
rdr.close();
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.FINEST, "ignore", ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
builder = DocumentBuilderFactory.newInstance().newDocumentBuilder();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void close() throws Exception {
|
||||||
|
super.close();
|
||||||
|
try {
|
||||||
|
if (grokAssemblyExe != null && !grokAssemblyExe.delete()) {
|
||||||
|
grokAssemblyExe.deleteOnExit();
|
||||||
|
}
|
||||||
|
} catch (SecurityException se) {
|
||||||
|
LOGGER.fine("analyzer.AssemblyAnalyzer.grokassembly.notdeleted");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the set of extensions supported by this analyzer.
|
||||||
|
*
|
||||||
|
* @return the list of supported extensions
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public Set<String> getSupportedExtensions() {
|
||||||
|
return SUPPORTED_EXTENSIONS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets this analyzer's name.
|
||||||
|
*
|
||||||
|
* @return the analyzer name
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public String getName() {
|
||||||
|
return ANALYZER_NAME;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the phase this analyzer runs under.
|
||||||
|
*
|
||||||
|
* @return the phase this runs under
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
|
return ANALYSIS_PHASE;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the key used in the properties file to reference the analyzer's enabled property.
|
||||||
|
*
|
||||||
|
* @return the analyzer's enabled property setting key
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_ASSEMBLY_ENABLED;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -33,6 +33,7 @@ import org.apache.lucene.queryparser.classic.ParseException;
|
|||||||
import org.apache.lucene.search.ScoreDoc;
|
import org.apache.lucene.search.ScoreDoc;
|
||||||
import org.apache.lucene.search.TopDocs;
|
import org.apache.lucene.search.TopDocs;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.data.cpe.CpeMemoryIndex;
|
import org.owasp.dependencycheck.data.cpe.CpeMemoryIndex;
|
||||||
import org.owasp.dependencycheck.data.cpe.Fields;
|
import org.owasp.dependencycheck.data.cpe.Fields;
|
||||||
import org.owasp.dependencycheck.data.cpe.IndexEntry;
|
import org.owasp.dependencycheck.data.cpe.IndexEntry;
|
||||||
@@ -50,13 +51,17 @@ import org.owasp.dependencycheck.utils.DependencyVersion;
|
|||||||
import org.owasp.dependencycheck.utils.DependencyVersionUtil;
|
import org.owasp.dependencycheck.utils.DependencyVersionUtil;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* CPEAnalyzer is a utility class that takes a project dependency and attempts to discern if there is an associated CPE.
|
* CPEAnalyzer is a utility class that takes a project dependency and attempts to discern if there is an associated CPE. It uses
|
||||||
* It uses the evidence contained within the dependency to search the Lucene index.
|
* the evidence contained within the dependency to search the Lucene index.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class CPEAnalyzer implements Analyzer {
|
public class CPEAnalyzer implements Analyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The Logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(CPEAnalyzer.class.getName());
|
||||||
/**
|
/**
|
||||||
* The maximum number of query results to return.
|
* The maximum number of query results to return.
|
||||||
*/
|
*/
|
||||||
@@ -86,23 +91,58 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
*/
|
*/
|
||||||
private CveDB cve;
|
private CveDB cve;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The URL to perform a search of the NVD CVE data at NIST.
|
||||||
|
*/
|
||||||
|
public static final String NVD_SEARCH_URL = "https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=%s";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the name of this analyzer.
|
||||||
|
*
|
||||||
|
* @return the name of this analyzer.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public String getName() {
|
||||||
|
return "CPE Analyzer";
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the analysis phase that this analyzer should run in.
|
||||||
|
*
|
||||||
|
* @return the analysis phase that this analyzer should run in.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
|
return AnalysisPhase.IDENTIFIER_ANALYSIS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates the CPE Lucene Index.
|
||||||
|
*
|
||||||
|
* @throws Exception is thrown if there is an issue opening the index.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void initialize() throws Exception {
|
||||||
|
this.open();
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Opens the data source.
|
* Opens the data source.
|
||||||
*
|
*
|
||||||
* @throws IOException when the Lucene directory to be queried does not exist or is corrupt.
|
* @throws IOException when the Lucene directory to be queried does not exist or is corrupt.
|
||||||
* @throws DatabaseException when the database throws an exception. This usually occurs when the database is in use
|
* @throws DatabaseException when the database throws an exception. This usually occurs when the database is in use by another
|
||||||
* by another process.
|
* process.
|
||||||
*/
|
*/
|
||||||
public void open() throws IOException, DatabaseException {
|
public void open() throws IOException, DatabaseException {
|
||||||
Logger.getLogger(CPEAnalyzer.class.getName()).log(Level.FINE, "Opening the CVE Database");
|
LOGGER.log(Level.FINE, "Opening the CVE Database");
|
||||||
cve = new CveDB();
|
cve = new CveDB();
|
||||||
cve.open();
|
cve.open();
|
||||||
Logger.getLogger(CPEAnalyzer.class.getName()).log(Level.FINE, "Creating the Lucene CPE Index");
|
LOGGER.log(Level.FINE, "Creating the Lucene CPE Index");
|
||||||
cpe = CpeMemoryIndex.getInstance();
|
cpe = CpeMemoryIndex.getInstance();
|
||||||
try {
|
try {
|
||||||
cpe.open(cve);
|
cpe.open(cve);
|
||||||
} catch (IndexException ex) {
|
} catch (IndexException ex) {
|
||||||
Logger.getLogger(CPEAnalyzer.class.getName()).log(Level.FINE, "IndexException", ex);
|
LOGGER.log(Level.FINE, "IndexException", ex);
|
||||||
throw new DatabaseException(ex);
|
throw new DatabaseException(ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -120,9 +160,13 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public boolean isOpen() {
|
||||||
|
return cpe != null && cpe.isOpen();
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Searches the data store of CPE entries, trying to identify the CPE for the given dependency based on the evidence
|
* Searches the data store of CPE entries, trying to identify the CPE for the given dependency based on the evidence contained
|
||||||
* contained within. The dependency passed in is updated with any identified CPE values.
|
* within. The dependency passed in is updated with any identified CPE values.
|
||||||
*
|
*
|
||||||
* @param dependency the dependency to search for CPE entries on.
|
* @param dependency the dependency to search for CPE entries on.
|
||||||
* @throws CorruptIndexException is thrown when the Lucene index is corrupt.
|
* @throws CorruptIndexException is thrown when the Lucene index is corrupt.
|
||||||
@@ -130,47 +174,45 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
* @throws ParseException is thrown when the Lucene query cannot be parsed.
|
* @throws ParseException is thrown when the Lucene query cannot be parsed.
|
||||||
*/
|
*/
|
||||||
protected void determineCPE(Dependency dependency) throws CorruptIndexException, IOException, ParseException {
|
protected void determineCPE(Dependency dependency) throws CorruptIndexException, IOException, ParseException {
|
||||||
Confidence confidence = Confidence.HIGHEST;
|
//TODO test dojo-war against this. we shold get dojo-toolkit:dojo-toolkit AND dojo-toolkit:toolkit
|
||||||
|
String vendors = "";
|
||||||
String vendors = addEvidenceWithoutDuplicateTerms("", dependency.getVendorEvidence(), confidence);
|
String products = "";
|
||||||
String products = addEvidenceWithoutDuplicateTerms("", dependency.getProductEvidence(), confidence);
|
for (Confidence confidence : Confidence.values()) {
|
||||||
/* bug fix for #40 - version evidence is not showing up as "used" in the reports if there is no
|
|
||||||
* CPE identified. As such, we are "using" the evidence and ignoring the results. */
|
|
||||||
addEvidenceWithoutDuplicateTerms("", dependency.getVersionEvidence(), confidence);
|
|
||||||
|
|
||||||
int ctr = 0;
|
|
||||||
do {
|
|
||||||
if (!vendors.isEmpty() && !products.isEmpty()) {
|
|
||||||
final List<IndexEntry> entries = searchCPE(vendors, products, dependency.getProductEvidence().getWeighting(),
|
|
||||||
dependency.getVendorEvidence().getWeighting());
|
|
||||||
|
|
||||||
for (IndexEntry e : entries) {
|
|
||||||
if (verifyEntry(e, dependency)) {
|
|
||||||
final String vendor = e.getVendor();
|
|
||||||
final String product = e.getProduct();
|
|
||||||
determineIdentifiers(dependency, vendor, product);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
confidence = reduceConfidence(confidence);
|
|
||||||
if (dependency.getVendorEvidence().contains(confidence)) {
|
if (dependency.getVendorEvidence().contains(confidence)) {
|
||||||
vendors = addEvidenceWithoutDuplicateTerms(vendors, dependency.getVendorEvidence(), confidence);
|
vendors = addEvidenceWithoutDuplicateTerms(vendors, dependency.getVendorEvidence(), confidence);
|
||||||
|
LOGGER.fine(String.format("vendor search: %s", vendors));
|
||||||
}
|
}
|
||||||
if (dependency.getProductEvidence().contains(confidence)) {
|
if (dependency.getProductEvidence().contains(confidence)) {
|
||||||
products = addEvidenceWithoutDuplicateTerms(products, dependency.getProductEvidence(), confidence);
|
products = addEvidenceWithoutDuplicateTerms(products, dependency.getProductEvidence(), confidence);
|
||||||
|
LOGGER.fine(String.format("product search: %s", products));
|
||||||
}
|
}
|
||||||
/* bug fix for #40 - version evidence is not showing up as "used" in the reports if there is no
|
if (!vendors.isEmpty() && !products.isEmpty()) {
|
||||||
* CPE identified. As such, we are "using" the evidence and ignoring the results. */
|
final List<IndexEntry> entries = searchCPE(vendors, products, dependency.getProductEvidence().getWeighting(),
|
||||||
if (dependency.getVersionEvidence().contains(confidence)) {
|
dependency.getVendorEvidence().getWeighting());
|
||||||
addEvidenceWithoutDuplicateTerms("", dependency.getVersionEvidence(), confidence);
|
if (entries == null) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
boolean identifierAdded = false;
|
||||||
|
for (IndexEntry e : entries) {
|
||||||
|
LOGGER.fine(String.format("Verifying entry: %s", e.toString()));
|
||||||
|
if (verifyEntry(e, dependency)) {
|
||||||
|
final String vendor = e.getVendor();
|
||||||
|
final String product = e.getProduct();
|
||||||
|
LOGGER.fine(String.format("identified vendor/product: %s/%s", vendor, product));
|
||||||
|
identifierAdded |= determineIdentifiers(dependency, vendor, product, confidence);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (identifierAdded) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
} while ((++ctr) < 4);
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the text created by concatenating the text and the values from the EvidenceCollection (filtered for a
|
* Returns the text created by concatenating the text and the values from the EvidenceCollection (filtered for a specific
|
||||||
* specific confidence). This attempts to prevent duplicate terms from being added.<br/<br/> Note, if the evidence
|
* confidence). This attempts to prevent duplicate terms from being added.<br/<br/> Note, if the evidence is longer then 200
|
||||||
* is longer then 200 characters it will be truncated.
|
* characters it will be truncated.
|
||||||
*
|
*
|
||||||
* @param text the base text.
|
* @param text the base text.
|
||||||
* @param ec an EvidenceCollection
|
* @param ec an EvidenceCollection
|
||||||
@@ -199,71 +241,55 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
return sb.toString().trim();
|
return sb.toString().trim();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Reduces the given confidence by one level. This returns LOW if the confidence passed in is not HIGH.
|
|
||||||
*
|
|
||||||
* @param c the confidence to reduce.
|
|
||||||
* @return One less then the confidence passed in.
|
|
||||||
*/
|
|
||||||
private Confidence reduceConfidence(final Confidence c) {
|
|
||||||
if (c == Confidence.HIGHEST) {
|
|
||||||
return Confidence.HIGH;
|
|
||||||
} else if (c == Confidence.HIGH) {
|
|
||||||
return Confidence.MEDIUM;
|
|
||||||
} else {
|
|
||||||
return Confidence.LOW;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* <p>
|
* <p>
|
||||||
* Searches the Lucene CPE index to identify possible CPE entries associated with the supplied vendor, product, and
|
* Searches the Lucene CPE index to identify possible CPE entries associated with the supplied vendor, product, and
|
||||||
* version.</p>
|
* version.</p>
|
||||||
*
|
*
|
||||||
* <p>
|
* <p>
|
||||||
* If either the vendorWeightings or productWeightings lists have been populated this data is used to add weighting
|
* If either the vendorWeightings or productWeightings lists have been populated this data is used to add weighting factors to
|
||||||
* factors to the search.</p>
|
* the search.</p>
|
||||||
*
|
*
|
||||||
* @param vendor the text used to search the vendor field
|
* @param vendor the text used to search the vendor field
|
||||||
* @param product the text used to search the product field
|
* @param product the text used to search the product field
|
||||||
* @param vendorWeightings a list of strings to use to add weighting factors to the vendor field
|
* @param vendorWeightings a list of strings to use to add weighting factors to the vendor field
|
||||||
* @param productWeightings Adds a list of strings that will be used to add weighting factors to the product search
|
* @param productWeightings Adds a list of strings that will be used to add weighting factors to the product search
|
||||||
* @return a list of possible CPE values
|
* @return a list of possible CPE values
|
||||||
* @throws CorruptIndexException when the Lucene index is corrupt
|
|
||||||
* @throws IOException when the Lucene index is not found
|
|
||||||
* @throws ParseException when the generated query is not valid
|
|
||||||
*/
|
*/
|
||||||
protected List<IndexEntry> searchCPE(String vendor, String product,
|
protected List<IndexEntry> searchCPE(String vendor, String product,
|
||||||
Set<String> vendorWeightings, Set<String> productWeightings)
|
Set<String> vendorWeightings, Set<String> productWeightings) {
|
||||||
throws CorruptIndexException, IOException, ParseException {
|
|
||||||
final ArrayList<IndexEntry> ret = new ArrayList<IndexEntry>(MAX_QUERY_RESULTS);
|
final List<IndexEntry> ret = new ArrayList<IndexEntry>(MAX_QUERY_RESULTS);
|
||||||
|
|
||||||
final String searchString = buildSearch(vendor, product, vendorWeightings, productWeightings);
|
final String searchString = buildSearch(vendor, product, vendorWeightings, productWeightings);
|
||||||
if (searchString == null) {
|
if (searchString == null) {
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
try {
|
||||||
final TopDocs docs = cpe.search(searchString, MAX_QUERY_RESULTS);
|
final TopDocs docs = cpe.search(searchString, MAX_QUERY_RESULTS);
|
||||||
for (ScoreDoc d : docs.scoreDocs) {
|
for (ScoreDoc d : docs.scoreDocs) {
|
||||||
if (d.score >= 0.08) {
|
if (d.score >= 0.08) {
|
||||||
final Document doc = cpe.getDocument(d.doc);
|
final Document doc = cpe.getDocument(d.doc);
|
||||||
final IndexEntry entry = new IndexEntry();
|
final IndexEntry entry = new IndexEntry();
|
||||||
entry.setVendor(doc.get(Fields.VENDOR));
|
entry.setVendor(doc.get(Fields.VENDOR));
|
||||||
entry.setProduct(doc.get(Fields.PRODUCT));
|
entry.setProduct(doc.get(Fields.PRODUCT));
|
||||||
// if (d.score < 0.08) {
|
entry.setSearchScore(d.score);
|
||||||
// System.out.print(entry.getVendor());
|
if (!ret.contains(entry)) {
|
||||||
// System.out.print(":");
|
ret.add(entry);
|
||||||
// System.out.print(entry.getProduct());
|
}
|
||||||
// System.out.print(":");
|
|
||||||
// System.out.println(d.score);
|
|
||||||
// }
|
|
||||||
entry.setSearchScore(d.score);
|
|
||||||
if (!ret.contains(entry)) {
|
|
||||||
ret.add(entry);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
return ret;
|
||||||
|
} catch (ParseException ex) {
|
||||||
|
final String msg = String.format("Unable to parse: %s", searchString);
|
||||||
|
LOGGER.log(Level.WARNING, "An error occured querying the CPE data. See the log for more details.");
|
||||||
|
LOGGER.log(Level.INFO, msg, ex);
|
||||||
|
} catch (IOException ex) {
|
||||||
|
final String msg = String.format("IO Error with search string: %s", searchString);
|
||||||
|
LOGGER.log(Level.WARNING, "An error occured reading CPE data. See the log for more details.");
|
||||||
|
LOGGER.log(Level.INFO, msg, ex);
|
||||||
}
|
}
|
||||||
return ret;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -271,8 +297,8 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
* Builds a Lucene search string by properly escaping data and constructing a valid search query.</p>
|
* Builds a Lucene search string by properly escaping data and constructing a valid search query.</p>
|
||||||
*
|
*
|
||||||
* <p>
|
* <p>
|
||||||
* If either the possibleVendor or possibleProducts lists have been populated this data is used to add weighting
|
* If either the possibleVendor or possibleProducts lists have been populated this data is used to add weighting factors to
|
||||||
* factors to the search string generated.</p>
|
* the search string generated.</p>
|
||||||
*
|
*
|
||||||
* @param vendor text to search the vendor field
|
* @param vendor text to search the vendor field
|
||||||
* @param product text to search the product field
|
* @param product text to search the product field
|
||||||
@@ -298,9 +324,8 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This method constructs a Lucene query for a given field. The searchText is split into separate words and if the
|
* This method constructs a Lucene query for a given field. The searchText is split into separate words and if the word is
|
||||||
* word is within the list of weighted words then an additional weighting is applied to the term as it is appended
|
* within the list of weighted words then an additional weighting is applied to the term as it is appended into the query.
|
||||||
* into the query.
|
|
||||||
*
|
*
|
||||||
* @param sb a StringBuilder that the query text will be appended to.
|
* @param sb a StringBuilder that the query text will be appended to.
|
||||||
* @param field the field within the Lucene index that the query is searching.
|
* @param field the field within the Lucene index that the query is searching.
|
||||||
@@ -371,8 +396,8 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Ensures that the CPE Identified matches the dependency. This validates that the product, vendor, and version
|
* Ensures that the CPE Identified matches the dependency. This validates that the product, vendor, and version information
|
||||||
* information for the CPE are contained within the dependencies evidence.
|
* for the CPE are contained within the dependencies evidence.
|
||||||
*
|
*
|
||||||
* @param entry a CPE entry.
|
* @param entry a CPE entry.
|
||||||
* @param dependency the dependency that the CPE entries could be for.
|
* @param dependency the dependency that the CPE entries could be for.
|
||||||
@@ -397,17 +422,6 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
* @return whether or not the EvidenceCollection contains the string
|
* @return whether or not the EvidenceCollection contains the string
|
||||||
*/
|
*/
|
||||||
private boolean collectionContainsString(EvidenceCollection ec, String text) {
|
private boolean collectionContainsString(EvidenceCollection ec, String text) {
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="This code fold contains an old version of the code, delete once more testing is done">
|
|
||||||
// String[] splitText = text.split("[\\s_-]");
|
|
||||||
//
|
|
||||||
// for (String search : splitText) {
|
|
||||||
// //final String search = text.replaceAll("[\\s_-]", "").toLowerCase();
|
|
||||||
// if (ec.containsUsedString(search)) {
|
|
||||||
// return true;
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
//</editor-fold>
|
|
||||||
//TODO - likely need to change the split... not sure if this will work for CPE with special chars
|
//TODO - likely need to change the split... not sure if this will work for CPE with special chars
|
||||||
if (text == null) {
|
if (text == null) {
|
||||||
return false;
|
return false;
|
||||||
@@ -429,9 +443,16 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
list.add(word);
|
list.add(word);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (tempWord != null && !list.isEmpty()) {
|
if (tempWord != null) {
|
||||||
final String tmp = list.get(list.size() - 1) + tempWord;
|
if (!list.isEmpty()) {
|
||||||
list.add(tmp);
|
final String tmp = list.get(list.size() - 1) + tempWord;
|
||||||
|
list.add(tmp);
|
||||||
|
} else {
|
||||||
|
list.add(tempWord);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (list.isEmpty()) {
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
boolean contains = true;
|
boolean contains = true;
|
||||||
for (String word : list) {
|
for (String word : list) {
|
||||||
@@ -461,72 +482,28 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns true because this analyzer supports all dependency types.
|
* Retrieves a list of CPE values from the CveDB based on the vendor and product passed in. The list is then validated to find
|
||||||
*
|
* only CPEs that are valid for the given dependency. It is possible that the CPE identified is a best effort "guess" based on
|
||||||
* @return true.
|
* the vendor, product, and version information.
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public Set<String> getSupportedExtensions() {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the name of this analyzer.
|
|
||||||
*
|
|
||||||
* @return the name of this analyzer.
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public String getName() {
|
|
||||||
return "CPE Analyzer";
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns true because this analyzer supports all dependency types.
|
|
||||||
*
|
|
||||||
* @param extension the file extension of the dependency being analyzed.
|
|
||||||
* @return true.
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the analysis phase that this analyzer should run in.
|
|
||||||
*
|
|
||||||
* @return the analysis phase that this analyzer should run in.
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public AnalysisPhase getAnalysisPhase() {
|
|
||||||
return AnalysisPhase.IDENTIFIER_ANALYSIS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Opens the CPE Lucene Index.
|
|
||||||
*
|
|
||||||
* @throws Exception is thrown if there is an issue opening the index.
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public void initialize() throws Exception {
|
|
||||||
this.open();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Retrieves a list of CPE values from the CveDB based on the vendor and product passed in. The list is then
|
|
||||||
* validated to find only CPEs that are valid for the given dependency. It is possible that the CPE identified is a
|
|
||||||
* best effort "guess" based on the vendor, product, and version information.
|
|
||||||
*
|
*
|
||||||
* @param dependency the Dependency being analyzed
|
* @param dependency the Dependency being analyzed
|
||||||
* @param vendor the vendor for the CPE being analyzed
|
* @param vendor the vendor for the CPE being analyzed
|
||||||
* @param product the product for the CPE being analyzed
|
* @param product the product for the CPE being analyzed
|
||||||
|
* @param currentConfidence the current confidence being used during analysis
|
||||||
|
* @return <code>true</code> if an identifier was added to the dependency; otherwise <code>false</code>
|
||||||
* @throws UnsupportedEncodingException is thrown if UTF-8 is not supported
|
* @throws UnsupportedEncodingException is thrown if UTF-8 is not supported
|
||||||
*/
|
*/
|
||||||
private void determineIdentifiers(Dependency dependency, String vendor, String product) throws UnsupportedEncodingException {
|
protected boolean determineIdentifiers(Dependency dependency, String vendor, String product,
|
||||||
|
Confidence currentConfidence) throws UnsupportedEncodingException {
|
||||||
final Set<VulnerableSoftware> cpes = cve.getCPEs(vendor, product);
|
final Set<VulnerableSoftware> cpes = cve.getCPEs(vendor, product);
|
||||||
DependencyVersion bestGuess = new DependencyVersion("-");
|
DependencyVersion bestGuess = new DependencyVersion("-");
|
||||||
Confidence bestGuessConf = null;
|
Confidence bestGuessConf = null;
|
||||||
|
boolean hasBroadMatch = false;
|
||||||
final List<IdentifierMatch> collected = new ArrayList<IdentifierMatch>();
|
final List<IdentifierMatch> collected = new ArrayList<IdentifierMatch>();
|
||||||
for (Confidence conf : Confidence.values()) {
|
for (Confidence conf : Confidence.values()) {
|
||||||
|
// if (conf.compareTo(currentConfidence) > 0) {
|
||||||
|
// break;
|
||||||
|
// }
|
||||||
for (Evidence evidence : dependency.getVersionEvidence().iterator(conf)) {
|
for (Evidence evidence : dependency.getVersionEvidence().iterator(conf)) {
|
||||||
final DependencyVersion evVer = DependencyVersionUtil.parseVersion(evidence.getValue());
|
final DependencyVersion evVer = DependencyVersionUtil.parseVersion(evidence.getValue());
|
||||||
if (evVer == null) {
|
if (evVer == null) {
|
||||||
@@ -539,9 +516,13 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
} else {
|
} else {
|
||||||
dbVer = DependencyVersionUtil.parseVersion(vs.getVersion());
|
dbVer = DependencyVersionUtil.parseVersion(vs.getVersion());
|
||||||
}
|
}
|
||||||
if (dbVer == null //special case, no version specified - everything is vulnerable
|
if (dbVer == null) { //special case, no version specified - everything is vulnerable
|
||||||
|| evVer.equals(dbVer)) { //yeah! exact match
|
hasBroadMatch = true;
|
||||||
final String url = String.format("http://web.nvd.nist.gov/view/vuln/search?cpe=%s", URLEncoder.encode(vs.getName(), "UTF-8"));
|
final String url = String.format(NVD_SEARCH_URL, URLEncoder.encode(vs.getName(), "UTF-8"));
|
||||||
|
final IdentifierMatch match = new IdentifierMatch("cpe", vs.getName(), url, IdentifierConfidence.BROAD_MATCH, conf);
|
||||||
|
collected.add(match);
|
||||||
|
} else if (evVer.equals(dbVer)) { //yeah! exact match
|
||||||
|
final String url = String.format(NVD_SEARCH_URL, URLEncoder.encode(vs.getName(), "UTF-8"));
|
||||||
final IdentifierMatch match = new IdentifierMatch("cpe", vs.getName(), url, IdentifierConfidence.EXACT_MATCH, conf);
|
final IdentifierMatch match = new IdentifierMatch("cpe", vs.getName(), url, IdentifierConfidence.EXACT_MATCH, conf);
|
||||||
collected.add(match);
|
collected.add(match);
|
||||||
} else {
|
} else {
|
||||||
@@ -566,7 +547,11 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
final String cpeName = String.format("cpe:/a:%s:%s:%s", vendor, product, bestGuess.toString());
|
final String cpeName = String.format("cpe:/a:%s:%s:%s", vendor, product, bestGuess.toString());
|
||||||
final String url = null; //String.format("http://web.nvd.nist.gov/view/vuln/search?cpe=%s", URLEncoder.encode(cpeName, "UTF-8"));
|
String url = null;
|
||||||
|
if (hasBroadMatch) { //if we have a broad match we can add the URL to the best guess.
|
||||||
|
final String cpeUrlName = String.format("cpe:/a:%s:%s", vendor, product);
|
||||||
|
url = String.format(NVD_SEARCH_URL, URLEncoder.encode(cpeUrlName, "UTF-8"));
|
||||||
|
}
|
||||||
if (bestGuessConf == null) {
|
if (bestGuessConf == null) {
|
||||||
bestGuessConf = Confidence.LOW;
|
bestGuessConf = Confidence.LOW;
|
||||||
}
|
}
|
||||||
@@ -576,6 +561,7 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
Collections.sort(collected);
|
Collections.sort(collected);
|
||||||
final IdentifierConfidence bestIdentifierQuality = collected.get(0).getConfidence();
|
final IdentifierConfidence bestIdentifierQuality = collected.get(0).getConfidence();
|
||||||
final Confidence bestEvidenceQuality = collected.get(0).getEvidenceConfidence();
|
final Confidence bestEvidenceQuality = collected.get(0).getEvidenceConfidence();
|
||||||
|
boolean identifierAdded = false;
|
||||||
for (IdentifierMatch m : collected) {
|
for (IdentifierMatch m : collected) {
|
||||||
if (bestIdentifierQuality.equals(m.getConfidence())
|
if (bestIdentifierQuality.equals(m.getConfidence())
|
||||||
&& bestEvidenceQuality.equals(m.getEvidenceConfidence())) {
|
&& bestEvidenceQuality.equals(m.getEvidenceConfidence())) {
|
||||||
@@ -586,8 +572,10 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
i.setConfidence(bestEvidenceQuality);
|
i.setConfidence(bestEvidenceQuality);
|
||||||
}
|
}
|
||||||
dependency.addIdentifier(i);
|
dependency.addIdentifier(i);
|
||||||
|
identifierAdded = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
return identifierAdded;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -602,7 +590,12 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
/**
|
/**
|
||||||
* A best guess for the CPE.
|
* A best guess for the CPE.
|
||||||
*/
|
*/
|
||||||
BEST_GUESS
|
BEST_GUESS,
|
||||||
|
/**
|
||||||
|
* The entire vendor/product group must be added (without a guess at version) because there is a CVE with a VS that only
|
||||||
|
* specifies vendor/product.
|
||||||
|
*/
|
||||||
|
BROAD_MATCH
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -748,8 +741,7 @@ public class CPEAnalyzer implements Analyzer {
|
|||||||
//</editor-fold>
|
//</editor-fold>
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Standard implementation of compareTo that compares identifier confidence, evidence confidence, and then the
|
* Standard implementation of compareTo that compares identifier confidence, evidence confidence, and then the identifier.
|
||||||
* identifier.
|
|
||||||
*
|
*
|
||||||
* @param o the IdentifierMatch to compare to
|
* @param o the IdentifierMatch to compare to
|
||||||
* @return the natural ordering of IdentifierMatch
|
* @return the natural ordering of IdentifierMatch
|
||||||
|
|||||||
@@ -0,0 +1,239 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.URL;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
import org.apache.commons.io.FileUtils;
|
||||||
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.data.central.CentralSearch;
|
||||||
|
import org.owasp.dependencycheck.data.nexus.MavenArtifact;
|
||||||
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.dependency.Evidence;
|
||||||
|
import org.owasp.dependencycheck.xml.pom.PomUtils;
|
||||||
|
import org.owasp.dependencycheck.utils.DownloadFailedException;
|
||||||
|
import org.owasp.dependencycheck.utils.Downloader;
|
||||||
|
import org.owasp.dependencycheck.utils.InvalidSettingException;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Analyzer which will attempt to locate a dependency, and the GAV information, by querying Central for the dependency's SHA-1
|
||||||
|
* digest.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*/
|
||||||
|
public class CentralAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(CentralAnalyzer.class.getName());
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The name of the analyzer.
|
||||||
|
*/
|
||||||
|
private static final String ANALYZER_NAME = "Central Analyzer";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The phase in which this analyzer runs.
|
||||||
|
*/
|
||||||
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The types of files on which this will work.
|
||||||
|
*/
|
||||||
|
private static final Set<String> SUPPORTED_EXTENSIONS = newHashSet("jar");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The analyzer should be disabled if there are errors, so this is a flag to determine if such an error has occurred.
|
||||||
|
*/
|
||||||
|
private boolean errorFlag = false;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The searcher itself.
|
||||||
|
*/
|
||||||
|
private CentralSearch searcher;
|
||||||
|
/**
|
||||||
|
* Field indicating if the analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private final boolean enabled = checkEnabled();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Determine whether to enable this analyzer or not.
|
||||||
|
*
|
||||||
|
* @return whether the analyzer should be enabled
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public boolean isEnabled() {
|
||||||
|
return enabled;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Determines if this analyzer is enabled.
|
||||||
|
*
|
||||||
|
* @return <code>true</code> if the analyzer is enabled; otherwise <code>false</code>
|
||||||
|
*/
|
||||||
|
private boolean checkEnabled() {
|
||||||
|
boolean retval = false;
|
||||||
|
|
||||||
|
try {
|
||||||
|
if (Settings.getBoolean(Settings.KEYS.ANALYZER_CENTRAL_ENABLED)) {
|
||||||
|
if (!Settings.getBoolean(Settings.KEYS.ANALYZER_NEXUS_ENABLED)
|
||||||
|
|| NexusAnalyzer.DEFAULT_URL.equals(Settings.getString(Settings.KEYS.ANALYZER_NEXUS_URL))) {
|
||||||
|
LOGGER.fine("Enabling the Central analyzer");
|
||||||
|
retval = true;
|
||||||
|
} else {
|
||||||
|
LOGGER.info("Nexus analyzer is enabled, disabling the Central Analyzer");
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
LOGGER.info("Central analyzer disabled");
|
||||||
|
}
|
||||||
|
} catch (InvalidSettingException ise) {
|
||||||
|
LOGGER.warning("Invalid setting. Disabling the Central analyzer");
|
||||||
|
}
|
||||||
|
return retval;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes the analyzer once before any analysis is performed.
|
||||||
|
*
|
||||||
|
* @throws Exception if there's an error during initialization
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void initializeFileTypeAnalyzer() throws Exception {
|
||||||
|
LOGGER.fine("Initializing Central analyzer");
|
||||||
|
LOGGER.fine(String.format("Central analyzer enabled: %s", isEnabled()));
|
||||||
|
if (isEnabled()) {
|
||||||
|
final String searchUrl = Settings.getString(Settings.KEYS.ANALYZER_CENTRAL_URL);
|
||||||
|
LOGGER.fine(String.format("Central Analyzer URL: %s", searchUrl));
|
||||||
|
searcher = new CentralSearch(new URL(searchUrl));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the analyzer's name.
|
||||||
|
*
|
||||||
|
* @return the name of the analyzer
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public String getName() {
|
||||||
|
return ANALYZER_NAME;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the key used in the properties file to to reference the analyzer's enabled property.
|
||||||
|
*
|
||||||
|
* @return the analyzer's enabled property setting key.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_CENTRAL_ENABLED;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the analysis phase under which the analyzer runs.
|
||||||
|
*
|
||||||
|
* @return the phase under which the analyzer runs
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
|
return ANALYSIS_PHASE;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the extensions for which this Analyzer runs.
|
||||||
|
*
|
||||||
|
* @return the extensions for which this Analyzer runs
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public Set<String> getSupportedExtensions() {
|
||||||
|
return SUPPORTED_EXTENSIONS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Performs the analysis.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency to analyze
|
||||||
|
* @param engine the engine
|
||||||
|
* @throws AnalysisException when there's an exception during analysis
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void analyzeFileType(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
|
if (errorFlag || !isEnabled()) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
final List<MavenArtifact> mas = searcher.searchSha1(dependency.getSha1sum());
|
||||||
|
final Confidence confidence = mas.size() > 1 ? Confidence.HIGH : Confidence.HIGHEST;
|
||||||
|
for (MavenArtifact ma : mas) {
|
||||||
|
LOGGER.fine(String.format("Central analyzer found artifact (%s) for dependency (%s)", ma.toString(), dependency.getFileName()));
|
||||||
|
dependency.addAsEvidence("central", ma, confidence);
|
||||||
|
boolean pomAnalyzed = false;
|
||||||
|
for (Evidence e : dependency.getVendorEvidence()) {
|
||||||
|
if ("pom".equals(e.getSource())) {
|
||||||
|
pomAnalyzed = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (!pomAnalyzed && ma.getPomUrl() != null) {
|
||||||
|
File pomFile = null;
|
||||||
|
try {
|
||||||
|
final File baseDir = Settings.getTempDirectory();
|
||||||
|
pomFile = File.createTempFile("pom", ".xml", baseDir);
|
||||||
|
if (!pomFile.delete()) {
|
||||||
|
final String msg = String.format("Unable to fetch pom.xml for %s from Central; "
|
||||||
|
+ "this could result in undetected CPE/CVEs.", dependency.getFileName());
|
||||||
|
LOGGER.warning(msg);
|
||||||
|
LOGGER.fine("Unable to delete temp file");
|
||||||
|
}
|
||||||
|
LOGGER.fine(String.format("Downloading %s", ma.getPomUrl()));
|
||||||
|
Downloader.fetchFile(new URL(ma.getPomUrl()), pomFile);
|
||||||
|
PomUtils.analyzePOM(dependency, pomFile);
|
||||||
|
|
||||||
|
} catch (DownloadFailedException ex) {
|
||||||
|
final String msg = String.format("Unable to download pom.xml for %s from Central; "
|
||||||
|
+ "this could result in undetected CPE/CVEs.", dependency.getFileName());
|
||||||
|
LOGGER.warning(msg);
|
||||||
|
} finally {
|
||||||
|
if (pomFile != null && !FileUtils.deleteQuietly(pomFile)) {
|
||||||
|
pomFile.deleteOnExit();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
} catch (IllegalArgumentException iae) {
|
||||||
|
LOGGER.info(String.format("invalid sha1-hash on %s", dependency.getFileName()));
|
||||||
|
} catch (FileNotFoundException fnfe) {
|
||||||
|
LOGGER.fine(String.format("Artifact not found in repository: '%s", dependency.getFileName()));
|
||||||
|
} catch (IOException ioe) {
|
||||||
|
LOGGER.log(Level.FINE, "Could not connect to Central search", ioe);
|
||||||
|
errorFlag = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -17,6 +17,7 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
import org.owasp.dependencycheck.suppression.SuppressionRule;
|
import org.owasp.dependencycheck.suppression.SuppressionRule;
|
||||||
@@ -25,11 +26,11 @@ import org.owasp.dependencycheck.suppression.SuppressionRule;
|
|||||||
* The suppression analyzer processes an externally defined XML document that complies with the suppressions.xsd schema.
|
* The suppression analyzer processes an externally defined XML document that complies with the suppressions.xsd schema.
|
||||||
* Any identified CPE entries within the dependencies that match will be removed.
|
* Any identified CPE entries within the dependencies that match will be removed.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class CpeSuppressionAnalyzer extends AbstractSuppressionAnalyzer {
|
public class CpeSuppressionAnalyzer extends AbstractSuppressionAnalyzer {
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implmentation details of Analyzer">
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer.
|
* The name of the analyzer.
|
||||||
*/
|
*/
|
||||||
|
|||||||
@@ -27,6 +27,7 @@ import java.util.logging.Logger;
|
|||||||
import java.util.regex.Matcher;
|
import java.util.regex.Matcher;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
import org.owasp.dependencycheck.dependency.Identifier;
|
import org.owasp.dependencycheck.dependency.Identifier;
|
||||||
import org.owasp.dependencycheck.utils.DependencyVersion;
|
import org.owasp.dependencycheck.utils.DependencyVersion;
|
||||||
@@ -35,31 +36,32 @@ import org.owasp.dependencycheck.utils.LogUtils;
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* <p>
|
* <p>
|
||||||
* This analyzer ensures dependencies that should be grouped together, to remove excess noise from the report, are
|
* This analyzer ensures dependencies that should be grouped together, to remove excess noise from the report, are grouped. An
|
||||||
* grouped. An example would be Spring, Spring Beans, Spring MVC, etc. If they are all for the same version and have the
|
* example would be Spring, Spring Beans, Spring MVC, etc. If they are all for the same version and have the same relative path
|
||||||
* same relative path then these should be grouped into a single dependency under the core/main library.</p>
|
* then these should be grouped into a single dependency under the core/main library.</p>
|
||||||
* <p>
|
* <p>
|
||||||
* Note, this grouping only works on dependencies with identified CVE entries</p>
|
* Note, this grouping only works on dependencies with identified CVE entries</p>
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Analyzer {
|
public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Analyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The Logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(DependencyBundlingAnalyzer.class.getName());
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="Constants and Member Variables">
|
//<editor-fold defaultstate="collapsed" desc="Constants and Member Variables">
|
||||||
/**
|
/**
|
||||||
* A pattern for obtaining the first part of a filename.
|
* A pattern for obtaining the first part of a filename.
|
||||||
*/
|
*/
|
||||||
private static final Pattern STARTING_TEXT_PATTERN = Pattern.compile("^[a-zA-Z]*");
|
private static final Pattern STARTING_TEXT_PATTERN = Pattern.compile("^[a-zA-Z0-9]*");
|
||||||
/**
|
/**
|
||||||
* a flag indicating if this analyzer has run. This analyzer only runs once.
|
* a flag indicating if this analyzer has run. This analyzer only runs once.
|
||||||
*/
|
*/
|
||||||
private boolean analyzed = false;
|
private boolean analyzed = false;
|
||||||
//</editor-fold>
|
//</editor-fold>
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
|
||||||
* The set of file extensions supported by this analyzer.
|
|
||||||
*/
|
|
||||||
private static final Set<String> EXTENSIONS = null;
|
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer.
|
* The name of the analyzer.
|
||||||
*/
|
*/
|
||||||
@@ -69,15 +71,6 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
*/
|
*/
|
||||||
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.PRE_FINDING_ANALYSIS;
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.PRE_FINDING_ANALYSIS;
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*
|
|
||||||
* @return a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public Set<String> getSupportedExtensions() {
|
|
||||||
return EXTENSIONS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the name of the analyzer.
|
* Returns the name of the analyzer.
|
||||||
*
|
*
|
||||||
@@ -87,16 +80,6 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
return ANALYZER_NAME;
|
return ANALYZER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the phase that the analyzer is intended to run in.
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
*
|
*
|
||||||
@@ -108,8 +91,8 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
//</editor-fold>
|
//</editor-fold>
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Analyzes a set of dependencies. If they have been found to have the same base path and the same set of
|
* Analyzes a set of dependencies. If they have been found to have the same base path and the same set of identifiers they are
|
||||||
* identifiers they are likely related. The related dependencies are bundled into a single reportable item.
|
* likely related. The related dependencies are bundled into a single reportable item.
|
||||||
*
|
*
|
||||||
* @param ignore this analyzer ignores the dependency being analyzed
|
* @param ignore this analyzer ignores the dependency being analyzed
|
||||||
* @param engine the engine that is scanning the dependencies
|
* @param engine the engine that is scanning the dependencies
|
||||||
@@ -124,30 +107,34 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
//for (Dependency nextDependency : engine.getDependencies()) {
|
//for (Dependency nextDependency : engine.getDependencies()) {
|
||||||
while (mainIterator.hasNext()) {
|
while (mainIterator.hasNext()) {
|
||||||
final Dependency dependency = mainIterator.next();
|
final Dependency dependency = mainIterator.next();
|
||||||
if (mainIterator.hasNext()) {
|
if (mainIterator.hasNext() && !dependenciesToRemove.contains(dependency)) {
|
||||||
final ListIterator<Dependency> subIterator = engine.getDependencies().listIterator(mainIterator.nextIndex());
|
final ListIterator<Dependency> subIterator = engine.getDependencies().listIterator(mainIterator.nextIndex());
|
||||||
while (subIterator.hasNext()) {
|
while (subIterator.hasNext()) {
|
||||||
final Dependency nextDependency = subIterator.next();
|
final Dependency nextDependency = subIterator.next();
|
||||||
if (isShadedJar(dependency, nextDependency)) {
|
if (hashesMatch(dependency, nextDependency)) {
|
||||||
if (dependency.getFileName().toLowerCase().endsWith("pom.xml")) {
|
if (firstPathIsShortest(dependency.getFilePath(), nextDependency.getFilePath())) {
|
||||||
dependenciesToRemove.add(dependency);
|
|
||||||
} else {
|
|
||||||
dependenciesToRemove.add(nextDependency);
|
|
||||||
}
|
|
||||||
} else if (hashesMatch(dependency, nextDependency)) {
|
|
||||||
if (isCore(dependency, nextDependency)) {
|
|
||||||
mergeDependencies(dependency, nextDependency, dependenciesToRemove);
|
mergeDependencies(dependency, nextDependency, dependenciesToRemove);
|
||||||
} else {
|
} else {
|
||||||
mergeDependencies(nextDependency, dependency, dependenciesToRemove);
|
mergeDependencies(nextDependency, dependency, dependenciesToRemove);
|
||||||
|
break; //since we merged into the next dependency - skip forward to the next in mainIterator
|
||||||
|
}
|
||||||
|
} else if (isShadedJar(dependency, nextDependency)) {
|
||||||
|
if (dependency.getFileName().toLowerCase().endsWith("pom.xml")) {
|
||||||
|
mergeDependencies(nextDependency, dependency, dependenciesToRemove);
|
||||||
|
nextDependency.getRelatedDependencies().remove(dependency);
|
||||||
|
break;
|
||||||
|
} else {
|
||||||
|
mergeDependencies(dependency, nextDependency, dependenciesToRemove);
|
||||||
|
nextDependency.getRelatedDependencies().remove(nextDependency);
|
||||||
}
|
}
|
||||||
} else if (cpeIdentifiersMatch(dependency, nextDependency)
|
} else if (cpeIdentifiersMatch(dependency, nextDependency)
|
||||||
&& hasSameBasePath(dependency, nextDependency)
|
&& hasSameBasePath(dependency, nextDependency)
|
||||||
&& fileNameMatch(dependency, nextDependency)) {
|
&& fileNameMatch(dependency, nextDependency)) {
|
||||||
|
|
||||||
if (isCore(dependency, nextDependency)) {
|
if (isCore(dependency, nextDependency)) {
|
||||||
mergeDependencies(dependency, nextDependency, dependenciesToRemove);
|
mergeDependencies(dependency, nextDependency, dependenciesToRemove);
|
||||||
} else {
|
} else {
|
||||||
mergeDependencies(nextDependency, dependency, dependenciesToRemove);
|
mergeDependencies(nextDependency, dependency, dependenciesToRemove);
|
||||||
|
break; //since we merged into the next dependency - skip forward to the next in mainIterator
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -155,9 +142,7 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
}
|
}
|
||||||
//removing dependencies here as ensuring correctness and avoiding ConcurrentUpdateExceptions
|
//removing dependencies here as ensuring correctness and avoiding ConcurrentUpdateExceptions
|
||||||
// was difficult because of the inner iterator.
|
// was difficult because of the inner iterator.
|
||||||
for (Dependency d : dependenciesToRemove) {
|
engine.getDependencies().removeAll(dependenciesToRemove);
|
||||||
engine.getDependencies().remove(d);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -165,10 +150,10 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
* Adds the relatedDependency to the dependency's related dependencies.
|
* Adds the relatedDependency to the dependency's related dependencies.
|
||||||
*
|
*
|
||||||
* @param dependency the main dependency
|
* @param dependency the main dependency
|
||||||
* @param relatedDependency a collection of dependencies to be removed from the main analysis loop, this is the
|
* @param relatedDependency a collection of dependencies to be removed from the main analysis loop, this is the source of
|
||||||
* source of dependencies to remove
|
* dependencies to remove
|
||||||
* @param dependenciesToRemove a collection of dependencies that will be removed from the main analysis loop, this
|
* @param dependenciesToRemove a collection of dependencies that will be removed from the main analysis loop, this function
|
||||||
* function adds to this collection
|
* adds to this collection
|
||||||
*/
|
*/
|
||||||
private void mergeDependencies(final Dependency dependency, final Dependency relatedDependency, final Set<Dependency> dependenciesToRemove) {
|
private void mergeDependencies(final Dependency dependency, final Dependency relatedDependency, final Set<Dependency> dependenciesToRemove) {
|
||||||
dependency.addRelatedDependency(relatedDependency);
|
dependency.addRelatedDependency(relatedDependency);
|
||||||
@@ -177,12 +162,14 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
dependency.addRelatedDependency(i.next());
|
dependency.addRelatedDependency(i.next());
|
||||||
i.remove();
|
i.remove();
|
||||||
}
|
}
|
||||||
|
if (dependency.getSha1sum().equals(relatedDependency.getSha1sum())) {
|
||||||
|
dependency.addAllProjectReferences(relatedDependency.getProjectReferences());
|
||||||
|
}
|
||||||
dependenciesToRemove.add(relatedDependency);
|
dependenciesToRemove.add(relatedDependency);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Attempts to trim a maven repo to a common base path. This is typically
|
* Attempts to trim a maven repo to a common base path. This is typically [drive]\[repo_location]\repository\[path1]\[path2].
|
||||||
* [drive]\[repo_location]\repository\[path1]\[path2].
|
|
||||||
*
|
*
|
||||||
* @param path the path to trim
|
* @param path the path to trim
|
||||||
* @return a string representing the base path.
|
* @return a string representing the base path.
|
||||||
@@ -218,25 +205,8 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
|| dependency2 == null || dependency2.getFileName() == null) {
|
|| dependency2 == null || dependency2.getFileName() == null) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
String fileName1 = dependency1.getFileName();
|
final String fileName1 = dependency1.getActualFile().getName();
|
||||||
String fileName2 = dependency2.getFileName();
|
final String fileName2 = dependency2.getActualFile().getName();
|
||||||
|
|
||||||
//update to deal with archive analyzer, the starting name maybe the same
|
|
||||||
// as this is incorrectly looking at the starting path
|
|
||||||
final File one = new File(fileName1);
|
|
||||||
final File two = new File(fileName2);
|
|
||||||
final String oneParent = one.getParent();
|
|
||||||
final String twoParent = two.getParent();
|
|
||||||
if (oneParent != null) {
|
|
||||||
if (oneParent.equals(twoParent)) {
|
|
||||||
fileName1 = one.getName();
|
|
||||||
fileName2 = two.getName();
|
|
||||||
} else {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} else if (twoParent != null) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
//version check
|
//version check
|
||||||
final DependencyVersion version1 = DependencyVersionUtil.parseVersion(fileName1);
|
final DependencyVersion version1 = DependencyVersionUtil.parseVersion(fileName1);
|
||||||
@@ -284,15 +254,17 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
}
|
}
|
||||||
if (cpeCount1 > 0 && cpeCount1 == cpeCount2) {
|
if (cpeCount1 > 0 && cpeCount1 == cpeCount2) {
|
||||||
for (Identifier i : dependency1.getIdentifiers()) {
|
for (Identifier i : dependency1.getIdentifiers()) {
|
||||||
matches |= dependency2.getIdentifiers().contains(i);
|
if ("cpe".equals(i.getType())) {
|
||||||
if (!matches) {
|
matches |= dependency2.getIdentifiers().contains(i);
|
||||||
break;
|
if (!matches) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (LogUtils.isVerboseLoggingEnabled()) {
|
if (LogUtils.isVerboseLoggingEnabled()) {
|
||||||
final String msg = String.format("IdentifiersMatch=%s (%s, %s)", matches, dependency1.getFileName(), dependency2.getFileName());
|
final String msg = String.format("IdentifiersMatch=%s (%s, %s)", matches, dependency1.getFileName(), dependency2.getFileName());
|
||||||
Logger.getLogger(DependencyBundlingAnalyzer.class.getName()).log(Level.FINE, msg);
|
LOGGER.log(Level.FINE, msg);
|
||||||
}
|
}
|
||||||
return matches;
|
return matches;
|
||||||
}
|
}
|
||||||
@@ -335,8 +307,8 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This is likely a very broken attempt at determining if the 'left' dependency is the 'core' library in comparison
|
* This is likely a very broken attempt at determining if the 'left' dependency is the 'core' library in comparison to the
|
||||||
* to the 'right' library.
|
* 'right' library.
|
||||||
*
|
*
|
||||||
* @param left the dependency to test
|
* @param left the dependency to test
|
||||||
* @param right the dependency to test against
|
* @param right the dependency to test against
|
||||||
@@ -355,6 +327,10 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
|| !rightName.contains("core") && leftName.contains("core")
|
|| !rightName.contains("core") && leftName.contains("core")
|
||||||
|| !rightName.contains("kernel") && leftName.contains("kernel")) {
|
|| !rightName.contains("kernel") && leftName.contains("kernel")) {
|
||||||
returnVal = true;
|
returnVal = true;
|
||||||
|
// } else if (leftName.matches(".*struts2\\-core.*") && rightName.matches(".*xwork\\-core.*")) {
|
||||||
|
// returnVal = true;
|
||||||
|
// } else if (rightName.matches(".*struts2\\-core.*") && leftName.matches(".*xwork\\-core.*")) {
|
||||||
|
// returnVal = false;
|
||||||
} else {
|
} else {
|
||||||
/*
|
/*
|
||||||
* considered splitting the names up and comparing the components,
|
* considered splitting the names up and comparing the components,
|
||||||
@@ -363,13 +339,13 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
* be shorter:
|
* be shorter:
|
||||||
* axis2-saaj-1.4.1.jar
|
* axis2-saaj-1.4.1.jar
|
||||||
* axis2-1.4.1.jar <-----
|
* axis2-1.4.1.jar <-----
|
||||||
* axis2-kernal-1.4.1.jar
|
* axis2-kernel-1.4.1.jar
|
||||||
*/
|
*/
|
||||||
returnVal = leftName.length() <= rightName.length();
|
returnVal = leftName.length() <= rightName.length();
|
||||||
}
|
}
|
||||||
if (LogUtils.isVerboseLoggingEnabled()) {
|
if (LogUtils.isVerboseLoggingEnabled()) {
|
||||||
final String msg = String.format("IsCore=%s (%s, %s)", returnVal, left.getFileName(), right.getFileName());
|
final String msg = String.format("IsCore=%s (%s, %s)", returnVal, left.getFileName(), right.getFileName());
|
||||||
Logger.getLogger(DependencyBundlingAnalyzer.class.getName()).log(Level.FINE, msg);
|
LOGGER.log(Level.FINE, msg);
|
||||||
}
|
}
|
||||||
return returnVal;
|
return returnVal;
|
||||||
}
|
}
|
||||||
@@ -389,13 +365,12 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Determines if the jar is shaded and the created pom.xml identified the same CPE as the jar - if so, the pom.xml
|
* Determines if the jar is shaded and the created pom.xml identified the same CPE as the jar - if so, the pom.xml dependency
|
||||||
* dependency should be removed.
|
* should be removed.
|
||||||
*
|
*
|
||||||
* @param dependency a dependency to check
|
* @param dependency a dependency to check
|
||||||
* @param nextDependency another dependency to check
|
* @param nextDependency another dependency to check
|
||||||
* @return true if on of the dependencies is a pom.xml and the identifiers between the two collections match;
|
* @return true if on of the dependencies is a pom.xml and the identifiers between the two collections match; otherwise false
|
||||||
* otherwise false
|
|
||||||
*/
|
*/
|
||||||
private boolean isShadedJar(Dependency dependency, Dependency nextDependency) {
|
private boolean isShadedJar(Dependency dependency, Dependency nextDependency) {
|
||||||
final String mainName = dependency.getFileName().toLowerCase();
|
final String mainName = dependency.getFileName().toLowerCase();
|
||||||
@@ -407,4 +382,43 @@ public class DependencyBundlingAnalyzer extends AbstractAnalyzer implements Anal
|
|||||||
}
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Determines which path is shortest; if path lengths are equal then we use compareTo of the string method to determine if the
|
||||||
|
* first path is smaller.
|
||||||
|
*
|
||||||
|
* @param left the first path to compare
|
||||||
|
* @param right the second path to compare
|
||||||
|
* @return <code>true</code> if the leftPath is the shortest; otherwise <code>false</code>
|
||||||
|
*/
|
||||||
|
protected boolean firstPathIsShortest(String left, String right) {
|
||||||
|
final String leftPath = left.replace('\\', '/');
|
||||||
|
final String rightPath = right.replace('\\', '/');
|
||||||
|
|
||||||
|
final int leftCount = countChar(leftPath, '/');
|
||||||
|
final int rightCount = countChar(rightPath, '/');
|
||||||
|
if (leftCount == rightCount) {
|
||||||
|
return leftPath.compareTo(rightPath) <= 0;
|
||||||
|
} else {
|
||||||
|
return leftCount < rightCount;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Counts the number of times the character is present in the string.
|
||||||
|
*
|
||||||
|
* @param string the string to count the characters in
|
||||||
|
* @param c the character to count
|
||||||
|
* @return the number of times the character is present in the string
|
||||||
|
*/
|
||||||
|
private int countChar(String string, char c) {
|
||||||
|
int count = 0;
|
||||||
|
final int max = string.length();
|
||||||
|
for (int i = 0; i < max; i++) {
|
||||||
|
if (c == string.charAt(i)) {
|
||||||
|
count++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return count;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -30,6 +30,7 @@ import java.util.logging.Logger;
|
|||||||
import java.util.regex.Matcher;
|
import java.util.regex.Matcher;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
import org.owasp.dependencycheck.dependency.Identifier;
|
import org.owasp.dependencycheck.dependency.Identifier;
|
||||||
import org.owasp.dependencycheck.dependency.VulnerableSoftware;
|
import org.owasp.dependencycheck.dependency.VulnerableSoftware;
|
||||||
@@ -37,15 +38,15 @@ import org.owasp.dependencycheck.dependency.VulnerableSoftware;
|
|||||||
/**
|
/**
|
||||||
* This analyzer attempts to remove some well known false positives - specifically regarding the java runtime.
|
* This analyzer attempts to remove some well known false positives - specifically regarding the java runtime.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implmentation details of Analyzer">
|
|
||||||
/**
|
/**
|
||||||
* The set of file extensions supported by this analyzer.
|
* The Logger.
|
||||||
*/
|
*/
|
||||||
private static final Set<String> EXTENSIONS = null;
|
private static final Logger LOGGER = Logger.getLogger(FalsePositiveAnalyzer.class.getName());
|
||||||
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer.
|
* The name of the analyzer.
|
||||||
*/
|
*/
|
||||||
@@ -55,15 +56,6 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
*/
|
*/
|
||||||
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.POST_IDENTIFIER_ANALYSIS;
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.POST_IDENTIFIER_ANALYSIS;
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*
|
|
||||||
* @return a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public Set<String> getSupportedExtensions() {
|
|
||||||
return EXTENSIONS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the name of the analyzer.
|
* Returns the name of the analyzer.
|
||||||
*
|
*
|
||||||
@@ -73,16 +65,6 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
return ANALYZER_NAME;
|
return ANALYZER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the phase that the analyzer is intended to run in.
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
*
|
*
|
||||||
@@ -104,11 +86,46 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
removeJreEntries(dependency);
|
removeJreEntries(dependency);
|
||||||
removeBadMatches(dependency);
|
removeBadMatches(dependency);
|
||||||
|
removeBadSpringMatches(dependency);
|
||||||
removeWrongVersionMatches(dependency);
|
removeWrongVersionMatches(dependency);
|
||||||
removeSpuriousCPE(dependency);
|
removeSpuriousCPE(dependency);
|
||||||
|
removeDuplicativeEntriesFromJar(dependency, engine);
|
||||||
addFalseNegativeCPEs(dependency);
|
addFalseNegativeCPEs(dependency);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Removes inaccurate matches on springframework CPEs.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency to test for and remove known inaccurate CPE matches
|
||||||
|
*/
|
||||||
|
private void removeBadSpringMatches(Dependency dependency) {
|
||||||
|
String mustContain = null;
|
||||||
|
for (Identifier i : dependency.getIdentifiers()) {
|
||||||
|
if ("maven".contains(i.getType())) {
|
||||||
|
if (i.getValue() != null && i.getValue().startsWith("org.springframework.")) {
|
||||||
|
final int endPoint = i.getValue().indexOf(":", 19);
|
||||||
|
if (endPoint >= 0) {
|
||||||
|
mustContain = i.getValue().substring(19, endPoint).toLowerCase();
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (mustContain != null) {
|
||||||
|
final Iterator<Identifier> itr = dependency.getIdentifiers().iterator();
|
||||||
|
while (itr.hasNext()) {
|
||||||
|
final Identifier i = itr.next();
|
||||||
|
if ("cpe".contains(i.getType())
|
||||||
|
&& i.getValue() != null
|
||||||
|
&& i.getValue().startsWith("cpe:/a:springsource:")
|
||||||
|
&& !i.getValue().toLowerCase().contains(mustContain)) {
|
||||||
|
itr.remove();
|
||||||
|
//dependency.getIdentifiers().remove(i);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* <p>
|
* <p>
|
||||||
* Intended to remove spurious CPE entries. By spurious we mean duplicate, less specific CPE entries.</p>
|
* Intended to remove spurious CPE entries. By spurious we mean duplicate, less specific CPE entries.</p>
|
||||||
@@ -154,8 +171,7 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
final String nextVersion = nextCpe.getVersion();
|
final String nextVersion = nextCpe.getVersion();
|
||||||
if (currentVersion == null && nextVersion == null) {
|
if (currentVersion == null && nextVersion == null) {
|
||||||
//how did we get here?
|
//how did we get here?
|
||||||
Logger.getLogger(FalsePositiveAnalyzer.class
|
LOGGER.log(Level.FINE, "currentVersion and nextVersion are both null?");
|
||||||
.getName()).log(Level.FINE, "currentVersion and nextVersion are both null?");
|
|
||||||
} else if (currentVersion == null && nextVersion != null) {
|
} else if (currentVersion == null && nextVersion != null) {
|
||||||
dependency.getIdentifiers().remove(currentId);
|
dependency.getIdentifiers().remove(currentId);
|
||||||
} else if (nextVersion == null && currentVersion != null) {
|
} else if (nextVersion == null && currentVersion != null) {
|
||||||
@@ -178,12 +194,21 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
* Regex to identify core java libraries and a few other commonly misidentified ones.
|
* Regex to identify core java libraries and a few other commonly misidentified ones.
|
||||||
*/
|
*/
|
||||||
public static final Pattern CORE_JAVA = Pattern.compile("^cpe:/a:(sun|oracle|ibm):(j2[ems]e|"
|
public static final Pattern CORE_JAVA = Pattern.compile("^cpe:/a:(sun|oracle|ibm):(j2[ems]e|"
|
||||||
+ "java(_platfrom_micro_edition|_runtime_environment|_se|virtual_machine|se_development_kit|fx)?|"
|
+ "java(_platform_micro_edition|_runtime_environment|_se|virtual_machine|se_development_kit|fx)?|"
|
||||||
+ "jdk|jre|jsf|jsse)($|:.*)");
|
+ "jdk|jre|jsse)($|:.*)");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Regex to identify core jsf libraries.
|
||||||
|
*/
|
||||||
|
public static final Pattern CORE_JAVA_JSF = Pattern.compile("^cpe:/a:(sun|oracle|ibm):jsf($|:.*)");
|
||||||
/**
|
/**
|
||||||
* Regex to identify core java library files. This is currently incomplete.
|
* Regex to identify core java library files. This is currently incomplete.
|
||||||
*/
|
*/
|
||||||
public static final Pattern CORE_FILES = Pattern.compile("^((alt[-])?rt|jsf[-].*|jsse|jfxrt|jfr|jce|javaws|deploy|charsets)\\.jar$");
|
public static final Pattern CORE_FILES = Pattern.compile("(^|/)((alt[-])?rt|jsse|jfxrt|jfr|jce|javaws|deploy|charsets)\\.jar$");
|
||||||
|
/**
|
||||||
|
* Regex to identify core jsf java library files. This is currently incomplete.
|
||||||
|
*/
|
||||||
|
public static final Pattern CORE_JSF_FILES = Pattern.compile("(^|/)jsf[-][^/]*\\.jar$");
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Removes any CPE entries for the JDK/JRE unless the filename ends with rt.jar
|
* Removes any CPE entries for the JDK/JRE unless the filename ends with rt.jar
|
||||||
@@ -200,27 +225,11 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
if (coreCPE.matches() && !coreFiles.matches()) {
|
if (coreCPE.matches() && !coreFiles.matches()) {
|
||||||
itr.remove();
|
itr.remove();
|
||||||
}
|
}
|
||||||
|
final Matcher coreJsfCPE = CORE_JAVA_JSF.matcher(i.getValue());
|
||||||
//replacecd with the regex above.
|
final Matcher coreJsfFiles = CORE_JSF_FILES.matcher(dependency.getFileName());
|
||||||
// if (("cpe:/a:sun:java".equals(i.getValue())
|
if (coreJsfCPE.matches() && !coreJsfFiles.matches()) {
|
||||||
// || "cpe:/a:oracle:java".equals(i.getValue())
|
itr.remove();
|
||||||
// || "cpe:/a:ibm:java".equals(i.getValue())
|
}
|
||||||
// || "cpe:/a:sun:j2se".equals(i.getValue())
|
|
||||||
// || "cpe:/a:oracle:j2se".equals(i.getValue())
|
|
||||||
// || i.getValue().startsWith("cpe:/a:sun:java:")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:sun:j2se:")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:sun:java:jre")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:sun:java:jdk")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:sun:java_se")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:oracle:java_se")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:oracle:java:")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:oracle:j2se:")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:oracle:jre")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:oracle:jdk")
|
|
||||||
// || i.getValue().startsWith("cpe:/a:ibm:java:"))
|
|
||||||
// && !dependency.getFileName().toLowerCase().endsWith("rt.jar")) {
|
|
||||||
// itr.remove();
|
|
||||||
// }
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -239,7 +248,7 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
try {
|
try {
|
||||||
cpe.parseName(value);
|
cpe.parseName(value);
|
||||||
} catch (UnsupportedEncodingException ex) {
|
} catch (UnsupportedEncodingException ex) {
|
||||||
Logger.getLogger(FalsePositiveAnalyzer.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
return cpe;
|
return cpe;
|
||||||
@@ -264,23 +273,48 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
//Set<Evidence> artifactId = dependency.getVendorEvidence().getEvidence("pom", "artifactid");
|
//Set<Evidence> artifactId = dependency.getVendorEvidence().getEvidence("pom", "artifactid");
|
||||||
while (itr.hasNext()) {
|
while (itr.hasNext()) {
|
||||||
final Identifier i = itr.next();
|
final Identifier i = itr.next();
|
||||||
//TODO move this startswith expression to a configuration file?
|
//TODO move this startsWith expression to a configuration file?
|
||||||
if ("cpe".equals(i.getType())) {
|
if ("cpe".equals(i.getType())) {
|
||||||
if ((i.getValue().matches(".*c\\+\\+.*")
|
if ((i.getValue().matches(".*c\\+\\+.*")
|
||||||
|| i.getValue().startsWith("cpe:/a:jquery:jquery")
|
|
||||||
|| i.getValue().startsWith("cpe:/a:prototypejs:prototype")
|
|
||||||
|| i.getValue().startsWith("cpe:/a:yahoo:yui")
|
|
||||||
|| i.getValue().startsWith("cpe:/a:file:file")
|
|| i.getValue().startsWith("cpe:/a:file:file")
|
||||||
|| i.getValue().startsWith("cpe:/a:mozilla:mozilla")
|
|| i.getValue().startsWith("cpe:/a:mozilla:mozilla")
|
||||||
|| i.getValue().startsWith("cpe:/a:cvs:cvs")
|
|| i.getValue().startsWith("cpe:/a:cvs:cvs")
|
||||||
|| i.getValue().startsWith("cpe:/a:ftp:ftp")
|
|| i.getValue().startsWith("cpe:/a:ftp:ftp")
|
||||||
|| i.getValue().startsWith("cpe:/a:ssh:ssh"))
|
|| i.getValue().startsWith("cpe:/a:tcp:tcp")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:ssh:ssh")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:lookup:lookup"))
|
||||||
|
&& (dependency.getFileName().toLowerCase().endsWith(".jar")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith("pom.xml")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith(".dll")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith(".exe")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith(".nuspec")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith(".nupkg"))) {
|
||||||
|
itr.remove();
|
||||||
|
} else if ((i.getValue().startsWith("cpe:/a:jquery:jquery")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:prototypejs:prototype")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:yahoo:yui"))
|
||||||
|
&& (dependency.getFileName().toLowerCase().endsWith(".jar")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith("pom.xml")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith(".dll")
|
||||||
|
|| dependency.getFileName().toLowerCase().endsWith(".exe"))) {
|
||||||
|
itr.remove();
|
||||||
|
} else if ((i.getValue().startsWith("cpe:/a:microsoft:excel")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:microsoft:word")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:microsoft:visio")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:microsoft:powerpoint")
|
||||||
|
|| i.getValue().startsWith("cpe:/a:microsoft:office"))
|
||||||
&& (dependency.getFileName().toLowerCase().endsWith(".jar")
|
&& (dependency.getFileName().toLowerCase().endsWith(".jar")
|
||||||
|| dependency.getFileName().toLowerCase().endsWith("pom.xml"))) {
|
|| dependency.getFileName().toLowerCase().endsWith("pom.xml"))) {
|
||||||
itr.remove();
|
itr.remove();
|
||||||
} else if (i.getValue().startsWith("cpe:/a:apache:maven")
|
} else if (i.getValue().startsWith("cpe:/a:apache:maven")
|
||||||
&& !dependency.getFileName().toLowerCase().matches("maven-core-[\\d\\.]+\\.jar")) {
|
&& !dependency.getFileName().toLowerCase().matches("maven-core-[\\d\\.]+\\.jar")) {
|
||||||
itr.remove();
|
itr.remove();
|
||||||
|
} else if (i.getValue().startsWith("cpe:/a:m-core:m-core")
|
||||||
|
&& !dependency.getEvidenceUsed().containsUsedString("m-core")) {
|
||||||
|
itr.remove();
|
||||||
|
} else if (i.getValue().startsWith("cpe:/a:jboss:jboss")
|
||||||
|
&& !dependency.getFileName().toLowerCase().matches("jboss-?[\\d\\.-]+(GA)?\\.jar")) {
|
||||||
|
itr.remove();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -327,6 +361,7 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
* @param dependency the dependency being analyzed
|
* @param dependency the dependency being analyzed
|
||||||
*/
|
*/
|
||||||
private void addFalseNegativeCPEs(Dependency dependency) {
|
private void addFalseNegativeCPEs(Dependency dependency) {
|
||||||
|
//TODO move this to the hint analyzer
|
||||||
final Iterator<Identifier> itr = dependency.getIdentifiers().iterator();
|
final Iterator<Identifier> itr = dependency.getIdentifiers().iterator();
|
||||||
while (itr.hasNext()) {
|
while (itr.hasNext()) {
|
||||||
final Identifier i = itr.next();
|
final Identifier i = itr.next();
|
||||||
@@ -342,21 +377,92 @@ public class FalsePositiveAnalyzer extends AbstractAnalyzer {
|
|||||||
try {
|
try {
|
||||||
dependency.addIdentifier("cpe",
|
dependency.addIdentifier("cpe",
|
||||||
newCpe,
|
newCpe,
|
||||||
String.format("http://web.nvd.nist.gov/view/vuln/search?cpe=%s", URLEncoder.encode(newCpe, "UTF-8")));
|
String.format(CPEAnalyzer.NVD_SEARCH_URL, URLEncoder.encode(newCpe, "UTF-8")));
|
||||||
dependency.addIdentifier("cpe",
|
dependency.addIdentifier("cpe",
|
||||||
newCpe2,
|
newCpe2,
|
||||||
String.format("http://web.nvd.nist.gov/view/vuln/search?cpe=%s", URLEncoder.encode(newCpe2, "UTF-8")));
|
String.format(CPEAnalyzer.NVD_SEARCH_URL, URLEncoder.encode(newCpe2, "UTF-8")));
|
||||||
dependency.addIdentifier("cpe",
|
dependency.addIdentifier("cpe",
|
||||||
newCpe3,
|
newCpe3,
|
||||||
String.format("http://web.nvd.nist.gov/view/vuln/search?cpe=%s", URLEncoder.encode(newCpe3, "UTF-8")));
|
String.format(CPEAnalyzer.NVD_SEARCH_URL, URLEncoder.encode(newCpe3, "UTF-8")));
|
||||||
dependency.addIdentifier("cpe",
|
dependency.addIdentifier("cpe",
|
||||||
newCpe4,
|
newCpe4,
|
||||||
String.format("http://web.nvd.nist.gov/view/vuln/search?cpe=%s", URLEncoder.encode(newCpe4, "UTF-8")));
|
String.format(CPEAnalyzer.NVD_SEARCH_URL, URLEncoder.encode(newCpe4, "UTF-8")));
|
||||||
} catch (UnsupportedEncodingException ex) {
|
} catch (UnsupportedEncodingException ex) {
|
||||||
Logger.getLogger(FalsePositiveAnalyzer.class
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
.getName()).log(Level.FINE, null, ex);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Removes duplicate entries identified that are contained within JAR files. These occasionally crop up due to POM
|
||||||
|
* entries or other types of files (such as DLLs and EXEs) being contained within the JAR.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency that might be a duplicate
|
||||||
|
* @param engine the engine used to scan all dependencies
|
||||||
|
*/
|
||||||
|
private void removeDuplicativeEntriesFromJar(Dependency dependency, Engine engine) {
|
||||||
|
if (dependency.getFileName().toLowerCase().endsWith("pom.xml")
|
||||||
|
|| "dll".equals(dependency.getFileExtension())
|
||||||
|
|| "exe".equals(dependency.getFileExtension())) {
|
||||||
|
String parentPath = dependency.getFilePath().toLowerCase();
|
||||||
|
if (parentPath.contains(".jar")) {
|
||||||
|
parentPath = parentPath.substring(0, parentPath.indexOf(".jar") + 4);
|
||||||
|
final Dependency parent = findDependency(parentPath, engine.getDependencies());
|
||||||
|
if (parent != null) {
|
||||||
|
boolean remove = false;
|
||||||
|
for (Identifier i : dependency.getIdentifiers()) {
|
||||||
|
if ("cpe".equals(i.getType())) {
|
||||||
|
final String trimmedCPE = trimCpeToVendor(i.getValue());
|
||||||
|
for (Identifier parentId : parent.getIdentifiers()) {
|
||||||
|
if ("cpe".equals(parentId.getType()) && parentId.getValue().startsWith(trimmedCPE)) {
|
||||||
|
remove |= true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (!remove) { //we can escape early
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (remove) {
|
||||||
|
engine.getDependencies().remove(dependency);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Retrieves a given dependency, based on a given path, from a list of dependencies.
|
||||||
|
*
|
||||||
|
* @param dependencyPath the path of the dependency to return
|
||||||
|
* @param dependencies the collection of dependencies to search
|
||||||
|
* @return the dependency object for the given path, otherwise null
|
||||||
|
*/
|
||||||
|
private Dependency findDependency(String dependencyPath, List<Dependency> dependencies) {
|
||||||
|
for (Dependency d : dependencies) {
|
||||||
|
if (d.getFilePath().equalsIgnoreCase(dependencyPath)) {
|
||||||
|
return d;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Takes a full CPE and returns the CPE trimmed to include only vendor and product.
|
||||||
|
*
|
||||||
|
* @param value the CPE value to trim
|
||||||
|
* @return a CPE value that only includes the vendor and product
|
||||||
|
*/
|
||||||
|
private String trimCpeToVendor(String value) {
|
||||||
|
//cpe:/a:jruby:jruby:1.0.8
|
||||||
|
final int pos1 = value.indexOf(":", 7); //right of vendor
|
||||||
|
final int pos2 = value.indexOf(":", pos1 + 1); //right of product
|
||||||
|
if (pos2 < 0) {
|
||||||
|
return value;
|
||||||
|
} else {
|
||||||
|
return value.substring(0, pos2);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -18,8 +18,8 @@
|
|||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.util.Set;
|
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.dependency.Confidence;
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
import org.owasp.dependencycheck.utils.DependencyVersion;
|
import org.owasp.dependencycheck.utils.DependencyVersion;
|
||||||
@@ -29,11 +29,11 @@ import org.owasp.dependencycheck.utils.DependencyVersionUtil;
|
|||||||
*
|
*
|
||||||
* Takes a dependency and analyzes the filename and determines the hashes.
|
* Takes a dependency and analyzes the filename and determines the hashes.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class FileNameAnalyzer extends AbstractAnalyzer implements Analyzer {
|
public class FileNameAnalyzer extends AbstractAnalyzer implements Analyzer {
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implmentation details of Analyzer">
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer.
|
* The name of the analyzer.
|
||||||
*/
|
*/
|
||||||
@@ -42,19 +42,6 @@ public class FileNameAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
* The phase that this analyzer is intended to run in.
|
* The phase that this analyzer is intended to run in.
|
||||||
*/
|
*/
|
||||||
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
||||||
/**
|
|
||||||
* The set of file extensions supported by this analyzer.
|
|
||||||
*/
|
|
||||||
private static final Set<String> EXTENSIONS = null;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*
|
|
||||||
* @return a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public Set<String> getSupportedExtensions() {
|
|
||||||
return EXTENSIONS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the name of the analyzer.
|
* Returns the name of the analyzer.
|
||||||
@@ -65,16 +52,6 @@ public class FileNameAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
return ANALYZER_NAME;
|
return ANALYZER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support.
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the phase that the analyzer is intended to run in.
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
*
|
*
|
||||||
@@ -96,7 +73,7 @@ public class FileNameAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
|
|
||||||
//strip any path information that may get added by ArchiveAnalyzer, etc.
|
//strip any path information that may get added by ArchiveAnalyzer, etc.
|
||||||
final File f = new File(dependency.getFileName());
|
final File f = dependency.getActualFile();
|
||||||
String fileName = f.getName();
|
String fileName = f.getName();
|
||||||
|
|
||||||
//remove file extension
|
//remove file extension
|
||||||
|
|||||||
@@ -0,0 +1,39 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* An Analyzer that scans specific file types.
|
||||||
|
*
|
||||||
|
* @author Jeremy Long
|
||||||
|
*/
|
||||||
|
public interface FileTypeAnalyzer extends Analyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether or not this analyzer can process the given extension.
|
||||||
|
*
|
||||||
|
* @param extension the file extension to test for support.
|
||||||
|
* @return whether or not the specified file extension is supported by this analyzer.
|
||||||
|
*/
|
||||||
|
boolean supportsExtension(String extension);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Resets the analyzers state.
|
||||||
|
*/
|
||||||
|
void reset();
|
||||||
|
}
|
||||||
@@ -19,19 +19,21 @@ package org.owasp.dependencycheck.analyzer;
|
|||||||
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
|
import java.util.List;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.dependency.Confidence;
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
import org.owasp.dependencycheck.dependency.Evidence;
|
import org.owasp.dependencycheck.dependency.Evidence;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class HintAnalyzer extends AbstractAnalyzer implements Analyzer {
|
public class HintAnalyzer extends AbstractAnalyzer implements Analyzer {
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implmentation details of Analyzer">
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer.
|
* The name of the analyzer.
|
||||||
*/
|
*/
|
||||||
@@ -40,52 +42,31 @@ public class HintAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
* The phase that this analyzer is intended to run in.
|
* The phase that this analyzer is intended to run in.
|
||||||
*/
|
*/
|
||||||
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.PRE_IDENTIFIER_ANALYSIS;
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.PRE_IDENTIFIER_ANALYSIS;
|
||||||
/**
|
|
||||||
* The set of file extensions supported by this analyzer.
|
|
||||||
*/
|
|
||||||
private static final Set<String> EXTENSIONS = null;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*
|
|
||||||
* @return a list of file EXTENSIONS supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public Set<String> getSupportedExtensions() {
|
|
||||||
return EXTENSIONS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the name of the analyzer.
|
* Returns the name of the analyzer.
|
||||||
*
|
*
|
||||||
* @return the name of the analyzer.
|
* @return the name of the analyzer.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public String getName() {
|
public String getName() {
|
||||||
return ANALYZER_NAME;
|
return ANALYZER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support.
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the phase that the analyzer is intended to run in.
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
*
|
*
|
||||||
* @return the phase that the analyzer is intended to run in.
|
* @return the phase that the analyzer is intended to run in.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public AnalysisPhase getAnalysisPhase() {
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
return ANALYSIS_PHASE;
|
return ANALYSIS_PHASE;
|
||||||
}
|
}
|
||||||
//</editor-fold>
|
//</editor-fold>
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The HintAnalyzer uses knowledge about a dependency to add additional information to help in identification of
|
* The HintAnalyzer uses knowledge about a dependency to add additional information to help in identification of identifiers
|
||||||
* identifiers or vulnerabilities.
|
* or vulnerabilities.
|
||||||
*
|
*
|
||||||
* @param dependency The dependency being analyzed
|
* @param dependency The dependency being analyzed
|
||||||
* @param engine The scanning engine
|
* @param engine The scanning engine
|
||||||
@@ -104,24 +85,39 @@ public class HintAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
Confidence.HIGH);
|
Confidence.HIGH);
|
||||||
|
|
||||||
final Evidence springTest3 = new Evidence("Manifest",
|
final Evidence springTest3 = new Evidence("Manifest",
|
||||||
|
"Implementation-Title",
|
||||||
|
"spring-core",
|
||||||
|
Confidence.HIGH);
|
||||||
|
|
||||||
|
final Evidence springTest4 = new Evidence("Manifest",
|
||||||
"Bundle-Vendor",
|
"Bundle-Vendor",
|
||||||
"SpringSource",
|
"SpringSource",
|
||||||
Confidence.HIGH);
|
Confidence.HIGH);
|
||||||
|
|
||||||
Set<Evidence> evidence = dependency.getProductEvidence().getEvidence();
|
final Evidence springTest5 = new Evidence("jar",
|
||||||
if (evidence.contains(springTest1) || evidence.contains(springTest2)) {
|
"package name",
|
||||||
dependency.getProductEvidence().addEvidence("hint analyzer", "product", "springsource_spring_framework", Confidence.HIGH);
|
"springframework",
|
||||||
|
Confidence.LOW);
|
||||||
|
|
||||||
|
//springsource/vware problem
|
||||||
|
final Set<Evidence> product = dependency.getProductEvidence().getEvidence();
|
||||||
|
final Set<Evidence> vendor = dependency.getVendorEvidence().getEvidence();
|
||||||
|
|
||||||
|
if (product.contains(springTest1) || product.contains(springTest2) || product.contains(springTest3)
|
||||||
|
|| (dependency.getFileName().contains("spring") && (product.contains(springTest5) || vendor.contains(springTest5)))) {
|
||||||
|
dependency.getProductEvidence().addEvidence("hint analyzer", "product", "springsource spring framework", Confidence.HIGH);
|
||||||
dependency.getVendorEvidence().addEvidence("hint analyzer", "vendor", "SpringSource", Confidence.HIGH);
|
dependency.getVendorEvidence().addEvidence("hint analyzer", "vendor", "SpringSource", Confidence.HIGH);
|
||||||
dependency.getVendorEvidence().addEvidence("hint analyzer", "vendor", "vmware", Confidence.HIGH);
|
dependency.getVendorEvidence().addEvidence("hint analyzer", "vendor", "vmware", Confidence.HIGH);
|
||||||
}
|
}
|
||||||
|
|
||||||
evidence = dependency.getVendorEvidence().getEvidence();
|
if (vendor.contains(springTest4)) {
|
||||||
if (evidence.contains(springTest3)) {
|
|
||||||
dependency.getProductEvidence().addEvidence("hint analyzer", "product", "springsource_spring_framework", Confidence.HIGH);
|
dependency.getProductEvidence().addEvidence("hint analyzer", "product", "springsource_spring_framework", Confidence.HIGH);
|
||||||
dependency.getVendorEvidence().addEvidence("hint analyzer", "vendor", "vmware", Confidence.HIGH);
|
dependency.getVendorEvidence().addEvidence("hint analyzer", "vendor", "vmware", Confidence.HIGH);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//sun/oracle problem
|
||||||
final Iterator<Evidence> itr = dependency.getVendorEvidence().iterator();
|
final Iterator<Evidence> itr = dependency.getVendorEvidence().iterator();
|
||||||
final ArrayList<Evidence> newEntries = new ArrayList<Evidence>();
|
final List<Evidence> newEntries = new ArrayList<Evidence>();
|
||||||
while (itr.hasNext()) {
|
while (itr.hasNext()) {
|
||||||
final Evidence e = itr.next();
|
final Evidence e = itr.next();
|
||||||
if ("sun".equalsIgnoreCase(e.getValue(false))) {
|
if ("sun".equalsIgnoreCase(e.getValue(false))) {
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@@ -13,24 +13,38 @@
|
|||||||
* See the License for the specific language governing permissions and
|
* See the License for the specific language governing permissions and
|
||||||
* limitations under the License.
|
* limitations under the License.
|
||||||
*
|
*
|
||||||
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.io.BufferedReader;
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.FileReader;
|
||||||
|
import java.io.IOException;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
import java.util.logging.Logger;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* Used to load a JAR file and collect information that can be used to determine the associated CPE.
|
* Used to analyze a JavaScript file to gather information to aid in identification of a CPE identifier.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class JavaScriptAnalyzer extends AbstractAnalyzer implements Analyzer {
|
public class JavaScriptAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
//<editor-fold defaultstate="collapsed" desc="All standard implmentation details of Analyzer">
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(JavaScriptAnalyzer.class.getName());
|
||||||
|
|
||||||
|
//<editor-fold defaultstate="collapsed" desc="All standard implementation details of Analyzer">
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer.
|
* The name of the analyzer.
|
||||||
*/
|
*/
|
||||||
@@ -49,6 +63,7 @@ public class JavaScriptAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
*
|
*
|
||||||
* @return a list of file EXTENSIONS supported by this analyzer.
|
* @return a list of file EXTENSIONS supported by this analyzer.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public Set<String> getSupportedExtensions() {
|
public Set<String> getSupportedExtensions() {
|
||||||
return EXTENSIONS;
|
return EXTENSIONS;
|
||||||
}
|
}
|
||||||
@@ -58,61 +73,69 @@ public class JavaScriptAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
*
|
*
|
||||||
* @return the name of the analyzer.
|
* @return the name of the analyzer.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public String getName() {
|
public String getName() {
|
||||||
return ANALYZER_NAME;
|
return ANALYZER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether or not this analyzer can process the given extension.
|
|
||||||
*
|
|
||||||
* @param extension the file extension to test for support.
|
|
||||||
* @return whether or not the specified file extension is supported by this analyzer.
|
|
||||||
*/
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return EXTENSIONS.contains(extension);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the phase that the analyzer is intended to run in.
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
*
|
*
|
||||||
* @return the phase that the analyzer is intended to run in.
|
* @return the phase that the analyzer is intended to run in.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public AnalysisPhase getAnalysisPhase() {
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
return ANALYSIS_PHASE;
|
return ANALYSIS_PHASE;
|
||||||
}
|
}
|
||||||
//</editor-fold>
|
//</editor-fold>
|
||||||
|
/**
|
||||||
|
* Returns the key used in the properties file to reference the analyzer's enabled property.
|
||||||
|
*
|
||||||
|
* @return the analyzer's enabled property setting key
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_JAVASCRIPT_ENABLED;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Loads a specified JAR file and collects information from the manifest and checksums to identify the correct CPE
|
* Loads a specified JavaScript file and collects information from the copyright information contained within.
|
||||||
* information.
|
|
||||||
*
|
*
|
||||||
* @param dependency the dependency to analyze.
|
* @param dependency the dependency to analyze.
|
||||||
* @param engine the engine that is scanning the dependencies
|
* @param engine the engine that is scanning the dependencies
|
||||||
* @throws AnalysisException is thrown if there is an error reading the JAR file.
|
* @throws AnalysisException is thrown if there is an error reading the JavaScript file.
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
public void analyzeFileType(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
final Pattern extractComments = Pattern.compile("(/\\*([^*]|[\\r\\n]|(\\*+([^*/]|[\\r\\n])))*\\*+/)|(//.*)");
|
BufferedReader fin = null;
|
||||||
|
try {
|
||||||
|
// /\*([^\*][^/]|[\r\n\f])+?\*/
|
||||||
|
final Pattern extractComments = Pattern.compile("(/\\*([^*]|[\\r\\n]|(\\*+([^*/]|[\\r\\n])))*\\*+/)|(//.*)", Pattern.MULTILINE);
|
||||||
|
File file = dependency.getActualFile();
|
||||||
|
fin = new BufferedReader(new FileReader(file));
|
||||||
|
StringBuilder sb = new StringBuilder(2000);
|
||||||
|
String text;
|
||||||
|
while ((text = fin.readLine()) != null) {
|
||||||
|
sb.append(text);
|
||||||
|
}
|
||||||
|
} catch (FileNotFoundException ex) {
|
||||||
|
final String msg = String.format("Dependency file not found: '%s'", dependency.getActualFilePath());
|
||||||
|
throw new AnalysisException(msg, ex);
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.SEVERE, null, ex);
|
||||||
|
} finally {
|
||||||
|
if (fin != null) {
|
||||||
|
try {
|
||||||
|
fin.close();
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* The initialize method does nothing for this Analyzer.
|
|
||||||
*
|
|
||||||
* @throws Exception thrown if there is an exception
|
|
||||||
*/
|
|
||||||
@Override
|
@Override
|
||||||
public void initialize() throws Exception {
|
protected void initializeFileTypeAnalyzer() throws Exception {
|
||||||
//do nothing
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The close method does nothing for this Analyzer.
|
|
||||||
*
|
|
||||||
* @throws Exception thrown if there is an exception
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public void close() throws Exception {
|
|
||||||
//do nothing
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -17,6 +17,7 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.net.MalformedURLException;
|
import java.net.MalformedURLException;
|
||||||
@@ -24,11 +25,18 @@ import java.net.URL;
|
|||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
|
import org.apache.commons.io.FileUtils;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.data.nexus.MavenArtifact;
|
import org.owasp.dependencycheck.data.nexus.MavenArtifact;
|
||||||
import org.owasp.dependencycheck.data.nexus.NexusSearch;
|
import org.owasp.dependencycheck.data.nexus.NexusSearch;
|
||||||
import org.owasp.dependencycheck.dependency.Confidence;
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.dependency.Evidence;
|
||||||
|
import org.owasp.dependencycheck.xml.pom.PomUtils;
|
||||||
|
import org.owasp.dependencycheck.utils.InvalidSettingException;
|
||||||
|
import org.owasp.dependencycheck.utils.DownloadFailedException;
|
||||||
|
import org.owasp.dependencycheck.utils.Downloader;
|
||||||
import org.owasp.dependencycheck.utils.Settings;
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -37,28 +45,33 @@ import org.owasp.dependencycheck.utils.Settings;
|
|||||||
* There are two settings which govern this behavior:
|
* There are two settings which govern this behavior:
|
||||||
*
|
*
|
||||||
* <ul>
|
* <ul>
|
||||||
* <li>{@link org.owasp.dependencycheck.utils.Settings.KEYS#ANALYZER_NEXUS_ENABLED} determines whether this analyzer is
|
* <li>{@link org.owasp.dependencycheck.utils.Settings.KEYS#ANALYZER_NEXUS_ENABLED} determines whether this analyzer is even
|
||||||
* even enabled. This can be overridden by setting the system property.</li>
|
* enabled. This can be overridden by setting the system property.</li>
|
||||||
* <li>{@link org.owasp.dependencycheck.utils.Settings.KEYS#ANALYZER_NEXUS_URL} the URL to a Nexus service to search by
|
* <li>{@link org.owasp.dependencycheck.utils.Settings.KEYS#ANALYZER_NEXUS_URL} the URL to a Nexus service to search by SHA-1.
|
||||||
* SHA-1. There is an expected <code>%s</code> in this where the SHA-1 will get entered.</li>
|
* There is an expected <code>%s</code> in this where the SHA-1 will get entered.</li>
|
||||||
* </ul>
|
* </ul>
|
||||||
*
|
*
|
||||||
* @author colezlaw
|
* @author colezlaw
|
||||||
*/
|
*/
|
||||||
public class NexusAnalyzer extends AbstractAnalyzer {
|
public class NexusAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The logger
|
* The default URL - this will be used by the CentralAnalyzer to determine whether to enable this.
|
||||||
|
*/
|
||||||
|
public static final String DEFAULT_URL = "https://repository.sonatype.org/service/local/";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
*/
|
*/
|
||||||
private static final Logger LOGGER = Logger.getLogger(NexusAnalyzer.class.getName());
|
private static final Logger LOGGER = Logger.getLogger(NexusAnalyzer.class.getName());
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The name of the analyzer
|
* The name of the analyzer.
|
||||||
*/
|
*/
|
||||||
private static final String ANALYZER_NAME = "Nexus Analyzer";
|
private static final String ANALYZER_NAME = "Nexus Analyzer";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The phase in which the analyzer runs
|
* The phase in which the analyzer runs.
|
||||||
*/
|
*/
|
||||||
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
||||||
|
|
||||||
@@ -67,36 +80,75 @@ public class NexusAnalyzer extends AbstractAnalyzer {
|
|||||||
*/
|
*/
|
||||||
private static final Set<String> SUPPORTED_EXTENSIONS = newHashSet("jar");
|
private static final Set<String> SUPPORTED_EXTENSIONS = newHashSet("jar");
|
||||||
|
|
||||||
/**
|
|
||||||
* Whether this is actually enabled. Will get set during initialization.
|
|
||||||
*/
|
|
||||||
private boolean enabled = false;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The Nexus Search to be set up for this analyzer.
|
* The Nexus Search to be set up for this analyzer.
|
||||||
*/
|
*/
|
||||||
private NexusSearch searcher;
|
private NexusSearch searcher;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Field indicating if the analyzer is enabled.
|
||||||
|
*/
|
||||||
|
private final boolean enabled = checkEnabled();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Determines if this analyzer is enabled
|
||||||
|
*
|
||||||
|
* @return <code>true</code> if the analyzer is enabled; otherwise <code>false</code>
|
||||||
|
*/
|
||||||
|
private boolean checkEnabled() {
|
||||||
|
/* Enable this analyzer ONLY if the Nexus URL has been set to something
|
||||||
|
other than the default one (if it's the default one, we'll use the
|
||||||
|
central one) and it's enabled by the user.
|
||||||
|
*/
|
||||||
|
boolean retval = false;
|
||||||
|
try {
|
||||||
|
if ((!DEFAULT_URL.equals(Settings.getString(Settings.KEYS.ANALYZER_NEXUS_URL)))
|
||||||
|
&& Settings.getBoolean(Settings.KEYS.ANALYZER_NEXUS_ENABLED)) {
|
||||||
|
LOGGER.info("Enabling Nexus analyzer");
|
||||||
|
retval = true;
|
||||||
|
} else {
|
||||||
|
LOGGER.fine("Nexus analyzer disabled, using Central instead");
|
||||||
|
}
|
||||||
|
} catch (InvalidSettingException ise) {
|
||||||
|
LOGGER.warning("Invalid setting. Disabling Nexus analyzer");
|
||||||
|
}
|
||||||
|
|
||||||
|
return retval;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Determine whether to enable this analyzer or not.
|
||||||
|
*
|
||||||
|
* @return whether the analyzer should be enabled
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public boolean isEnabled() {
|
||||||
|
return enabled;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Initializes the analyzer once before any analysis is performed.
|
* Initializes the analyzer once before any analysis is performed.
|
||||||
*
|
*
|
||||||
* @throws Exception if there's an error during initialization
|
* @throws Exception if there's an error during initialization
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public void initialize() throws Exception {
|
public void initializeFileTypeAnalyzer() throws Exception {
|
||||||
enabled = Settings.getBoolean(Settings.KEYS.ANALYZER_NEXUS_ENABLED);
|
|
||||||
LOGGER.fine("Initializing Nexus Analyzer");
|
LOGGER.fine("Initializing Nexus Analyzer");
|
||||||
LOGGER.fine(String.format("Nexus Analyzer enabled: %s", enabled));
|
LOGGER.fine(String.format("Nexus Analyzer enabled: %s", isEnabled()));
|
||||||
if (enabled) {
|
if (isEnabled()) {
|
||||||
final String searchUrl = Settings.getString(Settings.KEYS.ANALYZER_NEXUS_URL);
|
final String searchUrl = Settings.getString(Settings.KEYS.ANALYZER_NEXUS_URL);
|
||||||
LOGGER.fine(String.format("Nexus Analyzer URL: %s", searchUrl));
|
LOGGER.fine(String.format("Nexus Analyzer URL: %s", searchUrl));
|
||||||
try {
|
try {
|
||||||
searcher = new NexusSearch(new URL(searchUrl));
|
searcher = new NexusSearch(new URL(searchUrl));
|
||||||
|
if (!searcher.preflightRequest()) {
|
||||||
|
LOGGER.warning("There was an issue getting Nexus status. Disabling analyzer.");
|
||||||
|
setEnabled(false);
|
||||||
|
}
|
||||||
} catch (MalformedURLException mue) {
|
} catch (MalformedURLException mue) {
|
||||||
// I know that initialize can throw an exception, but we'll
|
// I know that initialize can throw an exception, but we'll
|
||||||
// just disable the analyzer if the URL isn't valid
|
// just disable the analyzer if the URL isn't valid
|
||||||
LOGGER.warning(String.format("Property %s not a valid URL. Nexus Analyzer disabled", searchUrl));
|
LOGGER.warning(String.format("Property %s not a valid URL. Nexus Analyzer disabled", searchUrl));
|
||||||
enabled = false;
|
setEnabled(false);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -111,6 +163,16 @@ public class NexusAnalyzer extends AbstractAnalyzer {
|
|||||||
return ANALYZER_NAME;
|
return ANALYZER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the key used in the properties file to reference the analyzer's enabled property.
|
||||||
|
*
|
||||||
|
* @return the analyzer's enabled property setting key
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_NEXUS_ENABLED;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the analysis phase under which the analyzer runs.
|
* Returns the analysis phase under which the analyzer runs.
|
||||||
*
|
*
|
||||||
@@ -131,17 +193,6 @@ public class NexusAnalyzer extends AbstractAnalyzer {
|
|||||||
return SUPPORTED_EXTENSIONS;
|
return SUPPORTED_EXTENSIONS;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Determines whether the incoming extension is supported.
|
|
||||||
*
|
|
||||||
* @param extension the extension to check for support
|
|
||||||
* @return whether the extension is supported
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return SUPPORTED_EXTENSIONS.contains(extension);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Performs the analysis.
|
* Performs the analysis.
|
||||||
*
|
*
|
||||||
@@ -150,32 +201,51 @@ public class NexusAnalyzer extends AbstractAnalyzer {
|
|||||||
* @throws AnalysisException when there's an exception during analysis
|
* @throws AnalysisException when there's an exception during analysis
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
public void analyzeFileType(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
// Make a quick exit if this analyzer is disabled
|
if (!isEnabled()) {
|
||||||
if (!enabled) {
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
final MavenArtifact ma = searcher.searchSha1(dependency.getSha1sum());
|
final MavenArtifact ma = searcher.searchSha1(dependency.getSha1sum());
|
||||||
if (ma.getGroupId() != null && !"".equals(ma.getGroupId())) {
|
dependency.addAsEvidence("nexus", ma, Confidence.HIGH);
|
||||||
dependency.getVendorEvidence().addEvidence("nexus", "groupid", ma.getGroupId(), Confidence.HIGH);
|
boolean pomAnalyzed = false;
|
||||||
|
LOGGER.fine("POM URL " + ma.getPomUrl());
|
||||||
|
for (Evidence e : dependency.getVendorEvidence()) {
|
||||||
|
if ("pom".equals(e.getSource())) {
|
||||||
|
pomAnalyzed = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if (ma.getArtifactId() != null && !"".equals(ma.getArtifactId())) {
|
if (!pomAnalyzed && ma.getPomUrl() != null) {
|
||||||
dependency.getProductEvidence().addEvidence("nexus", "artifactid", ma.getArtifactId(), Confidence.HIGH);
|
File pomFile = null;
|
||||||
}
|
try {
|
||||||
if (ma.getVersion() != null && !"".equals(ma.getVersion())) {
|
final File baseDir = Settings.getTempDirectory();
|
||||||
dependency.getVersionEvidence().addEvidence("nexus", "version", ma.getVersion(), Confidence.HIGH);
|
pomFile = File.createTempFile("pom", ".xml", baseDir);
|
||||||
}
|
if (!pomFile.delete()) {
|
||||||
if (ma.getArtifactUrl() != null && !"".equals(ma.getArtifactUrl())) {
|
final String msg = String.format("Unable to fetch pom.xml for %s from Nexus repository; "
|
||||||
dependency.addIdentifier("maven", ma.toString(), ma.getArtifactUrl(), Confidence.HIGHEST);
|
+ "this could result in undetected CPE/CVEs.", dependency.getFileName());
|
||||||
|
LOGGER.warning(msg);
|
||||||
|
LOGGER.fine("Unable to delete temp file");
|
||||||
|
}
|
||||||
|
LOGGER.fine(String.format("Downloading %s", ma.getPomUrl()));
|
||||||
|
Downloader.fetchFile(new URL(ma.getPomUrl()), pomFile);
|
||||||
|
PomUtils.analyzePOM(dependency, pomFile);
|
||||||
|
} catch (DownloadFailedException ex) {
|
||||||
|
final String msg = String.format("Unable to download pom.xml for %s from Nexus repository; "
|
||||||
|
+ "this could result in undetected CPE/CVEs.", dependency.getFileName());
|
||||||
|
LOGGER.warning(msg);
|
||||||
|
} finally {
|
||||||
|
if (pomFile != null && !FileUtils.deleteQuietly(pomFile)) {
|
||||||
|
pomFile.deleteOnExit();
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
} catch (IllegalArgumentException iae) {
|
} catch (IllegalArgumentException iae) {
|
||||||
//dependency.addAnalysisException(new AnalysisException("Invalid SHA-1"));
|
//dependency.addAnalysisException(new AnalysisException("Invalid SHA-1"));
|
||||||
LOGGER.info(String.format("invalid sha-1 hash on %s", dependency.getFileName()));
|
LOGGER.info(String.format("invalid sha-1 hash on %s", dependency.getFileName()));
|
||||||
} catch (FileNotFoundException fnfe) {
|
} catch (FileNotFoundException fnfe) {
|
||||||
//dependency.addAnalysisException(new AnalysisException("Artifact not found on repository"));
|
//dependency.addAnalysisException(new AnalysisException("Artifact not found on repository"));
|
||||||
LOGGER.fine(String.format("Artificat not found in repository '%s'", dependency.getFileName()));
|
LOGGER.fine(String.format("Artifact not found in repository '%s'", dependency.getFileName()));
|
||||||
LOGGER.log(Level.FINE, fnfe.getMessage(), fnfe);
|
LOGGER.log(Level.FINE, fnfe.getMessage(), fnfe);
|
||||||
} catch (IOException ioe) {
|
} catch (IOException ioe) {
|
||||||
//dependency.addAnalysisException(new AnalysisException("Could not connect to repository", ioe));
|
//dependency.addAnalysisException(new AnalysisException("Could not connect to repository", ioe));
|
||||||
@@ -183,5 +253,3 @@ public class NexusAnalyzer extends AbstractAnalyzer {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// vim: cc=120:sw=4:ts=4:sts=4
|
|
||||||
|
|||||||
@@ -0,0 +1,156 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.io.FileInputStream;
|
||||||
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.data.nuget.NugetPackage;
|
||||||
|
import org.owasp.dependencycheck.data.nuget.NuspecParseException;
|
||||||
|
import org.owasp.dependencycheck.data.nuget.NuspecParser;
|
||||||
|
import org.owasp.dependencycheck.data.nuget.XPathNuspecParser;
|
||||||
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Analyzer which will parse a Nuspec file to gather module information.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*/
|
||||||
|
public class NuspecAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(NuspecAnalyzer.class.getName());
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The name of the analyzer.
|
||||||
|
*/
|
||||||
|
private static final String ANALYZER_NAME = "Nuspec Analyzer";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The phase in which the analyzer runs.
|
||||||
|
*/
|
||||||
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The types of files on which this will work.
|
||||||
|
*/
|
||||||
|
private static final Set<String> SUPPORTED_EXTENSIONS = newHashSet("nuspec");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes the analyzer once before any analysis is performed.
|
||||||
|
*
|
||||||
|
* @throws Exception if there's an error during initialization
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void initializeFileTypeAnalyzer() throws Exception {
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the analyzer's name.
|
||||||
|
*
|
||||||
|
* @return the name of the analyzer
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public String getName() {
|
||||||
|
return ANALYZER_NAME;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the key used in the properties file to reference the analyzer's enabled property.
|
||||||
|
*
|
||||||
|
* @return the analyzer's enabled property setting key
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_NUSPEC_ENABLED;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the analysis phase under which the analyzer runs.
|
||||||
|
*
|
||||||
|
* @return the phase under which this analyzer runs
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
|
return ANALYSIS_PHASE;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the extensions for which this Analyzer runs.
|
||||||
|
*
|
||||||
|
* @return the extensions for which this Analyzer runs
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public Set<String> getSupportedExtensions() {
|
||||||
|
return SUPPORTED_EXTENSIONS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Performs the analysis.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency to analyze
|
||||||
|
* @param engine the engine
|
||||||
|
* @throws AnalysisException when there's an exception during analysis
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void analyzeFileType(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
|
LOGGER.log(Level.FINE, "Checking Nuspec file {0}", dependency.toString());
|
||||||
|
try {
|
||||||
|
final NuspecParser parser = new XPathNuspecParser();
|
||||||
|
NugetPackage np = null;
|
||||||
|
FileInputStream fis = null;
|
||||||
|
try {
|
||||||
|
fis = new FileInputStream(dependency.getActualFilePath());
|
||||||
|
np = parser.parse(fis);
|
||||||
|
} catch (NuspecParseException ex) {
|
||||||
|
throw new AnalysisException(ex);
|
||||||
|
} catch (FileNotFoundException ex) {
|
||||||
|
throw new AnalysisException(ex);
|
||||||
|
} finally {
|
||||||
|
if (fis != null) {
|
||||||
|
try {
|
||||||
|
fis.close();
|
||||||
|
} catch (IOException e) {
|
||||||
|
LOGGER.fine("Error closing input stream");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (np.getOwners() != null) {
|
||||||
|
dependency.getVendorEvidence().addEvidence("nuspec", "owners", np.getOwners(), Confidence.HIGHEST);
|
||||||
|
}
|
||||||
|
dependency.getVendorEvidence().addEvidence("nuspec", "authors", np.getAuthors(), Confidence.HIGH);
|
||||||
|
dependency.getVersionEvidence().addEvidence("nuspec", "version", np.getVersion(), Confidence.HIGHEST);
|
||||||
|
dependency.getProductEvidence().addEvidence("nuspec", "id", np.getId(), Confidence.HIGHEST);
|
||||||
|
if (np.getTitle() != null) {
|
||||||
|
dependency.getProductEvidence().addEvidence("nuspec", "title", np.getTitle(), Confidence.MEDIUM);
|
||||||
|
}
|
||||||
|
} catch (Throwable e) {
|
||||||
|
throw new AnalysisException(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -20,8 +20,8 @@ package org.owasp.dependencycheck.analyzer;
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.sql.SQLException;
|
import java.sql.SQLException;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Set;
|
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.DatabaseException;
|
import org.owasp.dependencycheck.data.nvdcve.DatabaseException;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
@@ -32,7 +32,7 @@ import org.owasp.dependencycheck.dependency.Vulnerability;
|
|||||||
* NvdCveAnalyzer is a utility class that takes a project dependency and attempts to discern if there is an associated
|
* NvdCveAnalyzer is a utility class that takes a project dependency and attempts to discern if there is an associated
|
||||||
* CVEs. It uses the the identifiers found by other analyzers to lookup the CVE data.
|
* CVEs. It uses the the identifiers found by other analyzers to lookup the CVE data.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class NvdCveAnalyzer implements Analyzer {
|
public class NvdCveAnalyzer implements Analyzer {
|
||||||
|
|
||||||
@@ -61,6 +61,7 @@ public class NvdCveAnalyzer implements Analyzer {
|
|||||||
/**
|
/**
|
||||||
* Closes the data source.
|
* Closes the data source.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public void close() {
|
public void close() {
|
||||||
cveDB.close();
|
cveDB.close();
|
||||||
cveDB = null;
|
cveDB = null;
|
||||||
@@ -95,6 +96,7 @@ public class NvdCveAnalyzer implements Analyzer {
|
|||||||
* @param engine The analysis engine
|
* @param engine The analysis engine
|
||||||
* @throws AnalysisException is thrown if there is an issue analyzing the dependency
|
* @throws AnalysisException is thrown if there is an issue analyzing the dependency
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
public void analyze(Dependency dependency, Engine engine) throws AnalysisException {
|
||||||
for (Identifier id : dependency.getIdentifiers()) {
|
for (Identifier id : dependency.getIdentifiers()) {
|
||||||
if ("cpe".equals(id.getType())) {
|
if ("cpe".equals(id.getType())) {
|
||||||
@@ -107,15 +109,17 @@ public class NvdCveAnalyzer implements Analyzer {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
for (Identifier id : dependency.getSuppressedIdentifiers()) {
|
||||||
|
if ("cpe".equals(id.getType())) {
|
||||||
/**
|
try {
|
||||||
* Returns true because this analyzer supports all dependency types.
|
final String value = id.getValue();
|
||||||
*
|
final List<Vulnerability> vulns = cveDB.getVulnerabilities(value);
|
||||||
* @return true.
|
dependency.getSuppressedVulnerabilities().addAll(vulns);
|
||||||
*/
|
} catch (DatabaseException ex) {
|
||||||
public Set<String> getSupportedExtensions() {
|
throw new AnalysisException(ex);
|
||||||
return null;
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -123,34 +127,27 @@ public class NvdCveAnalyzer implements Analyzer {
|
|||||||
*
|
*
|
||||||
* @return the name of this analyzer.
|
* @return the name of this analyzer.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public String getName() {
|
public String getName() {
|
||||||
return "NVD CVE Analyzer";
|
return "NVD CVE Analyzer";
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns true because this analyzer supports all dependency types.
|
|
||||||
*
|
|
||||||
* @param extension the file extension of the dependency being analyzed.
|
|
||||||
* @return true.
|
|
||||||
*/
|
|
||||||
public boolean supportsExtension(String extension) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the analysis phase that this analyzer should run in.
|
* Returns the analysis phase that this analyzer should run in.
|
||||||
*
|
*
|
||||||
* @return the analysis phase that this analyzer should run in.
|
* @return the analysis phase that this analyzer should run in.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public AnalysisPhase getAnalysisPhase() {
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
return AnalysisPhase.FINDING_ANALYSIS;
|
return AnalysisPhase.FINDING_ANALYSIS;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Opens the NVD CVE Lucene Index.
|
* Opens the database used to gather NVD CVE data.
|
||||||
*
|
*
|
||||||
* @throws Exception is thrown if there is an issue opening the index.
|
* @throws Exception is thrown if there is an issue opening the index.
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public void initialize() throws Exception {
|
public void initialize() throws Exception {
|
||||||
this.open();
|
this.open();
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -0,0 +1,368 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2015 Institute for Defense Analyses. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.io.BufferedInputStream;
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileInputStream;
|
||||||
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.FilenameFilter;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
import javax.mail.MessagingException;
|
||||||
|
import javax.mail.internet.InternetHeaders;
|
||||||
|
|
||||||
|
import org.apache.commons.io.filefilter.NameFileFilter;
|
||||||
|
import org.apache.commons.io.filefilter.SuffixFileFilter;
|
||||||
|
import org.apache.commons.io.input.AutoCloseInputStream;
|
||||||
|
import org.apache.commons.lang.StringUtils;
|
||||||
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.dependency.EvidenceCollection;
|
||||||
|
import org.owasp.dependencycheck.utils.ExtractionException;
|
||||||
|
import org.owasp.dependencycheck.utils.ExtractionUtil;
|
||||||
|
import org.owasp.dependencycheck.utils.FileUtils;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
import org.owasp.dependencycheck.utils.UrlStringUtils;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Used to analyze a Wheel or egg distribution files, or their contents in unzipped form, and collect information that can be used
|
||||||
|
* to determine the associated CPE.
|
||||||
|
*
|
||||||
|
* @author Dale Visser <dvisser@ida.org>
|
||||||
|
*/
|
||||||
|
public class PythonDistributionAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Name of egg metatdata files to analyze.
|
||||||
|
*/
|
||||||
|
private static final String PKG_INFO = "PKG-INFO";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Name of wheel metadata files to analyze.
|
||||||
|
*/
|
||||||
|
private static final String METADATA = "METADATA";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger
|
||||||
|
.getLogger(PythonDistributionAnalyzer.class.getName());
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The count of directories created during analysis. This is used for creating temporary directories.
|
||||||
|
*/
|
||||||
|
private static int dirCount = 0;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The name of the analyzer.
|
||||||
|
*/
|
||||||
|
private static final String ANALYZER_NAME = "Python Distribution Analyzer";
|
||||||
|
/**
|
||||||
|
* The phase that this analyzer is intended to run in.
|
||||||
|
*/
|
||||||
|
private static final AnalysisPhase ANALYSIS_PHASE = AnalysisPhase.INFORMATION_COLLECTION;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The set of file extensions supported by this analyzer.
|
||||||
|
*/
|
||||||
|
private static final Set<String> EXTENSIONS = newHashSet("whl", "egg",
|
||||||
|
"zip", METADATA, PKG_INFO);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Used to match on egg archive candidate extenssions.
|
||||||
|
*/
|
||||||
|
private static final Pattern EGG_OR_ZIP = Pattern.compile("egg|zip");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The parent directory for the individual directories per archive.
|
||||||
|
*/
|
||||||
|
private File tempFileLocation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Filter that detects *.dist-info files (but doesn't verify they are directories.
|
||||||
|
*/
|
||||||
|
private static final FilenameFilter DIST_INFO_FILTER = new SuffixFileFilter(
|
||||||
|
".dist-info");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Filter that detects files named "METADATA".
|
||||||
|
*/
|
||||||
|
private static final FilenameFilter EGG_INFO_FILTER = new NameFileFilter(
|
||||||
|
"EGG-INFO");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Filter that detects files named "METADATA".
|
||||||
|
*/
|
||||||
|
private static final FilenameFilter METADATA_FILTER = new NameFileFilter(
|
||||||
|
METADATA);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Filter that detects files named "PKG-INFO".
|
||||||
|
*/
|
||||||
|
private static final FilenameFilter PKG_INFO_FILTER = new NameFileFilter(
|
||||||
|
PKG_INFO);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns a list of file EXTENSIONS supported by this analyzer.
|
||||||
|
*
|
||||||
|
* @return a list of file EXTENSIONS supported by this analyzer.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public Set<String> getSupportedExtensions() {
|
||||||
|
return EXTENSIONS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the name of the analyzer.
|
||||||
|
*
|
||||||
|
* @return the name of the analyzer.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public String getName() {
|
||||||
|
return ANALYZER_NAME;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the phase that the analyzer is intended to run in.
|
||||||
|
*
|
||||||
|
* @return the phase that the analyzer is intended to run in.
|
||||||
|
*/
|
||||||
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
|
return ANALYSIS_PHASE;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the key used in the properties file to reference the analyzer's enabled property.
|
||||||
|
*
|
||||||
|
* @return the analyzer's enabled property setting key
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_PYTHON_DISTRIBUTION_ENABLED;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void analyzeFileType(Dependency dependency, Engine engine)
|
||||||
|
throws AnalysisException {
|
||||||
|
if ("whl".equals(dependency.getFileExtension())) {
|
||||||
|
collectMetadataFromArchiveFormat(dependency, DIST_INFO_FILTER,
|
||||||
|
METADATA_FILTER);
|
||||||
|
} else if (EGG_OR_ZIP.matcher(
|
||||||
|
StringUtils.stripToEmpty(dependency.getFileExtension()))
|
||||||
|
.matches()) {
|
||||||
|
collectMetadataFromArchiveFormat(dependency, EGG_INFO_FILTER,
|
||||||
|
PKG_INFO_FILTER);
|
||||||
|
} else {
|
||||||
|
final File actualFile = dependency.getActualFile();
|
||||||
|
final String name = actualFile.getName();
|
||||||
|
final boolean metadata = METADATA.equals(name);
|
||||||
|
if (metadata || PKG_INFO.equals(name)) {
|
||||||
|
final File parent = actualFile.getParentFile();
|
||||||
|
final String parentName = parent.getName();
|
||||||
|
dependency.setDisplayFileName(parentName + "/" + name);
|
||||||
|
if (parent.isDirectory()
|
||||||
|
&& (metadata && parentName.endsWith(".dist-info")
|
||||||
|
|| parentName.endsWith(".egg-info") || "EGG-INFO"
|
||||||
|
.equals(parentName))) {
|
||||||
|
collectWheelMetadata(dependency, actualFile);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Collects the meta data from an archive.
|
||||||
|
*
|
||||||
|
* @param dependency the archive being scanned
|
||||||
|
* @param folderFilter the filter to apply to the folder
|
||||||
|
* @param metadataFilter the filter to apply to the meta data
|
||||||
|
* @throws AnalysisException thrown when there is a problem analyzing the dependency
|
||||||
|
*/
|
||||||
|
private void collectMetadataFromArchiveFormat(Dependency dependency,
|
||||||
|
FilenameFilter folderFilter, FilenameFilter metadataFilter)
|
||||||
|
throws AnalysisException {
|
||||||
|
final File temp = getNextTempDirectory();
|
||||||
|
LOGGER.fine(String.format("%s exists? %b", temp, temp.exists()));
|
||||||
|
try {
|
||||||
|
ExtractionUtil.extractFilesUsingFilter(
|
||||||
|
new File(dependency.getActualFilePath()), temp,
|
||||||
|
metadataFilter);
|
||||||
|
} catch (ExtractionException ex) {
|
||||||
|
throw new AnalysisException(ex);
|
||||||
|
}
|
||||||
|
|
||||||
|
collectWheelMetadata(
|
||||||
|
dependency,
|
||||||
|
getMatchingFile(getMatchingFile(temp, folderFilter),
|
||||||
|
metadataFilter));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Makes sure a usable temporary directory is available.
|
||||||
|
*
|
||||||
|
* @throws Exception an AnalyzeException is thrown when the temp directory cannot be created
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected void initializeFileTypeAnalyzer() throws Exception {
|
||||||
|
final File baseDir = Settings.getTempDirectory();
|
||||||
|
tempFileLocation = File.createTempFile("check", "tmp", baseDir);
|
||||||
|
if (!tempFileLocation.delete()) {
|
||||||
|
final String msg = String.format(
|
||||||
|
"Unable to delete temporary file '%s'.",
|
||||||
|
tempFileLocation.getAbsolutePath());
|
||||||
|
throw new AnalysisException(msg);
|
||||||
|
}
|
||||||
|
if (!tempFileLocation.mkdirs()) {
|
||||||
|
final String msg = String.format(
|
||||||
|
"Unable to create directory '%s'.",
|
||||||
|
tempFileLocation.getAbsolutePath());
|
||||||
|
throw new AnalysisException(msg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Deletes any files extracted from the Wheel during analysis.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void close() {
|
||||||
|
if (tempFileLocation != null && tempFileLocation.exists()) {
|
||||||
|
LOGGER.log(Level.FINE, "Attempting to delete temporary files");
|
||||||
|
final boolean success = FileUtils.delete(tempFileLocation);
|
||||||
|
if (!success) {
|
||||||
|
LOGGER.log(Level.WARNING,
|
||||||
|
"Failed to delete some temporary files, see the log for more details");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gathers evidence from the METADATA file.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency being analyzed
|
||||||
|
* @param file a reference to the manifest/properties file
|
||||||
|
* @throws AnalysisException thrown when there is an error
|
||||||
|
*/
|
||||||
|
private static void collectWheelMetadata(Dependency dependency, File file)
|
||||||
|
throws AnalysisException {
|
||||||
|
final InternetHeaders headers = getManifestProperties(file);
|
||||||
|
addPropertyToEvidence(headers, dependency.getVersionEvidence(),
|
||||||
|
"Version", Confidence.HIGHEST);
|
||||||
|
addPropertyToEvidence(headers, dependency.getProductEvidence(), "Name",
|
||||||
|
Confidence.HIGHEST);
|
||||||
|
final String url = headers.getHeader("Home-page", null);
|
||||||
|
final EvidenceCollection vendorEvidence = dependency
|
||||||
|
.getVendorEvidence();
|
||||||
|
if (StringUtils.isNotBlank(url)) {
|
||||||
|
if (UrlStringUtils.isUrl(url)) {
|
||||||
|
vendorEvidence.addEvidence(METADATA, "vendor", url,
|
||||||
|
Confidence.MEDIUM);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
addPropertyToEvidence(headers, vendorEvidence, "Author", Confidence.LOW);
|
||||||
|
final String summary = headers.getHeader("Summary", null);
|
||||||
|
if (StringUtils.isNotBlank(summary)) {
|
||||||
|
JarAnalyzer
|
||||||
|
.addDescription(dependency, summary, METADATA, "summary");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds a value to the evidence collection.
|
||||||
|
*
|
||||||
|
* @param headers the properties collection
|
||||||
|
* @param evidence the evidence collection to add the value
|
||||||
|
* @param property the property name
|
||||||
|
* @param confidence the confidence of the evidence
|
||||||
|
*/
|
||||||
|
private static void addPropertyToEvidence(InternetHeaders headers,
|
||||||
|
EvidenceCollection evidence, String property, Confidence confidence) {
|
||||||
|
final String value = headers.getHeader(property, null);
|
||||||
|
LOGGER.fine(String.format("Property: %s, Value: %s", property, value));
|
||||||
|
if (StringUtils.isNotBlank(value)) {
|
||||||
|
evidence.addEvidence(METADATA, property, value, confidence);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns a list of files that match the given filter, this does not recursively scan the directory.
|
||||||
|
*
|
||||||
|
* @param folder the folder to filter
|
||||||
|
* @param filter the filter to apply to the files in the directory
|
||||||
|
* @return the list of Files in the directory that match the provided filter
|
||||||
|
*/
|
||||||
|
private static File getMatchingFile(File folder, FilenameFilter filter) {
|
||||||
|
File result = null;
|
||||||
|
final File[] matches = folder.listFiles(filter);
|
||||||
|
if (null != matches && 1 == matches.length) {
|
||||||
|
result = matches[0];
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Reads the manifest entries from the provided file.
|
||||||
|
*
|
||||||
|
* @param manifest the manifest
|
||||||
|
* @return the manifest entries
|
||||||
|
*/
|
||||||
|
private static InternetHeaders getManifestProperties(File manifest) {
|
||||||
|
final InternetHeaders result = new InternetHeaders();
|
||||||
|
if (null == manifest) {
|
||||||
|
LOGGER.fine("Manifest file not found.");
|
||||||
|
} else {
|
||||||
|
try {
|
||||||
|
result.load(new AutoCloseInputStream(new BufferedInputStream(
|
||||||
|
new FileInputStream(manifest))));
|
||||||
|
} catch (MessagingException e) {
|
||||||
|
LOGGER.log(Level.WARNING, e.getMessage(), e);
|
||||||
|
} catch (FileNotFoundException e) {
|
||||||
|
LOGGER.log(Level.WARNING, e.getMessage(), e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Retrieves the next temporary destingation directory for extracting an archive.
|
||||||
|
*
|
||||||
|
* @return a directory
|
||||||
|
* @throws AnalysisException thrown if unable to create temporary directory
|
||||||
|
*/
|
||||||
|
private File getNextTempDirectory() throws AnalysisException {
|
||||||
|
File directory;
|
||||||
|
|
||||||
|
// getting an exception for some directories not being able to be
|
||||||
|
// created; might be because the directory already exists?
|
||||||
|
do {
|
||||||
|
dirCount += 1;
|
||||||
|
directory = new File(tempFileLocation, String.valueOf(dirCount));
|
||||||
|
} while (directory.exists());
|
||||||
|
if (!directory.mkdirs()) {
|
||||||
|
throw new AnalysisException(String.format(
|
||||||
|
"Unable to create temp directory '%s'.",
|
||||||
|
directory.getAbsolutePath()));
|
||||||
|
}
|
||||||
|
return directory;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,323 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2015 Institute for Defense Analyses. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileFilter;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.MalformedURLException;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
import java.util.regex.Matcher;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
import org.apache.commons.io.FileUtils;
|
||||||
|
import org.apache.commons.io.filefilter.NameFileFilter;
|
||||||
|
import org.apache.commons.io.filefilter.SuffixFileFilter;
|
||||||
|
import org.owasp.dependencycheck.Engine;
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
|
import org.owasp.dependencycheck.dependency.Confidence;
|
||||||
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
|
import org.owasp.dependencycheck.dependency.EvidenceCollection;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
import org.owasp.dependencycheck.utils.UrlStringUtils;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Used to analyze a Python package, and collect information that can be used to determine the associated CPE.
|
||||||
|
*
|
||||||
|
* @author Dale Visser <dvisser@ida.org>
|
||||||
|
*/
|
||||||
|
public class PythonPackageAnalyzer extends AbstractFileTypeAnalyzer {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Used when compiling file scanning regex patterns.
|
||||||
|
*/
|
||||||
|
private static final int REGEX_OPTIONS = Pattern.DOTALL
|
||||||
|
| Pattern.CASE_INSENSITIVE;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger
|
||||||
|
.getLogger(PythonDistributionAnalyzer.class.getName());
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Filename extensions for files to be analyzed.
|
||||||
|
*/
|
||||||
|
private static final Set<String> EXTENSIONS = Collections
|
||||||
|
.unmodifiableSet(Collections.singleton("py"));
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Pattern for matching the module docstring in a source file.
|
||||||
|
*/
|
||||||
|
private static final Pattern MODULE_DOCSTRING = Pattern.compile(
|
||||||
|
"^(['\\\"]{3})(.*?)\\1", REGEX_OPTIONS);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Matches assignments to version variables in Python source code.
|
||||||
|
*/
|
||||||
|
private static final Pattern VERSION_PATTERN = Pattern.compile(
|
||||||
|
"\\b(__)?version(__)? *= *(['\"]+)(\\d+\\.\\d+.*?)\\3",
|
||||||
|
REGEX_OPTIONS);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Matches assignments to title variables in Python source code.
|
||||||
|
*/
|
||||||
|
private static final Pattern TITLE_PATTERN = compileAssignPattern("title");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Matches assignments to summary variables in Python source code.
|
||||||
|
*/
|
||||||
|
private static final Pattern SUMMARY_PATTERN = compileAssignPattern("summary");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Matches assignments to URL/URL variables in Python source code.
|
||||||
|
*/
|
||||||
|
private static final Pattern URI_PATTERN = compileAssignPattern("ur[il]");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Matches assignments to home page variables in Python source code.
|
||||||
|
*/
|
||||||
|
private static final Pattern HOMEPAGE_PATTERN = compileAssignPattern("home_?page");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Matches assignments to author variables in Python source code.
|
||||||
|
*/
|
||||||
|
private static final Pattern AUTHOR_PATTERN = compileAssignPattern("author");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Filter that detects files named "__init__.py".
|
||||||
|
*/
|
||||||
|
private static final FileFilter INIT_PY_FILTER = new NameFileFilter("__init__.py");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The file filter for python files.
|
||||||
|
*/
|
||||||
|
private static final FileFilter PY_FILTER = new SuffixFileFilter(".py");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the name of the Python Package Analyzer.
|
||||||
|
*
|
||||||
|
* @return the name of the analyzer
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public String getName() {
|
||||||
|
return "Python Package Analyzer";
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Tell that we are used for information collection.
|
||||||
|
*
|
||||||
|
* @return INFORMATION_COLLECTION
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public AnalysisPhase getAnalysisPhase() {
|
||||||
|
return AnalysisPhase.INFORMATION_COLLECTION;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the set of supported file extensions.
|
||||||
|
*
|
||||||
|
* @return the set of supported file extensions
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected Set<String> getSupportedExtensions() {
|
||||||
|
return EXTENSIONS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* No-op initializer implementation.
|
||||||
|
*
|
||||||
|
* @throws Exception never thrown
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected void initializeFileTypeAnalyzer() throws Exception {
|
||||||
|
// Nothing to do here.
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Utility function to create a regex pattern matcher.
|
||||||
|
*
|
||||||
|
* @param name the value to use when constructing the assignment pattern
|
||||||
|
* @return the compiled Pattern
|
||||||
|
*/
|
||||||
|
private static Pattern compileAssignPattern(String name) {
|
||||||
|
return Pattern.compile(
|
||||||
|
String.format("\\b(__)?%s(__)?\\b *= *(['\"]+)(.*?)\\3", name),
|
||||||
|
REGEX_OPTIONS);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Analyzes python packages and adds evidence to the dependency.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency being analyzed
|
||||||
|
* @param engine the engine being used to perform the scan
|
||||||
|
* @throws AnalysisException thrown if there is an unrecoverable error analyzing the dependency
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
protected void analyzeFileType(Dependency dependency, Engine engine)
|
||||||
|
throws AnalysisException {
|
||||||
|
final File file = dependency.getActualFile();
|
||||||
|
final File parent = file.getParentFile();
|
||||||
|
final String parentName = parent.getName();
|
||||||
|
boolean found = false;
|
||||||
|
if (INIT_PY_FILTER.accept(file)) {
|
||||||
|
for (final File sourcefile : parent.listFiles(PY_FILTER)) {
|
||||||
|
found |= analyzeFileContents(dependency, sourcefile);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (found) {
|
||||||
|
dependency.setDisplayFileName(parentName + "/__init__.py");
|
||||||
|
dependency.getProductEvidence().addEvidence(file.getName(),
|
||||||
|
"PackageName", parentName, Confidence.MEDIUM);
|
||||||
|
} else {
|
||||||
|
// copy, alter and set in case some other thread is iterating over
|
||||||
|
final List<Dependency> deps = new ArrayList<Dependency>(
|
||||||
|
engine.getDependencies());
|
||||||
|
deps.remove(dependency);
|
||||||
|
engine.setDependencies(deps);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This should gather information from leading docstrings, file comments, and assignments to __version__, __title__,
|
||||||
|
* __summary__, __uri__, __url__, __home*page__, __author__, and their all caps equivalents.
|
||||||
|
*
|
||||||
|
* @param dependency the dependency being analyzed
|
||||||
|
* @param file the file name to analyze
|
||||||
|
* @return whether evidence was found
|
||||||
|
* @throws AnalysisException thrown if there is an unrecoverable error
|
||||||
|
*/
|
||||||
|
private boolean analyzeFileContents(Dependency dependency, File file)
|
||||||
|
throws AnalysisException {
|
||||||
|
String contents = "";
|
||||||
|
try {
|
||||||
|
contents = FileUtils.readFileToString(file).trim();
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new AnalysisException(
|
||||||
|
"Problem occured while reading dependency file.", e);
|
||||||
|
}
|
||||||
|
boolean found = false;
|
||||||
|
if (!contents.isEmpty()) {
|
||||||
|
final String source = file.getName();
|
||||||
|
found = gatherEvidence(VERSION_PATTERN, contents, source,
|
||||||
|
dependency.getVersionEvidence(), "SourceVersion",
|
||||||
|
Confidence.MEDIUM);
|
||||||
|
found |= addSummaryInfo(dependency, SUMMARY_PATTERN, 4, contents,
|
||||||
|
source, "summary");
|
||||||
|
if (INIT_PY_FILTER.accept(file)) {
|
||||||
|
found |= addSummaryInfo(dependency, MODULE_DOCSTRING, 2,
|
||||||
|
contents, source, "docstring");
|
||||||
|
}
|
||||||
|
found |= gatherEvidence(TITLE_PATTERN, contents, source,
|
||||||
|
dependency.getProductEvidence(), "SourceTitle",
|
||||||
|
Confidence.LOW);
|
||||||
|
final EvidenceCollection vendorEvidence = dependency
|
||||||
|
.getVendorEvidence();
|
||||||
|
found |= gatherEvidence(AUTHOR_PATTERN, contents, source,
|
||||||
|
vendorEvidence, "SourceAuthor", Confidence.MEDIUM);
|
||||||
|
try {
|
||||||
|
found |= gatherHomePageEvidence(URI_PATTERN, vendorEvidence,
|
||||||
|
source, "URL", contents);
|
||||||
|
found |= gatherHomePageEvidence(HOMEPAGE_PATTERN,
|
||||||
|
vendorEvidence, source, "HomePage", contents);
|
||||||
|
} catch (MalformedURLException e) {
|
||||||
|
LOGGER.warning(e.getMessage());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return found;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds summary information to the dependency
|
||||||
|
*
|
||||||
|
* @param dependency the dependency being analyzed
|
||||||
|
* @param pattern the pattern used to perform analysis
|
||||||
|
* @param group the group from the pattern that indicates the data to use
|
||||||
|
* @param contents the data being analyzed
|
||||||
|
* @param source the source name to use when recording the evidence
|
||||||
|
* @param key the key name to use when recording the evidence
|
||||||
|
* @return true if evidence was collected; otherwise false
|
||||||
|
*/
|
||||||
|
private boolean addSummaryInfo(Dependency dependency, Pattern pattern,
|
||||||
|
int group, String contents, String source, String key) {
|
||||||
|
final Matcher matcher = pattern.matcher(contents);
|
||||||
|
final boolean found = matcher.find();
|
||||||
|
if (found) {
|
||||||
|
JarAnalyzer.addDescription(dependency, matcher.group(group),
|
||||||
|
source, key);
|
||||||
|
}
|
||||||
|
return found;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Collects evidence from the home page URL.
|
||||||
|
*
|
||||||
|
* @param pattern the pattern to match
|
||||||
|
* @param evidence the evidence collection to add the evidence to
|
||||||
|
* @param source the source of the evidence
|
||||||
|
* @param name the name of the evidence
|
||||||
|
* @param contents the home page URL
|
||||||
|
* @return true if evidence was collected; otherwise false
|
||||||
|
* @throws MalformedURLException thrown if the URL is malformed
|
||||||
|
*/
|
||||||
|
private boolean gatherHomePageEvidence(Pattern pattern,
|
||||||
|
EvidenceCollection evidence, String source, String name,
|
||||||
|
String contents) throws MalformedURLException {
|
||||||
|
final Matcher matcher = pattern.matcher(contents);
|
||||||
|
boolean found = false;
|
||||||
|
if (matcher.find()) {
|
||||||
|
final String url = matcher.group(4);
|
||||||
|
if (UrlStringUtils.isUrl(url)) {
|
||||||
|
found = true;
|
||||||
|
evidence.addEvidence(source, name, url, Confidence.MEDIUM);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return found;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gather evidence from a Python source file usin the given string assignment regex pattern.
|
||||||
|
*
|
||||||
|
* @param pattern to scan contents with
|
||||||
|
* @param contents of Python source file
|
||||||
|
* @param source for storing evidence
|
||||||
|
* @param evidence to store evidence in
|
||||||
|
* @param name of evidence
|
||||||
|
* @param confidence in evidence
|
||||||
|
* @return whether evidence was found
|
||||||
|
*/
|
||||||
|
private boolean gatherEvidence(Pattern pattern, String contents,
|
||||||
|
String source, EvidenceCollection evidence, String name,
|
||||||
|
Confidence confidence) {
|
||||||
|
final Matcher matcher = pattern.matcher(contents);
|
||||||
|
final boolean found = matcher.find();
|
||||||
|
if (found) {
|
||||||
|
evidence.addEvidence(source, name, matcher.group(4), confidence);
|
||||||
|
}
|
||||||
|
return found;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected String getAnalyzerEnabledSettingKey() {
|
||||||
|
return Settings.KEYS.ANALYZER_PYTHON_PACKAGE_ENABLED;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -17,6 +17,7 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|
||||||
|
import org.owasp.dependencycheck.analyzer.exception.AnalysisException;
|
||||||
import org.owasp.dependencycheck.Engine;
|
import org.owasp.dependencycheck.Engine;
|
||||||
import org.owasp.dependencycheck.dependency.Dependency;
|
import org.owasp.dependencycheck.dependency.Dependency;
|
||||||
import org.owasp.dependencycheck.suppression.SuppressionRule;
|
import org.owasp.dependencycheck.suppression.SuppressionRule;
|
||||||
@@ -25,7 +26,7 @@ import org.owasp.dependencycheck.suppression.SuppressionRule;
|
|||||||
* The suppression analyzer processes an externally defined XML document that complies with the suppressions.xsd schema.
|
* The suppression analyzer processes an externally defined XML document that complies with the suppressions.xsd schema.
|
||||||
* Any identified Vulnerability entries within the dependencies that match will be removed.
|
* Any identified Vulnerability entries within the dependencies that match will be removed.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class VulnerabilitySuppressionAnalyzer extends AbstractSuppressionAnalyzer {
|
public class VulnerabilitySuppressionAnalyzer extends AbstractSuppressionAnalyzer {
|
||||||
|
|
||||||
|
|||||||
@@ -15,12 +15,12 @@
|
|||||||
*
|
*
|
||||||
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer.exception;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* An exception thrown when the analysis of a dependency fails.
|
* An exception thrown when the analysis of a dependency fails.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class AnalysisException extends Exception {
|
public class AnalysisException extends Exception {
|
||||||
|
|
||||||
@@ -15,12 +15,12 @@
|
|||||||
*
|
*
|
||||||
* Copyright (c) 2013 Jeremy Long. All Rights Reserved.
|
* Copyright (c) 2013 Jeremy Long. All Rights Reserved.
|
||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer.exception;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* An exception thrown when files in an archive cannot be extracted.
|
* An exception thrown when files in an archive cannot be extracted.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class ArchiveExtractionException extends Exception {
|
public class ArchiveExtractionException extends Exception {
|
||||||
|
|
||||||
@@ -0,0 +1,4 @@
|
|||||||
|
/**
|
||||||
|
* A collection of exception classes used within the analyzers.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.analyzer.exception;
|
||||||
@@ -1,13 +1,4 @@
|
|||||||
/**
|
/**
|
||||||
* <html>
|
* Analyzers are used to inspect the identified dependencies, collect Evidence, and process the dependencies.
|
||||||
* <head>
|
*/
|
||||||
* <title>org.owasp.dependencycheck.analyzer</title>
|
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* Analyzers are used to inspect the identified dependencies, collect Evidence,
|
|
||||||
* and process the dependencies.
|
|
||||||
* </body>
|
|
||||||
* </html>
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.owasp.dependencycheck.analyzer;
|
package org.owasp.dependencycheck.analyzer;
|
||||||
|
|||||||
@@ -0,0 +1,171 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.data.central;
|
||||||
|
|
||||||
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.HttpURLConnection;
|
||||||
|
import java.net.URL;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
import javax.xml.parsers.DocumentBuilder;
|
||||||
|
import javax.xml.parsers.DocumentBuilderFactory;
|
||||||
|
import javax.xml.xpath.XPath;
|
||||||
|
import javax.xml.xpath.XPathConstants;
|
||||||
|
import javax.xml.xpath.XPathFactory;
|
||||||
|
import org.owasp.dependencycheck.data.nexus.MavenArtifact;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
import org.owasp.dependencycheck.utils.URLConnectionFactory;
|
||||||
|
import org.w3c.dom.Document;
|
||||||
|
import org.w3c.dom.NodeList;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Class of methods to search Maven Central via Central.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*/
|
||||||
|
public class CentralSearch {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The URL for the Central service
|
||||||
|
*/
|
||||||
|
private final URL rootURL;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Whether to use the Proxy when making requests
|
||||||
|
*/
|
||||||
|
private boolean useProxy;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Used for logging.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(CentralSearch.class.getName());
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a NexusSearch for the given repository URL.
|
||||||
|
*
|
||||||
|
* @param rootURL the URL of the repository on which searches should execute. Only parameters are added to this (so it should
|
||||||
|
* end in /select)
|
||||||
|
*/
|
||||||
|
public CentralSearch(URL rootURL) {
|
||||||
|
this.rootURL = rootURL;
|
||||||
|
if (null != Settings.getString(Settings.KEYS.PROXY_SERVER)) {
|
||||||
|
useProxy = true;
|
||||||
|
LOGGER.fine("Using proxy");
|
||||||
|
} else {
|
||||||
|
useProxy = false;
|
||||||
|
LOGGER.fine("Not using proxy");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Searches the configured Central URL for the given sha1 hash. If the artifact is found, a <code>MavenArtifact</code> is
|
||||||
|
* populated with the GAV.
|
||||||
|
*
|
||||||
|
* @param sha1 the SHA-1 hash string for which to search
|
||||||
|
* @return the populated Maven GAV.
|
||||||
|
* @throws IOException if it's unable to connect to the specified repository or if the specified artifact is not found.
|
||||||
|
*/
|
||||||
|
public List<MavenArtifact> searchSha1(String sha1) throws IOException {
|
||||||
|
if (null == sha1 || !sha1.matches("^[0-9A-Fa-f]{40}$")) {
|
||||||
|
throw new IllegalArgumentException("Invalid SHA1 format");
|
||||||
|
}
|
||||||
|
|
||||||
|
final URL url = new URL(rootURL + String.format("?q=1:\"%s\"&wt=xml", sha1));
|
||||||
|
|
||||||
|
LOGGER.fine(String.format("Searching Central url %s", url.toString()));
|
||||||
|
|
||||||
|
// Determine if we need to use a proxy. The rules:
|
||||||
|
// 1) If the proxy is set, AND the setting is set to true, use the proxy
|
||||||
|
// 2) Otherwise, don't use the proxy (either the proxy isn't configured,
|
||||||
|
// or proxy is specifically set to false)
|
||||||
|
final HttpURLConnection conn = URLConnectionFactory.createHttpURLConnection(url, useProxy);
|
||||||
|
|
||||||
|
conn.setDoOutput(true);
|
||||||
|
|
||||||
|
// JSON would be more elegant, but there's not currently a dependency
|
||||||
|
// on JSON, so don't want to add one just for this
|
||||||
|
conn.addRequestProperty("Accept", "application/xml");
|
||||||
|
conn.connect();
|
||||||
|
|
||||||
|
if (conn.getResponseCode() == 200) {
|
||||||
|
boolean missing = false;
|
||||||
|
try {
|
||||||
|
final DocumentBuilder builder = DocumentBuilderFactory
|
||||||
|
.newInstance().newDocumentBuilder();
|
||||||
|
final Document doc = builder.parse(conn.getInputStream());
|
||||||
|
final XPath xpath = XPathFactory.newInstance().newXPath();
|
||||||
|
final String numFound = xpath.evaluate("/response/result/@numFound", doc);
|
||||||
|
if ("0".equals(numFound)) {
|
||||||
|
missing = true;
|
||||||
|
} else {
|
||||||
|
final ArrayList<MavenArtifact> result = new ArrayList<MavenArtifact>();
|
||||||
|
final NodeList docs = (NodeList) xpath.evaluate("/response/result/doc", doc, XPathConstants.NODESET);
|
||||||
|
for (int i = 0; i < docs.getLength(); i++) {
|
||||||
|
final String g = xpath.evaluate("./str[@name='g']", docs.item(i));
|
||||||
|
LOGGER.finest(String.format("GroupId: %s", g));
|
||||||
|
final String a = xpath.evaluate("./str[@name='a']", docs.item(i));
|
||||||
|
LOGGER.finest(String.format("ArtifactId: %s", a));
|
||||||
|
final String v = xpath.evaluate("./str[@name='v']", docs.item(i));
|
||||||
|
NodeList atts = (NodeList) xpath.evaluate("./arr[@name='ec']/str", docs.item(i), XPathConstants.NODESET);
|
||||||
|
boolean pomAvailable = false;
|
||||||
|
boolean jarAvailable = false;
|
||||||
|
for (int x = 0; x < atts.getLength(); x++) {
|
||||||
|
final String tmp = xpath.evaluate(".", atts.item(x));
|
||||||
|
if (".pom".equals(tmp)) {
|
||||||
|
pomAvailable = true;
|
||||||
|
} else if (".jar".equals(tmp)) {
|
||||||
|
jarAvailable = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
atts = (NodeList) xpath.evaluate("./arr[@name='tags']/str", docs.item(i), XPathConstants.NODESET);
|
||||||
|
boolean useHTTPS = false;
|
||||||
|
for (int x = 0; x < atts.getLength(); x++) {
|
||||||
|
final String tmp = xpath.evaluate(".", atts.item(x));
|
||||||
|
if ("https".equals(tmp)) {
|
||||||
|
useHTTPS = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
LOGGER.finest(String.format("Version: %s", v));
|
||||||
|
result.add(new MavenArtifact(g, a, v, jarAvailable, pomAvailable, useHTTPS));
|
||||||
|
}
|
||||||
|
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
} catch (Throwable e) {
|
||||||
|
// Anything else is jacked up XML stuff that we really can't recover
|
||||||
|
// from well
|
||||||
|
throw new IOException(e.getMessage(), e);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (missing) {
|
||||||
|
throw new FileNotFoundException("Artifact not found in Central");
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
final String msg = String.format("Could not connect to Central received response code: %d %s",
|
||||||
|
conn.getResponseCode(), conn.getResponseMessage());
|
||||||
|
LOGGER.fine(msg);
|
||||||
|
throw new IOException(msg);
|
||||||
|
}
|
||||||
|
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
/**
|
||||||
|
*
|
||||||
|
* Contains classes related to searching Maven Central.<br/><br/>
|
||||||
|
*
|
||||||
|
* These are used to abstract Maven Central searching away from OWASP Dependency Check so they can be reused elsewhere.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.data.central;
|
||||||
@@ -18,10 +18,9 @@
|
|||||||
package org.owasp.dependencycheck.data.cpe;
|
package org.owasp.dependencycheck.data.cpe;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.sql.ResultSet;
|
|
||||||
import java.sql.SQLException;
|
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
import java.util.Set;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
import org.apache.lucene.analysis.Analyzer;
|
import org.apache.lucene.analysis.Analyzer;
|
||||||
@@ -45,19 +44,25 @@ import org.owasp.dependencycheck.data.lucene.FieldAnalyzer;
|
|||||||
import org.owasp.dependencycheck.data.lucene.LuceneUtils;
|
import org.owasp.dependencycheck.data.lucene.LuceneUtils;
|
||||||
import org.owasp.dependencycheck.data.lucene.SearchFieldAnalyzer;
|
import org.owasp.dependencycheck.data.lucene.SearchFieldAnalyzer;
|
||||||
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
import org.owasp.dependencycheck.data.nvdcve.CveDB;
|
||||||
|
import org.owasp.dependencycheck.data.nvdcve.DatabaseException;
|
||||||
|
import org.owasp.dependencycheck.utils.Pair;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* An in memory lucene index that contains the vendor/product combinations from the CPE (application) identifiers within
|
* An in memory lucene index that contains the vendor/product combinations from the CPE (application) identifiers within the NVD
|
||||||
* the NVD CVE data.
|
* CVE data.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class CpeMemoryIndex {
|
public final class CpeMemoryIndex {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(CpeMemoryIndex.class.getName());
|
||||||
/**
|
/**
|
||||||
* singleton instance.
|
* singleton instance.
|
||||||
*/
|
*/
|
||||||
private static CpeMemoryIndex instance = new CpeMemoryIndex();
|
private static final CpeMemoryIndex INSTANCE = new CpeMemoryIndex();
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* private constructor for singleton.
|
* private constructor for singleton.
|
||||||
@@ -71,7 +76,7 @@ public final class CpeMemoryIndex {
|
|||||||
* @return the instance of the CpeMemoryIndex
|
* @return the instance of the CpeMemoryIndex
|
||||||
*/
|
*/
|
||||||
public static CpeMemoryIndex getInstance() {
|
public static CpeMemoryIndex getInstance() {
|
||||||
return instance;
|
return INSTANCE;
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* The in memory Lucene index.
|
* The in memory Lucene index.
|
||||||
@@ -109,18 +114,20 @@ public final class CpeMemoryIndex {
|
|||||||
* @throws IndexException thrown if there is an error creating the index
|
* @throws IndexException thrown if there is an error creating the index
|
||||||
*/
|
*/
|
||||||
public void open(CveDB cve) throws IndexException {
|
public void open(CveDB cve) throws IndexException {
|
||||||
if (!openState) {
|
synchronized (INSTANCE) {
|
||||||
index = new RAMDirectory();
|
if (!openState) {
|
||||||
buildIndex(cve);
|
index = new RAMDirectory();
|
||||||
try {
|
buildIndex(cve);
|
||||||
indexReader = DirectoryReader.open(index);
|
try {
|
||||||
} catch (IOException ex) {
|
indexReader = DirectoryReader.open(index);
|
||||||
throw new IndexException(ex);
|
} catch (IOException ex) {
|
||||||
|
throw new IndexException(ex);
|
||||||
|
}
|
||||||
|
indexSearcher = new IndexSearcher(indexReader);
|
||||||
|
searchingAnalyzer = createSearchingAnalyzer();
|
||||||
|
queryParser = new QueryParser(LuceneUtils.CURRENT_VERSION, Fields.DOCUMENT_KEY, searchingAnalyzer);
|
||||||
|
openState = true;
|
||||||
}
|
}
|
||||||
indexSearcher = new IndexSearcher(indexReader);
|
|
||||||
searchingAnalyzer = createSearchingAnalyzer();
|
|
||||||
queryParser = new QueryParser(LuceneUtils.CURRENT_VERSION, Fields.DOCUMENT_KEY, searchingAnalyzer);
|
|
||||||
openState = true;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
@@ -156,7 +163,7 @@ public final class CpeMemoryIndex {
|
|||||||
*/
|
*/
|
||||||
@SuppressWarnings("unchecked")
|
@SuppressWarnings("unchecked")
|
||||||
private Analyzer createSearchingAnalyzer() {
|
private Analyzer createSearchingAnalyzer() {
|
||||||
final Map fieldAnalyzers = new HashMap();
|
final Map<String, Analyzer> fieldAnalyzers = new HashMap<String, Analyzer>();
|
||||||
fieldAnalyzers.put(Fields.DOCUMENT_KEY, new KeywordAnalyzer());
|
fieldAnalyzers.put(Fields.DOCUMENT_KEY, new KeywordAnalyzer());
|
||||||
productSearchFieldAnalyzer = new SearchFieldAnalyzer(LuceneUtils.CURRENT_VERSION);
|
productSearchFieldAnalyzer = new SearchFieldAnalyzer(LuceneUtils.CURRENT_VERSION);
|
||||||
vendorSearchFieldAnalyzer = new SearchFieldAnalyzer(LuceneUtils.CURRENT_VERSION);
|
vendorSearchFieldAnalyzer = new SearchFieldAnalyzer(LuceneUtils.CURRENT_VERSION);
|
||||||
@@ -196,7 +203,7 @@ public final class CpeMemoryIndex {
|
|||||||
try {
|
try {
|
||||||
indexReader.close();
|
indexReader.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(CpeMemoryIndex.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
indexReader = null;
|
indexReader = null;
|
||||||
}
|
}
|
||||||
@@ -210,7 +217,7 @@ public final class CpeMemoryIndex {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Builds the lucene index based off of the data within the CveDB.
|
* Builds the CPE Lucene Index based off of the data within the CveDB.
|
||||||
*
|
*
|
||||||
* @param cve the data base containing the CPE data
|
* @param cve the data base containing the CPE data
|
||||||
* @throws IndexException thrown if there is an issue creating the index
|
* @throws IndexException thrown if there is an issue creating the index
|
||||||
@@ -222,16 +229,13 @@ public final class CpeMemoryIndex {
|
|||||||
analyzer = createIndexingAnalyzer();
|
analyzer = createIndexingAnalyzer();
|
||||||
final IndexWriterConfig conf = new IndexWriterConfig(LuceneUtils.CURRENT_VERSION, analyzer);
|
final IndexWriterConfig conf = new IndexWriterConfig(LuceneUtils.CURRENT_VERSION, analyzer);
|
||||||
indexWriter = new IndexWriter(index, conf);
|
indexWriter = new IndexWriter(index, conf);
|
||||||
final ResultSet rs = cve.getVendorProductList();
|
|
||||||
if (rs == null) {
|
|
||||||
throw new IndexException("No data exists");
|
|
||||||
}
|
|
||||||
try {
|
try {
|
||||||
while (rs.next()) {
|
final Set<Pair<String, String>> data = cve.getVendorProductList();
|
||||||
saveEntry(rs.getString(1), rs.getString(2), indexWriter);
|
for (Pair<String, String> pair : data) {
|
||||||
|
saveEntry(pair.getLeft(), pair.getRight(), indexWriter);
|
||||||
}
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (DatabaseException ex) {
|
||||||
Logger.getLogger(CpeMemoryIndex.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new IndexException("Error reading CPE data", ex);
|
throw new IndexException("Error reading CPE data", ex);
|
||||||
}
|
}
|
||||||
} catch (CorruptIndexException ex) {
|
} catch (CorruptIndexException ex) {
|
||||||
|
|||||||
@@ -20,9 +20,9 @@ package org.owasp.dependencycheck.data.cpe;
|
|||||||
/**
|
/**
|
||||||
* Fields is a collection of field names used within the Lucene index for CPE entries.
|
* Fields is a collection of field names used within the Lucene index for CPE entries.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public abstract class Fields {
|
public final class Fields {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The key for the name document id.
|
* The key for the name document id.
|
||||||
@@ -36,7 +36,10 @@ public abstract class Fields {
|
|||||||
* The key for the product field.
|
* The key for the product field.
|
||||||
*/
|
*/
|
||||||
public static final String PRODUCT = "product";
|
public static final String PRODUCT = "product";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The key for the version field.
|
* Private constructor as this is more of an enumeration rather then a full class.
|
||||||
*/
|
*/
|
||||||
|
private Fields() {
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ import java.net.URLDecoder;
|
|||||||
/**
|
/**
|
||||||
* A CPE entry containing the name, vendor, product, and version.
|
* A CPE entry containing the name, vendor, product, and version.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class IndexEntry implements Serializable {
|
public class IndexEntry implements Serializable {
|
||||||
|
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ package org.owasp.dependencycheck.data.cpe;
|
|||||||
/**
|
/**
|
||||||
* An exception thrown when the there is an issue using the in-memory CPE Index.
|
* An exception thrown when the there is an issue using the in-memory CPE Index.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class IndexException extends Exception {
|
public class IndexException extends Exception {
|
||||||
|
|
||||||
|
|||||||
@@ -1,12 +1,4 @@
|
|||||||
/**
|
/**
|
||||||
* <html>
|
|
||||||
* <head>
|
|
||||||
* <title>org.owasp.dependencycheck.data.cpe</title>
|
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* Contains classes for working with the CPE Lucene Index.
|
* Contains classes for working with the CPE Lucene Index.
|
||||||
* </body>
|
*/
|
||||||
* </html>
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.owasp.dependencycheck.data.cpe;
|
package org.owasp.dependencycheck.data.cpe;
|
||||||
|
|||||||
@@ -26,10 +26,15 @@ import java.util.logging.Logger;
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class CweDB {
|
public final class CweDB {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The Logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(CweDB.class.getName());
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Empty private constructor as this is a utility class.
|
* Empty private constructor as this is a utility class.
|
||||||
*/
|
*/
|
||||||
@@ -52,19 +57,21 @@ public final class CweDB {
|
|||||||
final String filePath = "data/cwe.hashmap.serialized";
|
final String filePath = "data/cwe.hashmap.serialized";
|
||||||
final InputStream input = CweDB.class.getClassLoader().getResourceAsStream(filePath);
|
final InputStream input = CweDB.class.getClassLoader().getResourceAsStream(filePath);
|
||||||
oin = new ObjectInputStream(input);
|
oin = new ObjectInputStream(input);
|
||||||
return (HashMap<String, String>) oin.readObject();
|
@SuppressWarnings("unchecked")
|
||||||
|
final HashMap<String, String> ret = (HashMap<String, String>) oin.readObject();
|
||||||
|
return ret;
|
||||||
} catch (ClassNotFoundException ex) {
|
} catch (ClassNotFoundException ex) {
|
||||||
Logger.getLogger(CweDB.class.getName()).log(Level.WARNING, "Unable to load CWE data. This should not be an issue.");
|
LOGGER.log(Level.WARNING, "Unable to load CWE data. This should not be an issue.");
|
||||||
Logger.getLogger(CweDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(CweDB.class.getName()).log(Level.WARNING, "Unable to load CWE data due to an IO Error. This should not be an issue.");
|
LOGGER.log(Level.WARNING, "Unable to load CWE data due to an IO Error. This should not be an issue.");
|
||||||
Logger.getLogger(CweDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} finally {
|
} finally {
|
||||||
if (oin != null) {
|
if (oin != null) {
|
||||||
try {
|
try {
|
||||||
oin.close();
|
oin.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(CweDB.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ import org.xml.sax.helpers.DefaultHandler;
|
|||||||
/**
|
/**
|
||||||
* A SAX Handler that will parse the CWE XML.
|
* A SAX Handler that will parse the CWE XML.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class CweHandler extends DefaultHandler {
|
public class CweHandler extends DefaultHandler {
|
||||||
|
|
||||||
|
|||||||
@@ -1,12 +1,4 @@
|
|||||||
/**
|
/**
|
||||||
* <html>
|
|
||||||
* <head>
|
|
||||||
* <title>org.owasp.dependencycheck.data.cwe</title>
|
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* Contains classes for working with the CWE Database.
|
* Contains classes for working with the CWE Database.
|
||||||
* </body>
|
*/
|
||||||
* </html>
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.owasp.dependencycheck.data.cwe;
|
package org.owasp.dependencycheck.data.cwe;
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ import org.apache.lucene.analysis.tokenattributes.CharTermAttribute;
|
|||||||
/**
|
/**
|
||||||
* An abstract tokenizing filter that can be used as the base for a tokenizing filter.
|
* An abstract tokenizing filter that can be used as the base for a tokenizing filter.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public abstract class AbstractTokenizingFilter extends TokenFilter {
|
public abstract class AbstractTokenizingFilter extends TokenFilter {
|
||||||
|
|
||||||
@@ -72,7 +72,7 @@ public abstract class AbstractTokenizingFilter extends TokenFilter {
|
|||||||
* @return whether or not a new term was added
|
* @return whether or not a new term was added
|
||||||
*/
|
*/
|
||||||
protected boolean addTerm() {
|
protected boolean addTerm() {
|
||||||
final boolean termAdded = tokens.size() > 0;
|
final boolean termAdded = !tokens.isEmpty();
|
||||||
if (termAdded) {
|
if (termAdded) {
|
||||||
final String term = tokens.pop();
|
final String term = tokens.pop();
|
||||||
clearAttributes();
|
clearAttributes();
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ import org.apache.lucene.util.Version;
|
|||||||
/**
|
/**
|
||||||
* Tokenizes the input breaking it into tokens when non-alpha/numeric characters are found.
|
* Tokenizes the input breaking it into tokens when non-alpha/numeric characters are found.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class AlphaNumericTokenizer extends CharTokenizer {
|
public class AlphaNumericTokenizer extends CharTokenizer {
|
||||||
|
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ import org.apache.lucene.search.similarities.DefaultSimilarity;
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class DependencySimilarity extends DefaultSimilarity {
|
public class DependencySimilarity extends DefaultSimilarity {
|
||||||
|
|
||||||
|
|||||||
@@ -29,10 +29,10 @@ import org.apache.lucene.util.Version;
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* <p>
|
* <p>
|
||||||
* A Lucene Analyzer that utilizes the WhitespaceTokenizer, WordDelimiterFilter, LowerCaseFilter, and StopFilter. The
|
* A Lucene Analyzer that utilizes the WhitespaceTokenizer, WordDelimiterFilter, LowerCaseFilter, and StopFilter. The intended
|
||||||
* intended purpose of this Analyzer is to index the CPE fields vendor and product.</p>
|
* purpose of this Analyzer is to index the CPE fields vendor and product.</p>
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class FieldAnalyzer extends Analyzer {
|
public class FieldAnalyzer extends Analyzer {
|
||||||
|
|
||||||
|
|||||||
@@ -17,21 +17,22 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.data.lucene;
|
package org.owasp.dependencycheck.data.lucene;
|
||||||
|
|
||||||
|
import edu.umd.cs.findbugs.annotations.SuppressFBWarnings;
|
||||||
import org.apache.lucene.util.Version;
|
import org.apache.lucene.util.Version;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* <p>
|
* <p>
|
||||||
* Lucene utils is a set of utilize written to make constructing Lucene queries simpler.</p>
|
* Lucene utils is a set of utilize written to make constructing Lucene queries simpler.</p>
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class LuceneUtils {
|
public final class LuceneUtils {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The current version of Lucene being used. Declaring this one place so an upgrade doesn't require hunting through
|
* The current version of Lucene being used. Declaring this one place so an upgrade doesn't require hunting through the code
|
||||||
* the code base.
|
* base.
|
||||||
*/
|
*/
|
||||||
public static final Version CURRENT_VERSION = Version.LUCENE_45;
|
public static final Version CURRENT_VERSION = Version.LUCENE_47;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Private constructor as this is a utility class.
|
* Private constructor as this is a utility class.
|
||||||
@@ -46,7 +47,7 @@ public final class LuceneUtils {
|
|||||||
* @param text the data to be escaped
|
* @param text the data to be escaped
|
||||||
*/
|
*/
|
||||||
@SuppressWarnings("fallthrough")
|
@SuppressWarnings("fallthrough")
|
||||||
@edu.umd.cs.findbugs.annotations.SuppressWarnings(
|
@SuppressFBWarnings(
|
||||||
value = "SF_SWITCH_NO_DEFAULT",
|
value = "SF_SWITCH_NO_DEFAULT",
|
||||||
justification = "The switch below does have a default.")
|
justification = "The switch below does have a default.")
|
||||||
public static void appendEscapedLuceneQuery(StringBuilder buf,
|
public static void appendEscapedLuceneQuery(StringBuilder buf,
|
||||||
|
|||||||
@@ -30,7 +30,7 @@ import org.apache.lucene.util.Version;
|
|||||||
/**
|
/**
|
||||||
* A Lucene field analyzer used to analyzer queries against the CPE data.
|
* A Lucene field analyzer used to analyzer queries against the CPE data.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class SearchFieldAnalyzer extends Analyzer {
|
public class SearchFieldAnalyzer extends Analyzer {
|
||||||
|
|
||||||
@@ -39,8 +39,7 @@ public class SearchFieldAnalyzer extends Analyzer {
|
|||||||
*/
|
*/
|
||||||
private final Version version;
|
private final Version version;
|
||||||
/**
|
/**
|
||||||
* A local reference to the TokenPairConcatenatingFilter so that we can clear any left over state if this analyzer
|
* A local reference to the TokenPairConcatenatingFilter so that we can clear any left over state if this analyzer is re-used.
|
||||||
* is re-used.
|
|
||||||
*/
|
*/
|
||||||
private TokenPairConcatenatingFilter concatenatingFilter;
|
private TokenPairConcatenatingFilter concatenatingFilter;
|
||||||
|
|
||||||
@@ -85,8 +84,7 @@ public class SearchFieldAnalyzer extends Analyzer {
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* <p>
|
* <p>
|
||||||
* Resets the analyzer and clears any internal state data that may have been left-over from previous uses of the
|
* Resets the analyzer and clears any internal state data that may have been left-over from previous uses of the analyzer.</p>
|
||||||
* analyzer.</p>
|
|
||||||
* <p>
|
* <p>
|
||||||
* <b>If this analyzer is re-used this method must be called between uses.</b></p>
|
* <b>If this analyzer is re-used this method must be called between uses.</b></p>
|
||||||
*/
|
*/
|
||||||
|
|||||||
@@ -1,72 +0,0 @@
|
|||||||
/*
|
|
||||||
* This file is part of dependency-check-core.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*
|
|
||||||
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|
||||||
*/
|
|
||||||
package org.owasp.dependencycheck.data.lucene;
|
|
||||||
|
|
||||||
import java.io.Reader;
|
|
||||||
import org.apache.lucene.analysis.Analyzer;
|
|
||||||
import org.apache.lucene.analysis.TokenStream;
|
|
||||||
import org.apache.lucene.analysis.Tokenizer;
|
|
||||||
import org.apache.lucene.analysis.core.LowerCaseFilter;
|
|
||||||
import org.apache.lucene.analysis.core.WhitespaceTokenizer;
|
|
||||||
import org.apache.lucene.util.Version;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* SearchVersionAnalyzer is a Lucene Analyzer used to analyze version information.
|
|
||||||
*
|
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
|
||||||
* @deprecated version information is no longer stored in lucene
|
|
||||||
*/
|
|
||||||
@Deprecated
|
|
||||||
public class SearchVersionAnalyzer extends Analyzer {
|
|
||||||
//TODO consider implementing payloads/custom attributes...
|
|
||||||
// use custom attributes for major, minor, x, x, x, rcx
|
|
||||||
// these can then be used to weight the score for searches on the version.
|
|
||||||
// see http://lucene.apache.org/core/3_6_1/api/core/org/apache/lucene/analysis/package-summary.html#package_description
|
|
||||||
// look at this article to implement
|
|
||||||
// http://www.codewrecks.com/blog/index.php/2012/08/25/index-your-blog-using-tags-and-lucene-net/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The Lucene Version used.
|
|
||||||
*/
|
|
||||||
private final Version version;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new SearchVersionAnalyzer.
|
|
||||||
*
|
|
||||||
* @param version the Lucene version
|
|
||||||
*/
|
|
||||||
public SearchVersionAnalyzer(Version version) {
|
|
||||||
this.version = version;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates the TokenStreamComponents
|
|
||||||
*
|
|
||||||
* @param fieldName the field name being analyzed
|
|
||||||
* @param reader the reader containing the input
|
|
||||||
* @return the TokenStreamComponents
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected TokenStreamComponents createComponents(String fieldName, Reader reader) {
|
|
||||||
final Tokenizer source = new WhitespaceTokenizer(version, reader);
|
|
||||||
TokenStream stream = source;
|
|
||||||
stream = new LowerCaseFilter(version, stream);
|
|
||||||
stream = new VersionTokenizingFilter(stream);
|
|
||||||
return new TokenStreamComponents(source, stream);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -29,7 +29,7 @@ import org.apache.lucene.analysis.tokenattributes.CharTermAttribute;
|
|||||||
* <p>
|
* <p>
|
||||||
* <b>Example:</b> "Spring Framework Core" -> "Spring SpringFramework Framework FrameworkCore Core".</p>
|
* <b>Example:</b> "Spring Framework Core" -> "Spring SpringFramework Framework FrameworkCore Core".</p>
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class TokenPairConcatenatingFilter extends TokenFilter {
|
public final class TokenPairConcatenatingFilter extends TokenFilter {
|
||||||
|
|
||||||
@@ -92,7 +92,7 @@ public final class TokenPairConcatenatingFilter extends TokenFilter {
|
|||||||
|
|
||||||
//if we have a previousTerm - write it out as its own token concatenated
|
//if we have a previousTerm - write it out as its own token concatenated
|
||||||
// with the current word (if one is available).
|
// with the current word (if one is available).
|
||||||
if (previousWord != null && words.size() > 0) {
|
if (previousWord != null && !words.isEmpty()) {
|
||||||
final String word = words.getFirst();
|
final String word = words.getFirst();
|
||||||
clearAttributes();
|
clearAttributes();
|
||||||
termAtt.append(previousWord).append(word);
|
termAtt.append(previousWord).append(word);
|
||||||
@@ -100,7 +100,7 @@ public final class TokenPairConcatenatingFilter extends TokenFilter {
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
//if we have words, write it out as a single token
|
//if we have words, write it out as a single token
|
||||||
if (words.size() > 0) {
|
if (!words.isEmpty()) {
|
||||||
final String word = words.removeFirst();
|
final String word = words.removeFirst();
|
||||||
clearAttributes();
|
clearAttributes();
|
||||||
termAtt.append(word);
|
termAtt.append(word);
|
||||||
|
|||||||
@@ -33,10 +33,13 @@ import org.owasp.dependencycheck.utils.UrlStringUtils;
|
|||||||
* <p>
|
* <p>
|
||||||
* <b>Example:</b> "3.0.0.RELEASE" -> "3 3.0 3.0.0 RELEASE 3.0.0.RELEASE".</p>
|
* <b>Example:</b> "3.0.0.RELEASE" -> "3 3.0 3.0.0 RELEASE 3.0.0.RELEASE".</p>
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class UrlTokenizingFilter extends AbstractTokenizingFilter {
|
public final class UrlTokenizingFilter extends AbstractTokenizingFilter {
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(UrlTokenizingFilter.class.getName());
|
||||||
/**
|
/**
|
||||||
* Constructs a new VersionTokenizingFilter.
|
* Constructs a new VersionTokenizingFilter.
|
||||||
*
|
*
|
||||||
@@ -57,7 +60,7 @@ public final class UrlTokenizingFilter extends AbstractTokenizingFilter {
|
|||||||
public boolean incrementToken() throws IOException {
|
public boolean incrementToken() throws IOException {
|
||||||
final LinkedList<String> tokens = getTokens();
|
final LinkedList<String> tokens = getTokens();
|
||||||
final CharTermAttribute termAtt = getTermAtt();
|
final CharTermAttribute termAtt = getTermAtt();
|
||||||
if (tokens.size() == 0 && input.incrementToken()) {
|
if (tokens.isEmpty() && input.incrementToken()) {
|
||||||
final String text = new String(termAtt.buffer(), 0, termAtt.length());
|
final String text = new String(termAtt.buffer(), 0, termAtt.length());
|
||||||
if (UrlStringUtils.containsUrl(text)) {
|
if (UrlStringUtils.containsUrl(text)) {
|
||||||
final String[] parts = text.split("\\s");
|
final String[] parts = text.split("\\s");
|
||||||
@@ -67,7 +70,7 @@ public final class UrlTokenizingFilter extends AbstractTokenizingFilter {
|
|||||||
final List<String> data = UrlStringUtils.extractImportantUrlData(part);
|
final List<String> data = UrlStringUtils.extractImportantUrlData(part);
|
||||||
tokens.addAll(data);
|
tokens.addAll(data);
|
||||||
} catch (MalformedURLException ex) {
|
} catch (MalformedURLException ex) {
|
||||||
Logger.getLogger(UrlTokenizingFilter.class.getName()).log(Level.INFO, "error parsing " + part, ex);
|
LOGGER.log(Level.FINE, "error parsing " + part, ex);
|
||||||
tokens.add(part);
|
tokens.add(part);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
|||||||
@@ -1,71 +0,0 @@
|
|||||||
/*
|
|
||||||
* This file is part of dependency-check-core.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*
|
|
||||||
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|
||||||
*/
|
|
||||||
package org.owasp.dependencycheck.data.lucene;
|
|
||||||
|
|
||||||
import java.io.Reader;
|
|
||||||
import org.apache.lucene.analysis.Analyzer;
|
|
||||||
import org.apache.lucene.analysis.TokenStream;
|
|
||||||
import org.apache.lucene.analysis.Tokenizer;
|
|
||||||
import org.apache.lucene.analysis.core.LowerCaseFilter;
|
|
||||||
import org.apache.lucene.analysis.core.WhitespaceTokenizer;
|
|
||||||
import org.apache.lucene.util.Version;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* VersionAnalyzer is a Lucene Analyzer used to analyze version information.
|
|
||||||
*
|
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
|
||||||
* @deprecated version information is no longer stored in lucene
|
|
||||||
*/
|
|
||||||
@Deprecated
|
|
||||||
public class VersionAnalyzer extends Analyzer {
|
|
||||||
//TODO consider implementing payloads/custom attributes...
|
|
||||||
// use custom attributes for major, minor, x, x, x, rcx
|
|
||||||
// these can then be used to weight the score for searches on the version.
|
|
||||||
// see http://lucene.apache.org/core/3_6_1/api/core/org/apache/lucene/analysis/package-summary.html#package_description
|
|
||||||
// look at this article to implement
|
|
||||||
// http://www.codewrecks.com/blog/index.php/2012/08/25/index-your-blog-using-tags-and-lucene-net/
|
|
||||||
|
|
||||||
/**
|
|
||||||
* The Lucene Version used.
|
|
||||||
*/
|
|
||||||
private final Version version;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new VersionAnalyzer.
|
|
||||||
*
|
|
||||||
* @param version the Lucene version
|
|
||||||
*/
|
|
||||||
public VersionAnalyzer(Version version) {
|
|
||||||
this.version = version;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates the TokenStreamComponents
|
|
||||||
*
|
|
||||||
* @param fieldName the field name being analyzed
|
|
||||||
* @param reader the reader containing the input
|
|
||||||
* @return the TokenStreamComponents
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected TokenStreamComponents createComponents(String fieldName, Reader reader) {
|
|
||||||
final Tokenizer source = new WhitespaceTokenizer(version, reader);
|
|
||||||
TokenStream stream = source;
|
|
||||||
stream = new LowerCaseFilter(version, stream);
|
|
||||||
return new TokenStreamComponents(source, stream);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,98 +0,0 @@
|
|||||||
/*
|
|
||||||
* This file is part of dependency-check-core.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*
|
|
||||||
* Copyright (c) 2012 Jeremy Long. All Rights Reserved.
|
|
||||||
*/
|
|
||||||
package org.owasp.dependencycheck.data.lucene;
|
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.LinkedList;
|
|
||||||
import org.apache.lucene.analysis.TokenStream;
|
|
||||||
import org.apache.lucene.analysis.tokenattributes.CharTermAttribute;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* <p>
|
|
||||||
* Takes a TokenStream and splits or adds tokens to correctly index version numbers.</p>
|
|
||||||
* <p>
|
|
||||||
* <b>Example:</b> "3.0.0.RELEASE" -> "3 3.0 3.0.0 RELEASE 3.0.0.RELEASE".</p>
|
|
||||||
*
|
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
|
||||||
* @deprecated version information is no longer stored in lucene
|
|
||||||
*/
|
|
||||||
@Deprecated
|
|
||||||
public final class VersionTokenizingFilter extends AbstractTokenizingFilter {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs a new VersionTokenizingFilter.
|
|
||||||
*
|
|
||||||
* @param stream the TokenStream that this filter will process
|
|
||||||
*/
|
|
||||||
public VersionTokenizingFilter(TokenStream stream) {
|
|
||||||
super(stream);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Increments the underlying TokenStream and sets CharTermAttributes to construct an expanded set of tokens by
|
|
||||||
* concatenating tokens with the previous token.
|
|
||||||
*
|
|
||||||
* @return whether or not we have hit the end of the TokenStream
|
|
||||||
* @throws IOException is thrown when an IOException occurs
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public boolean incrementToken() throws IOException {
|
|
||||||
final LinkedList<String> tokens = getTokens();
|
|
||||||
final CharTermAttribute termAtt = getTermAtt();
|
|
||||||
if (tokens.size() == 0 && input.incrementToken()) {
|
|
||||||
final String version = new String(termAtt.buffer(), 0, termAtt.length());
|
|
||||||
final String[] toAnalyze = version.split("[_-]");
|
|
||||||
//ensure we analyze the whole string as one too
|
|
||||||
analyzeVersion(version);
|
|
||||||
for (String str : toAnalyze) {
|
|
||||||
analyzeVersion(str);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return addTerm();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* <p>
|
|
||||||
* Analyzes the version and adds several copies of the version as different tokens. For example, the version 1.2.7
|
|
||||||
* would create the tokens 1 1.2 1.2.7. This is useful in discovering the correct version - sometimes a maintenance
|
|
||||||
* or build number will throw off the version identification.</p>
|
|
||||||
*
|
|
||||||
* <p>
|
|
||||||
* expected format:&nbps;major.minor[.maintenance[.build]]</p>
|
|
||||||
*
|
|
||||||
* @param version the version to analyze
|
|
||||||
*/
|
|
||||||
private void analyzeVersion(String version) {
|
|
||||||
//todo should we also be splitting on dash or underscore? we would need
|
|
||||||
// to incorporate the dash or underscore back in...
|
|
||||||
final LinkedList<String> tokens = getTokens();
|
|
||||||
final String[] versionParts = version.split("\\.");
|
|
||||||
String dottedVersion = null;
|
|
||||||
for (String current : versionParts) {
|
|
||||||
if (!current.matches("^/d+$")) {
|
|
||||||
tokens.add(current);
|
|
||||||
}
|
|
||||||
if (dottedVersion == null) {
|
|
||||||
dottedVersion = current;
|
|
||||||
} else {
|
|
||||||
dottedVersion = dottedVersion + "." + current;
|
|
||||||
}
|
|
||||||
tokens.add(dottedVersion);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,12 +1,4 @@
|
|||||||
/**
|
/**
|
||||||
* <html>
|
|
||||||
* <head>
|
|
||||||
* <title>org.owasp.dependencycheck.data.lucene</title>
|
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* Contains classes used to work with the Lucene Indexes.
|
* Contains classes used to work with the Lucene Indexes.
|
||||||
* </body>
|
*/
|
||||||
* </html>
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.owasp.dependencycheck.data.lucene;
|
package org.owasp.dependencycheck.data.lucene;
|
||||||
|
|||||||
@@ -24,6 +24,11 @@ package org.owasp.dependencycheck.data.nexus;
|
|||||||
*/
|
*/
|
||||||
public class MavenArtifact {
|
public class MavenArtifact {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The base URL for download artifacts from Central.
|
||||||
|
*/
|
||||||
|
private static final String CENTRAL_CONTENT_URL = "//search.maven.org/remotecontent?filepath=";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The groupId
|
* The groupId
|
||||||
*/
|
*/
|
||||||
@@ -43,6 +48,10 @@ public class MavenArtifact {
|
|||||||
* The artifact url. This may change depending on which Nexus server the search took place.
|
* The artifact url. This may change depending on which Nexus server the search took place.
|
||||||
*/
|
*/
|
||||||
private String artifactUrl;
|
private String artifactUrl;
|
||||||
|
/**
|
||||||
|
* The url to download the POM from.
|
||||||
|
*/
|
||||||
|
private String pomUrl;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates an empty MavenArtifact.
|
* Creates an empty MavenArtifact.
|
||||||
@@ -58,9 +67,41 @@ public class MavenArtifact {
|
|||||||
* @param version the version
|
* @param version the version
|
||||||
*/
|
*/
|
||||||
public MavenArtifact(String groupId, String artifactId, String version) {
|
public MavenArtifact(String groupId, String artifactId, String version) {
|
||||||
setGroupId(groupId);
|
this.groupId = groupId;
|
||||||
setArtifactId(artifactId);
|
this.artifactId = artifactId;
|
||||||
setVersion(version);
|
this.version = version;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a MavenArtifact with the given attributes.
|
||||||
|
*
|
||||||
|
* @param groupId the groupId
|
||||||
|
* @param artifactId the artifactId
|
||||||
|
* @param version the version
|
||||||
|
* @param jarAvailable if the jar file is available from central
|
||||||
|
* @param pomAvailable if the pom file is available from central
|
||||||
|
* @param secureDownload if the jar and pom files should be downloaded using HTTPS.
|
||||||
|
*/
|
||||||
|
public MavenArtifact(String groupId, String artifactId, String version, boolean jarAvailable, boolean pomAvailable, boolean secureDownload) {
|
||||||
|
this.groupId = groupId;
|
||||||
|
this.artifactId = artifactId;
|
||||||
|
this.version = version;
|
||||||
|
String base;
|
||||||
|
if (secureDownload) {
|
||||||
|
base = "https:" + CENTRAL_CONTENT_URL;
|
||||||
|
} else {
|
||||||
|
base = "http:" + CENTRAL_CONTENT_URL;
|
||||||
|
}
|
||||||
|
if (jarAvailable) {
|
||||||
|
//org/springframework/spring-core/3.2.0.RELEASE/spring-core-3.2.0.RELEASE.pom
|
||||||
|
this.artifactUrl = base + groupId.replace('.', '/') + "/" + artifactId + "/"
|
||||||
|
+ version + "/" + artifactId + "-" + version + ".jar";
|
||||||
|
}
|
||||||
|
if (pomAvailable) {
|
||||||
|
//org/springframework/spring-core/3.2.0.RELEASE/spring-core-3.2.0.RELEASE.pom
|
||||||
|
this.pomUrl = base + groupId.replace('.', '/') + "/" + artifactId + "/"
|
||||||
|
+ version + "/" + artifactId + "-" + version + ".pom";
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -72,10 +113,10 @@ public class MavenArtifact {
|
|||||||
* @param url the artifactLink url
|
* @param url the artifactLink url
|
||||||
*/
|
*/
|
||||||
public MavenArtifact(String groupId, String artifactId, String version, String url) {
|
public MavenArtifact(String groupId, String artifactId, String version, String url) {
|
||||||
setGroupId(groupId);
|
this.groupId = groupId;
|
||||||
setArtifactId(artifactId);
|
this.artifactId = artifactId;
|
||||||
setVersion(version);
|
this.version = version;
|
||||||
setArtifactUrl(url);
|
this.artifactUrl = url;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -159,6 +200,25 @@ public class MavenArtifact {
|
|||||||
public String getArtifactUrl() {
|
public String getArtifactUrl() {
|
||||||
return artifactUrl;
|
return artifactUrl;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the value of pomUrl.
|
||||||
|
*
|
||||||
|
* @return the value of pomUrl
|
||||||
|
*/
|
||||||
|
public String getPomUrl() {
|
||||||
|
return pomUrl;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Set the value of pomUrl.
|
||||||
|
*
|
||||||
|
* @param pomUrl new value of pomUrl
|
||||||
|
*/
|
||||||
|
public void setPomUrl(String pomUrl) {
|
||||||
|
this.pomUrl = pomUrl;
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// vim: cc=120:sw=4:ts=4:sts=4
|
// vim: cc=120:sw=4:ts=4:sts=4
|
||||||
|
|||||||
@@ -19,13 +19,17 @@ package org.owasp.dependencycheck.data.nexus;
|
|||||||
|
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
import java.net.HttpURLConnection;
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
import java.net.URLConnection;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
import javax.xml.parsers.DocumentBuilder;
|
import javax.xml.parsers.DocumentBuilder;
|
||||||
import javax.xml.parsers.DocumentBuilderFactory;
|
import javax.xml.parsers.DocumentBuilderFactory;
|
||||||
import javax.xml.xpath.XPath;
|
import javax.xml.xpath.XPath;
|
||||||
import javax.xml.xpath.XPathFactory;
|
import javax.xml.xpath.XPathFactory;
|
||||||
|
import org.owasp.dependencycheck.utils.InvalidSettingException;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
import org.owasp.dependencycheck.utils.URLConnectionFactory;
|
||||||
import org.w3c.dom.Document;
|
import org.w3c.dom.Document;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -36,10 +40,22 @@ import org.w3c.dom.Document;
|
|||||||
public class NexusSearch {
|
public class NexusSearch {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The root URL for the Nexus repository service
|
* The root URL for the Nexus repository service.
|
||||||
*/
|
*/
|
||||||
private final URL rootURL;
|
private final URL rootURL;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Whether to use the Proxy when making requests.
|
||||||
|
*/
|
||||||
|
private boolean useProxy;
|
||||||
|
/**
|
||||||
|
* The username to use if the Nexus requires authentication.
|
||||||
|
*/
|
||||||
|
private String userName = null;
|
||||||
|
/**
|
||||||
|
* The password to use if the Nexus requires authentication.
|
||||||
|
*/
|
||||||
|
private char[] password;
|
||||||
/**
|
/**
|
||||||
* Used for logging.
|
* Used for logging.
|
||||||
*/
|
*/
|
||||||
@@ -48,32 +64,49 @@ public class NexusSearch {
|
|||||||
/**
|
/**
|
||||||
* Creates a NexusSearch for the given repository URL.
|
* Creates a NexusSearch for the given repository URL.
|
||||||
*
|
*
|
||||||
* @param rootURL the root URL of the repository on which searches should execute. full URL's are calculated
|
* @param rootURL the root URL of the repository on which searches should execute. full URL's are calculated relative to this
|
||||||
* relative to this URL, so it should end with a /
|
* URL, so it should end with a /
|
||||||
*/
|
*/
|
||||||
public NexusSearch(URL rootURL) {
|
public NexusSearch(URL rootURL) {
|
||||||
this.rootURL = rootURL;
|
this.rootURL = rootURL;
|
||||||
|
try {
|
||||||
|
if (null != Settings.getString(Settings.KEYS.PROXY_SERVER)
|
||||||
|
&& Settings.getBoolean(Settings.KEYS.ANALYZER_NEXUS_PROXY)) {
|
||||||
|
useProxy = true;
|
||||||
|
LOGGER.fine("Using proxy");
|
||||||
|
} else {
|
||||||
|
useProxy = false;
|
||||||
|
LOGGER.fine("Not using proxy");
|
||||||
|
}
|
||||||
|
} catch (InvalidSettingException ise) {
|
||||||
|
useProxy = false;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Searches the configured Nexus repository for the given sha1 hash. If the artifact is found, a
|
* Searches the configured Nexus repository for the given sha1 hash. If the artifact is found, a <code>MavenArtifact</code> is
|
||||||
* <code>MavenArtifact</code> is populated with the coordinate information.
|
* populated with the coordinate information.
|
||||||
*
|
*
|
||||||
* @param sha1 The SHA-1 hash string for which to search
|
* @param sha1 The SHA-1 hash string for which to search
|
||||||
* @return the populated Maven coordinates
|
* @return the populated Maven coordinates
|
||||||
* @throws IOException if it's unable to connect to the specified repositor or if the specified artifact is not
|
* @throws IOException if it's unable to connect to the specified repository or if the specified artifact is not found.
|
||||||
* found.
|
|
||||||
*/
|
*/
|
||||||
public MavenArtifact searchSha1(String sha1) throws IOException {
|
public MavenArtifact searchSha1(String sha1) throws IOException {
|
||||||
if (null == sha1 || !sha1.matches("^[0-9A-Fa-f]{40}$")) {
|
if (null == sha1 || !sha1.matches("^[0-9A-Fa-f]{40}$")) {
|
||||||
throw new IllegalArgumentException("Invalid SHA1 format");
|
throw new IllegalArgumentException("Invalid SHA1 format");
|
||||||
}
|
}
|
||||||
|
|
||||||
final URL url = new URL(rootURL, String.format("identify/sha1/%s", sha1.toLowerCase()));
|
final URL url = new URL(rootURL, String.format("identify/sha1/%s",
|
||||||
|
sha1.toLowerCase()));
|
||||||
|
|
||||||
LOGGER.fine(String.format("Searching Nexus url %s", url.toString()));
|
LOGGER.fine(String.format("Searching Nexus url %s", url.toString()));
|
||||||
|
|
||||||
final URLConnection conn = url.openConnection();
|
// Determine if we need to use a proxy. The rules:
|
||||||
|
// 1) If the proxy is set, AND the setting is set to true, use the proxy
|
||||||
|
// 2) Otherwise, don't use the proxy (either the proxy isn't configured,
|
||||||
|
// or proxy is specifically set to false
|
||||||
|
HttpURLConnection conn;
|
||||||
|
conn = URLConnectionFactory.createHttpURLConnection(url, useProxy);
|
||||||
conn.setDoOutput(true);
|
conn.setDoOutput(true);
|
||||||
|
|
||||||
// JSON would be more elegant, but there's not currently a dependency
|
// JSON would be more elegant, but there's not currently a dependency
|
||||||
@@ -81,23 +114,81 @@ public class NexusSearch {
|
|||||||
conn.addRequestProperty("Accept", "application/xml");
|
conn.addRequestProperty("Accept", "application/xml");
|
||||||
conn.connect();
|
conn.connect();
|
||||||
|
|
||||||
|
if (conn.getResponseCode() == 200) {
|
||||||
|
try {
|
||||||
|
final DocumentBuilder builder = DocumentBuilderFactory
|
||||||
|
.newInstance().newDocumentBuilder();
|
||||||
|
final Document doc = builder.parse(conn.getInputStream());
|
||||||
|
final XPath xpath = XPathFactory.newInstance().newXPath();
|
||||||
|
final String groupId = xpath
|
||||||
|
.evaluate(
|
||||||
|
"/org.sonatype.nexus.rest.model.NexusArtifact/groupId",
|
||||||
|
doc);
|
||||||
|
final String artifactId = xpath.evaluate(
|
||||||
|
"/org.sonatype.nexus.rest.model.NexusArtifact/artifactId",
|
||||||
|
doc);
|
||||||
|
final String version = xpath
|
||||||
|
.evaluate(
|
||||||
|
"/org.sonatype.nexus.rest.model.NexusArtifact/version",
|
||||||
|
doc);
|
||||||
|
final String link = xpath
|
||||||
|
.evaluate(
|
||||||
|
"/org.sonatype.nexus.rest.model.NexusArtifact/artifactLink",
|
||||||
|
doc);
|
||||||
|
final String pomLink = xpath
|
||||||
|
.evaluate(
|
||||||
|
"/org.sonatype.nexus.rest.model.NexusArtifact/pomLink",
|
||||||
|
doc);
|
||||||
|
final MavenArtifact ma = new MavenArtifact(groupId, artifactId, version);
|
||||||
|
if (link != null && !"".equals(link)) {
|
||||||
|
ma.setArtifactUrl(link);
|
||||||
|
}
|
||||||
|
if (pomLink != null && !"".equals(pomLink)) {
|
||||||
|
ma.setPomUrl(pomLink);
|
||||||
|
}
|
||||||
|
return ma;
|
||||||
|
} catch (Throwable e) {
|
||||||
|
// Anything else is jacked-up XML stuff that we really can't recover
|
||||||
|
// from well
|
||||||
|
throw new IOException(e.getMessage(), e);
|
||||||
|
}
|
||||||
|
} else if (conn.getResponseCode() == 404) {
|
||||||
|
throw new FileNotFoundException("Artifact not found in Nexus");
|
||||||
|
} else {
|
||||||
|
final String msg = String.format("Could not connect to Nexus received response code: %d %s",
|
||||||
|
conn.getResponseCode(), conn.getResponseMessage());
|
||||||
|
LOGGER.fine(msg);
|
||||||
|
throw new IOException(msg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Do a preflight request to see if the repository is actually working.
|
||||||
|
*
|
||||||
|
* @return whether the repository is listening and returns the /status URL correctly
|
||||||
|
*/
|
||||||
|
public boolean preflightRequest() {
|
||||||
|
HttpURLConnection conn;
|
||||||
try {
|
try {
|
||||||
|
final URL url = new URL(rootURL, "status");
|
||||||
|
conn = URLConnectionFactory.createHttpURLConnection(url, useProxy);
|
||||||
|
conn.addRequestProperty("Accept", "application/xml");
|
||||||
|
conn.connect();
|
||||||
|
if (conn.getResponseCode() != 200) {
|
||||||
|
LOGGER.log(Level.WARNING, "Expected 200 result from Nexus, got {0}", conn.getResponseCode());
|
||||||
|
return false;
|
||||||
|
}
|
||||||
final DocumentBuilder builder = DocumentBuilderFactory.newInstance().newDocumentBuilder();
|
final DocumentBuilder builder = DocumentBuilderFactory.newInstance().newDocumentBuilder();
|
||||||
final Document doc = builder.parse(conn.getInputStream());
|
final Document doc = builder.parse(conn.getInputStream());
|
||||||
final XPath xpath = XPathFactory.newInstance().newXPath();
|
if (!"status".equals(doc.getDocumentElement().getNodeName())) {
|
||||||
final String groupId = xpath.evaluate("/org.sonatype.nexus.rest.model.NexusArtifact/groupId", doc);
|
LOGGER.log(Level.WARNING, "Expected root node name of status, got {0}", doc.getDocumentElement().getNodeName());
|
||||||
final String artifactId = xpath.evaluate("/org.sonatype.nexus.rest.model.NexusArtifact/artifactId", doc);
|
return false;
|
||||||
final String version = xpath.evaluate("/org.sonatype.nexus.rest.model.NexusArtifact/version", doc);
|
}
|
||||||
final String link = xpath.evaluate("/org.sonatype.nexus.rest.model.NexusArtifact/artifactLink", doc);
|
} catch (Throwable e) {
|
||||||
return new MavenArtifact(groupId, artifactId, version, link);
|
return false;
|
||||||
} catch (FileNotFoundException fnfe) {
|
|
||||||
// This is what we get when the SHA1 they sent doesn't exist in Nexus. This
|
|
||||||
// is useful upstream for recovery, so we just re-throw it
|
|
||||||
throw fnfe;
|
|
||||||
} catch (Exception e) {
|
|
||||||
// Anything else is jacked-up XML stuff that we really can't recover from well
|
|
||||||
throw new IOException(e.getMessage(), e);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,14 +1,6 @@
|
|||||||
/**
|
/**
|
||||||
* <html>
|
* Contains classes related to searching a Nexus repository.<br/><br/>
|
||||||
* <head>
|
*
|
||||||
* <title>org.owasp.dependencycheck.data.nexus</title>
|
* These are used to abstract Nexus searching away from OWASP Dependency Check so they can be reused elsewhere.
|
||||||
* </head>
|
|
||||||
* <body>
|
|
||||||
* <p>
|
|
||||||
* Contains classes related to searching a Nexus repository.</p>
|
|
||||||
* <p>
|
|
||||||
* These are used to abstract Nexus searching away from OWASP Dependency Check so they can be reused elsewhere.</p>
|
|
||||||
* </body>
|
|
||||||
* </html>
|
|
||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.data.nexus;
|
package org.owasp.dependencycheck.data.nexus;
|
||||||
|
|||||||
@@ -0,0 +1,186 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.data.nuget;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Represents the contents of a Nuspec manifest.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*/
|
||||||
|
public class NugetPackage {
|
||||||
|
/**
|
||||||
|
* The id.
|
||||||
|
*/
|
||||||
|
private String id;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The version.
|
||||||
|
*/
|
||||||
|
private String version;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The title.
|
||||||
|
*/
|
||||||
|
private String title;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The authors.
|
||||||
|
*/
|
||||||
|
private String authors;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The owners.
|
||||||
|
*/
|
||||||
|
private String owners;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The licenseUrl.
|
||||||
|
*/
|
||||||
|
private String licenseUrl;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates an empty NugetPackage.
|
||||||
|
*/
|
||||||
|
public NugetPackage() {
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the id.
|
||||||
|
* @param id the id
|
||||||
|
*/
|
||||||
|
public void setId(String id) {
|
||||||
|
this.id = id;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the id.
|
||||||
|
* @return the id
|
||||||
|
*/
|
||||||
|
public String getId() {
|
||||||
|
return id;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the version.
|
||||||
|
* @param version the version
|
||||||
|
*/
|
||||||
|
public void setVersion(String version) {
|
||||||
|
this.version = version;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the version.
|
||||||
|
* @return the version
|
||||||
|
*/
|
||||||
|
public String getVersion() {
|
||||||
|
return version;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the title.
|
||||||
|
* @param title the title
|
||||||
|
*/
|
||||||
|
public void setTitle(String title) {
|
||||||
|
this.title = title;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the title.
|
||||||
|
* @return the title
|
||||||
|
*/
|
||||||
|
public String getTitle() {
|
||||||
|
return title;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the authors.
|
||||||
|
* @param authors the authors
|
||||||
|
*/
|
||||||
|
public void setAuthors(String authors) {
|
||||||
|
this.authors = authors;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the authors.
|
||||||
|
* @return the authors
|
||||||
|
*/
|
||||||
|
public String getAuthors() {
|
||||||
|
return authors;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the owners.
|
||||||
|
* @param owners the owners
|
||||||
|
*/
|
||||||
|
public void setOwners(String owners) {
|
||||||
|
this.owners = owners;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the owners.
|
||||||
|
* @return the owners
|
||||||
|
*/
|
||||||
|
public String getOwners() {
|
||||||
|
return owners;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the licenseUrl.
|
||||||
|
* @param licenseUrl the licenseUrl
|
||||||
|
*/
|
||||||
|
public void setLicenseUrl(String licenseUrl) {
|
||||||
|
this.licenseUrl = licenseUrl;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the licenseUrl.
|
||||||
|
* @return the licenseUrl
|
||||||
|
*/
|
||||||
|
public String getLicenseUrl() {
|
||||||
|
return licenseUrl;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean equals(Object other) {
|
||||||
|
if (this == other) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
if (other == null || other.getClass() != this.getClass()) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
final NugetPackage o = (NugetPackage) other;
|
||||||
|
return o.getId().equals(id)
|
||||||
|
&& o.getVersion().equals(version)
|
||||||
|
&& o.getTitle().equals(title)
|
||||||
|
&& o.getAuthors().equals(authors)
|
||||||
|
&& o.getOwners().equals(owners)
|
||||||
|
&& o.getLicenseUrl().equals(licenseUrl);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public int hashCode() {
|
||||||
|
int hash = 7;
|
||||||
|
hash = 31 * hash + (null == id ? 0 : id.hashCode());
|
||||||
|
hash = 31 * hash + (null == version ? 0 : version.hashCode());
|
||||||
|
hash = 31 * hash + (null == title ? 0 : title.hashCode());
|
||||||
|
hash = 31 * hash + (null == authors ? 0 : authors.hashCode());
|
||||||
|
hash = 31 * hash + (null == owners ? 0 : owners.hashCode());
|
||||||
|
hash = 31 * hash + (null == licenseUrl ? 0 : licenseUrl.hashCode());
|
||||||
|
return hash;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,67 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.data.nuget;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Exception during the parsing of a Nuspec file.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*/
|
||||||
|
public class NuspecParseException extends Exception {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The serialVersionUID
|
||||||
|
*/
|
||||||
|
private static final long serialVersionUID = 1;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Constructs a new exception with <code>null</code> as its detail message.
|
||||||
|
*
|
||||||
|
* The cause is not initialized, and may subsequently be initialized by a call to
|
||||||
|
* {@link java.lang.Throwable#initCause(java.lang.Throwable)}.
|
||||||
|
*/
|
||||||
|
public NuspecParseException() {
|
||||||
|
super();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Constructs a new exception with the specified detail message. The cause is not initialized, and may subsequently
|
||||||
|
* be initialized by a call to {@link java.lang.Throwable#initCause(java.lang.Throwable)}.
|
||||||
|
*
|
||||||
|
* @param message the detail message. The detail message is saved for later retrieval by the
|
||||||
|
* {@link java.lang.Throwable#getMessage()} method.
|
||||||
|
*/
|
||||||
|
public NuspecParseException(String message) {
|
||||||
|
super(message);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Constructs a new exception with the specified detail message and cause.
|
||||||
|
*
|
||||||
|
* Note that the detail message associated with <code>cause</code> is <em>not</em>
|
||||||
|
* automatically incorporated in this exception's detail message.
|
||||||
|
*
|
||||||
|
* @param message the detail message (which is saved for later retrieval by the
|
||||||
|
* {@link java.lang.Throwable#getMessage()} method.
|
||||||
|
* @param cause the cause (which is saved for later retrieval by the {@link java.lang.Throwable#getCause()} method).
|
||||||
|
* (A <code>null</code> value is permitted, and indicates that the cause is nonexistent or unknown).
|
||||||
|
*/
|
||||||
|
public NuspecParseException(String message, Throwable cause) {
|
||||||
|
super(message, cause);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,37 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.data.nuget;
|
||||||
|
|
||||||
|
import java.io.InputStream;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Interface defining methods for parsing a Nuspec file.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public interface NuspecParser {
|
||||||
|
/**
|
||||||
|
* Parse an input stream and return the resulting {@link NugetPackage}.
|
||||||
|
*
|
||||||
|
* @param stream the input stream to parse
|
||||||
|
* @return the populated bean
|
||||||
|
* @throws NuspecParseException when an exception occurs
|
||||||
|
*/
|
||||||
|
NugetPackage parse(InputStream stream) throws NuspecParseException;
|
||||||
|
}
|
||||||
@@ -0,0 +1,81 @@
|
|||||||
|
/*
|
||||||
|
* This file is part of dependency-check-core.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2014 Jeremy Long. All Rights Reserved.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.data.nuget;
|
||||||
|
|
||||||
|
import java.io.InputStream;
|
||||||
|
import javax.xml.parsers.DocumentBuilderFactory;
|
||||||
|
import javax.xml.xpath.XPath;
|
||||||
|
import javax.xml.xpath.XPathConstants;
|
||||||
|
import javax.xml.xpath.XPathFactory;
|
||||||
|
import org.w3c.dom.Document;
|
||||||
|
import org.w3c.dom.Node;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Parse a Nuspec file using XPath.
|
||||||
|
*
|
||||||
|
* @author colezlaw
|
||||||
|
*/
|
||||||
|
public class XPathNuspecParser implements NuspecParser {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the string value of a node or null if it's not present
|
||||||
|
*
|
||||||
|
* @param n the node to test
|
||||||
|
* @return the string content of the node, or null if the node itself is null
|
||||||
|
*/
|
||||||
|
private String getOrNull(Node n) {
|
||||||
|
if (n != null) {
|
||||||
|
return n.getTextContent();
|
||||||
|
} else {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Parse an input stream and return the resulting {@link NugetPackage}.
|
||||||
|
*
|
||||||
|
* @param stream the input stream to parse
|
||||||
|
* @return the populated bean
|
||||||
|
* @throws NuspecParseException when an exception occurs
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public NugetPackage parse(InputStream stream) throws NuspecParseException {
|
||||||
|
try {
|
||||||
|
final Document d = DocumentBuilderFactory.newInstance().newDocumentBuilder().parse(stream);
|
||||||
|
final XPath xpath = XPathFactory.newInstance().newXPath();
|
||||||
|
final NugetPackage nuspec = new NugetPackage();
|
||||||
|
|
||||||
|
if (xpath.evaluate("/package/metadata/id", d, XPathConstants.NODE) == null
|
||||||
|
|| xpath.evaluate("/package/metadata/version", d, XPathConstants.NODE) == null
|
||||||
|
|| xpath.evaluate("/package/metadata/authors", d, XPathConstants.NODE) == null
|
||||||
|
|| xpath.evaluate("/package/metadata/description", d, XPathConstants.NODE) == null) {
|
||||||
|
throw new NuspecParseException("Invalid Nuspec format");
|
||||||
|
}
|
||||||
|
|
||||||
|
nuspec.setId(xpath.evaluate("/package/metadata/id", d));
|
||||||
|
nuspec.setVersion(xpath.evaluate("/package/metadata/version", d));
|
||||||
|
nuspec.setAuthors(xpath.evaluate("/package/metadata/authors", d));
|
||||||
|
nuspec.setOwners(getOrNull((Node) xpath.evaluate("/package/metadata/owners", d, XPathConstants.NODE)));
|
||||||
|
nuspec.setLicenseUrl(getOrNull((Node) xpath.evaluate("/package/metadata/licenseUrl", d, XPathConstants.NODE)));
|
||||||
|
nuspec.setTitle(getOrNull((Node) xpath.evaluate("/package/metadata/title", d, XPathConstants.NODE)));
|
||||||
|
return nuspec;
|
||||||
|
} catch (Throwable e) {
|
||||||
|
throw new NuspecParseException("Unable to parse nuspec", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,5 @@
|
|||||||
|
/**
|
||||||
|
* Contains classes related to parsing Nuget related files<br/><br/>
|
||||||
|
* These are used to abstract away Nuget-related handling from Dependency Check so they can be used elsewhere.
|
||||||
|
*/
|
||||||
|
package org.owasp.dependencycheck.data.nuget;
|
||||||
@@ -24,6 +24,7 @@ import java.io.InputStream;
|
|||||||
import java.io.InputStreamReader;
|
import java.io.InputStreamReader;
|
||||||
import java.sql.CallableStatement;
|
import java.sql.CallableStatement;
|
||||||
import java.sql.Connection;
|
import java.sql.Connection;
|
||||||
|
import java.sql.Driver;
|
||||||
import java.sql.DriverManager;
|
import java.sql.DriverManager;
|
||||||
import java.sql.ResultSet;
|
import java.sql.ResultSet;
|
||||||
import java.sql.SQLException;
|
import java.sql.SQLException;
|
||||||
@@ -38,18 +39,38 @@ import org.owasp.dependencycheck.utils.Settings;
|
|||||||
* obtaining a connection will ensure the database file exists and that the appropriate table structure has been
|
* obtaining a connection will ensure the database file exists and that the appropriate table structure has been
|
||||||
* created.
|
* created.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public final class ConnectionFactory {
|
public final class ConnectionFactory {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The Logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(ConnectionFactory.class.getName());
|
||||||
/**
|
/**
|
||||||
* The version of the current DB Schema.
|
* The version of the current DB Schema.
|
||||||
*/
|
*/
|
||||||
public static final String DB_SCHEMA_VERSION = "2.9";
|
public static final String DB_SCHEMA_VERSION = Settings.getString(Settings.KEYS.DB_VERSION);
|
||||||
/**
|
/**
|
||||||
* Resource location for SQL file used to create the database schema.
|
* Resource location for SQL file used to create the database schema.
|
||||||
*/
|
*/
|
||||||
public static final String DB_STRUCTURE_RESOURCE = "data/initialize.sql";
|
public static final String DB_STRUCTURE_RESOURCE = "data/initialize.sql";
|
||||||
|
/**
|
||||||
|
* The database driver used to connect to the database.
|
||||||
|
*/
|
||||||
|
private static Driver driver = null;
|
||||||
|
/**
|
||||||
|
* The database connection string.
|
||||||
|
*/
|
||||||
|
private static String connectionString = null;
|
||||||
|
/**
|
||||||
|
* The username to connect to the database.
|
||||||
|
*/
|
||||||
|
private static String userName = null;
|
||||||
|
/**
|
||||||
|
* The password for the database.
|
||||||
|
*/
|
||||||
|
private static String password = null;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Private constructor for this factory class; no instance is ever needed.
|
* Private constructor for this factory class; no instance is ever needed.
|
||||||
@@ -58,117 +79,160 @@ public final class ConnectionFactory {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructs a new database connection object per the database configuration. This will load the appropriate
|
* Initializes the connection factory. Ensuring that the appropriate drivers are loaded and that a connection can be
|
||||||
* database driver, via the DriverManager, if configured.
|
* made successfully.
|
||||||
*
|
*
|
||||||
* @return a database connection object
|
* @throws DatabaseException thrown if we are unable to connect to the database
|
||||||
* @throws DatabaseException thrown if there is an exception loading the database connection
|
|
||||||
*/
|
*/
|
||||||
public static Connection getConnection() throws DatabaseException {
|
public static synchronized void initialize() throws DatabaseException {
|
||||||
|
//this only needs to be called once.
|
||||||
|
if (connectionString != null) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
Connection conn = null;
|
Connection conn = null;
|
||||||
try {
|
try {
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Loading database connection");
|
//load the driver if necessary
|
||||||
|
|
||||||
final String connStr = getConnectionString();
|
|
||||||
final String user = Settings.getString(Settings.KEYS.DB_USER, "dcuser");
|
|
||||||
//yes, yes - hard-coded password - only if there isn't one in the properties file.
|
|
||||||
final String pass = Settings.getString(Settings.KEYS.DB_PASSWORD, "DC-Pass1337!");
|
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Connection String: {0}", connStr);
|
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Database User: {0}", user);
|
|
||||||
boolean createTables = false;
|
|
||||||
if (connStr.startsWith("jdbc:h2:file:")) { //H2
|
|
||||||
createTables = needToCreateDatabaseStructure();
|
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Need to create DB Structure: {0}", createTables);
|
|
||||||
}
|
|
||||||
final String driverName = Settings.getString(Settings.KEYS.DB_DRIVER_NAME, "");
|
final String driverName = Settings.getString(Settings.KEYS.DB_DRIVER_NAME, "");
|
||||||
if (!driverName.isEmpty()) { //likely need to load the correct driver
|
if (!driverName.isEmpty()) { //likely need to load the correct driver
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Loading driver: {0}", driverName);
|
LOGGER.log(Level.FINE, "Loading driver: {0}", driverName);
|
||||||
final String driverPath = Settings.getString(Settings.KEYS.DB_DRIVER_PATH, "");
|
final String driverPath = Settings.getString(Settings.KEYS.DB_DRIVER_PATH, "");
|
||||||
if (!driverPath.isEmpty()) { //ugh, driver is not on classpath?
|
try {
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Loading driver from: {0}", driverPath);
|
if (!driverPath.isEmpty()) {
|
||||||
DriverLoader.load(driverName, driverPath);
|
LOGGER.log(Level.FINE, "Loading driver from: {0}", driverPath);
|
||||||
|
driver = DriverLoader.load(driverName, driverPath);
|
||||||
|
} else {
|
||||||
|
driver = DriverLoader.load(driverName);
|
||||||
|
}
|
||||||
|
} catch (DriverLoadException ex) {
|
||||||
|
LOGGER.log(Level.FINE, "Unable to load database driver", ex);
|
||||||
|
throw new DatabaseException("Unable to load database driver");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
userName = Settings.getString(Settings.KEYS.DB_USER, "dcuser");
|
||||||
|
//yes, yes - hard-coded password - only if there isn't one in the properties file.
|
||||||
|
password = Settings.getString(Settings.KEYS.DB_PASSWORD, "DC-Pass1337!");
|
||||||
|
try {
|
||||||
|
connectionString = Settings.getConnectionString(
|
||||||
|
Settings.KEYS.DB_CONNECTION_STRING,
|
||||||
|
Settings.KEYS.DB_FILE_NAME,
|
||||||
|
Settings.KEYS.DB_VERSION);
|
||||||
|
} catch (IOException ex) {
|
||||||
|
LOGGER.log(Level.FINE,
|
||||||
|
"Unable to retrieve the database connection string", ex);
|
||||||
|
throw new DatabaseException("Unable to retrieve the database connection string");
|
||||||
|
}
|
||||||
|
boolean shouldCreateSchema = false;
|
||||||
|
try {
|
||||||
|
if (connectionString.startsWith("jdbc:h2:file:")) { //H2
|
||||||
|
shouldCreateSchema = !h2DataFileExists();
|
||||||
|
LOGGER.log(Level.FINE, "Need to create DB Structure: {0}", shouldCreateSchema);
|
||||||
|
}
|
||||||
|
} catch (IOException ioex) {
|
||||||
|
LOGGER.log(Level.FINE, "Unable to verify database exists", ioex);
|
||||||
|
throw new DatabaseException("Unable to verify database exists");
|
||||||
|
}
|
||||||
|
LOGGER.log(Level.FINE, "Loading database connection");
|
||||||
|
LOGGER.log(Level.FINE, "Connection String: {0}", connectionString);
|
||||||
|
LOGGER.log(Level.FINE, "Database User: {0}", userName);
|
||||||
|
|
||||||
|
try {
|
||||||
|
conn = DriverManager.getConnection(connectionString, userName, password);
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
if (ex.getMessage().contains("java.net.UnknownHostException") && connectionString.contains("AUTO_SERVER=TRUE;")) {
|
||||||
|
connectionString = connectionString.replace("AUTO_SERVER=TRUE;", "");
|
||||||
|
try {
|
||||||
|
conn = DriverManager.getConnection(connectionString, userName, password);
|
||||||
|
Settings.setString(Settings.KEYS.DB_CONNECTION_STRING, connectionString);
|
||||||
|
LOGGER.log(Level.FINE,
|
||||||
|
"Unable to start the database in server mode; reverting to single user mode");
|
||||||
|
} catch (SQLException sqlex) {
|
||||||
|
LOGGER.log(Level.FINE, "Unable to connect to the database", ex);
|
||||||
|
throw new DatabaseException("Unable to connect to the database");
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
DriverLoader.load(driverName);
|
LOGGER.log(Level.FINE, "Unable to connect to the database", ex);
|
||||||
|
throw new DatabaseException("Unable to connect to the database");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
//JDBC4 drivers don't need this call.
|
if (shouldCreateSchema) {
|
||||||
//Class.forName("org.h2.Driver");
|
|
||||||
conn = DriverManager.getConnection(connStr, user, pass);
|
|
||||||
if (createTables) {
|
|
||||||
try {
|
try {
|
||||||
createTables(conn);
|
createTables(conn);
|
||||||
} catch (DatabaseException ex) {
|
} catch (DatabaseException dex) {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, dex);
|
||||||
throw new DatabaseException("Unable to create the database structure");
|
throw new DatabaseException("Unable to create the database structure");
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
try {
|
try {
|
||||||
ensureSchemaVersion(conn);
|
ensureSchemaVersion(conn);
|
||||||
} catch (DatabaseException ex) {
|
} catch (DatabaseException dex) {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, dex);
|
||||||
throw new DatabaseException("Database schema does not match this version of dependency-check");
|
throw new DatabaseException("Database schema does not match this version of dependency-check");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} catch (IOException ex) {
|
} finally {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, null, ex);
|
if (conn != null) {
|
||||||
throw new DatabaseException("Unable to load database");
|
try {
|
||||||
} catch (DriverLoadException ex) {
|
conn.close();
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, null, ex);
|
} catch (SQLException ex) {
|
||||||
throw new DatabaseException("Unable to load database driver");
|
LOGGER.log(Level.FINE, "An error occurred closing the connection", ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Cleans up resources and unloads any registered database drivers. This needs to be called to ensure the driver is
|
||||||
|
* unregistered prior to the finalize method being called as during shutdown the class loader used to load the
|
||||||
|
* driver may be unloaded prior to the driver being de-registered.
|
||||||
|
*/
|
||||||
|
public static synchronized void cleanup() {
|
||||||
|
if (driver != null) {
|
||||||
|
try {
|
||||||
|
DriverManager.deregisterDriver(driver);
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
LOGGER.log(Level.FINE, "An error occurred unloading the database driver", ex);
|
||||||
|
} catch (Throwable unexpected) {
|
||||||
|
LOGGER.log(Level.FINE,
|
||||||
|
"An unexpected throwable occurred unloading the database driver", unexpected);
|
||||||
|
}
|
||||||
|
driver = null;
|
||||||
|
}
|
||||||
|
connectionString = null;
|
||||||
|
userName = null;
|
||||||
|
password = null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Constructs a new database connection object per the database configuration.
|
||||||
|
*
|
||||||
|
* @return a database connection object
|
||||||
|
* @throws DatabaseException thrown if there is an exception loading the database connection
|
||||||
|
*/
|
||||||
|
public static Connection getConnection() throws DatabaseException {
|
||||||
|
initialize();
|
||||||
|
Connection conn = null;
|
||||||
|
try {
|
||||||
|
conn = DriverManager.getConnection(connectionString, userName, password);
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new DatabaseException("Unable to connect to the database");
|
throw new DatabaseException("Unable to connect to the database");
|
||||||
}
|
}
|
||||||
return conn;
|
return conn;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the configured connection string. If using the embedded H2 database this function will also ensure the
|
|
||||||
* data directory exists and if not create it.
|
|
||||||
*
|
|
||||||
* @return the connection string
|
|
||||||
* @throws IOException thrown the data directory cannot be created
|
|
||||||
*/
|
|
||||||
private static String getConnectionString() throws IOException {
|
|
||||||
final String connStr = Settings.getString(Settings.KEYS.DB_CONNECTION_STRING, "jdbc:h2:file:%s;AUTO_SERVER=TRUE");
|
|
||||||
if (connStr.contains("%s")) {
|
|
||||||
final String directory = getDataDirectory().getCanonicalPath();
|
|
||||||
final File dataFile = new File(directory, "cve." + DB_SCHEMA_VERSION);
|
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, String.format("File path for H2 file: '%s'", dataFile.toString()));
|
|
||||||
return String.format(connStr, dataFile.getAbsolutePath());
|
|
||||||
}
|
|
||||||
return connStr;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Retrieves the directory that the JAR file exists in so that we can ensure we always use a common data directory
|
|
||||||
* for the embedded H2 database. This is public solely for some unit tests; otherwise this should be private.
|
|
||||||
*
|
|
||||||
* @return the data directory to store data files
|
|
||||||
* @throws IOException is thrown if an IOException occurs of course...
|
|
||||||
*/
|
|
||||||
public static File getDataDirectory() throws IOException {
|
|
||||||
final File path = Settings.getDataFile(Settings.KEYS.DATA_DIRECTORY);
|
|
||||||
if (!path.exists()) {
|
|
||||||
if (!path.mkdirs()) {
|
|
||||||
throw new IOException("Unable to create NVD CVE Data directory");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return path;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Determines if the H2 database file exists. If it does not exist then the data structure will need to be created.
|
* Determines if the H2 database file exists. If it does not exist then the data structure will need to be created.
|
||||||
*
|
*
|
||||||
* @return true if the H2 database file does not exist; otherwise false
|
* @return true if the H2 database file does not exist; otherwise false
|
||||||
* @throws IOException thrown if the data directory does not exist and cannot be created
|
* @throws IOException thrown if the data directory does not exist and cannot be created
|
||||||
*/
|
*/
|
||||||
private static boolean needToCreateDatabaseStructure() throws IOException {
|
private static boolean h2DataFileExists() throws IOException {
|
||||||
final File dir = getDataDirectory();
|
final File dir = Settings.getDataDirectory();
|
||||||
final String name = String.format("cve.%s.h2.db", DB_SCHEMA_VERSION);
|
final String name = Settings.getString(Settings.KEYS.DB_FILE_NAME);
|
||||||
final File file = new File(dir, name);
|
final String fileName = String.format(name, DB_SCHEMA_VERSION);
|
||||||
return !file.exists();
|
final File file = new File(dir, fileName);
|
||||||
|
return file.exists();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -178,7 +242,7 @@ public final class ConnectionFactory {
|
|||||||
* @throws DatabaseException thrown if there is a Database Exception
|
* @throws DatabaseException thrown if there is a Database Exception
|
||||||
*/
|
*/
|
||||||
private static void createTables(Connection conn) throws DatabaseException {
|
private static void createTables(Connection conn) throws DatabaseException {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, "Creating database structure");
|
LOGGER.log(Level.FINE, "Creating database structure");
|
||||||
InputStream is;
|
InputStream is;
|
||||||
InputStreamReader reader;
|
InputStreamReader reader;
|
||||||
BufferedReader in = null;
|
BufferedReader in = null;
|
||||||
@@ -196,7 +260,7 @@ public final class ConnectionFactory {
|
|||||||
statement = conn.createStatement();
|
statement = conn.createStatement();
|
||||||
statement.execute(sb.toString());
|
statement.execute(sb.toString());
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new DatabaseException("Unable to create database statement", ex);
|
throw new DatabaseException("Unable to create database statement", ex);
|
||||||
} finally {
|
} finally {
|
||||||
DBUtils.closeStatement(statement);
|
DBUtils.closeStatement(statement);
|
||||||
@@ -208,7 +272,7 @@ public final class ConnectionFactory {
|
|||||||
try {
|
try {
|
||||||
in.close();
|
in.close();
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -235,7 +299,7 @@ public final class ConnectionFactory {
|
|||||||
throw new DatabaseException("Database schema is missing");
|
throw new DatabaseException("Database schema is missing");
|
||||||
}
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
Logger.getLogger(ConnectionFactory.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new DatabaseException("Unable to check the database schema version");
|
throw new DatabaseException("Unable to check the database schema version");
|
||||||
} finally {
|
} finally {
|
||||||
DBUtils.closeResultSet(rs);
|
DBUtils.closeResultSet(rs);
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ package org.owasp.dependencycheck.data.nvdcve;
|
|||||||
* An exception used to indicate the db4o database is corrupt. This could be due to invalid data or a complete failure
|
* An exception used to indicate the db4o database is corrupt. This could be due to invalid data or a complete failure
|
||||||
* of the db.
|
* of the db.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
class CorruptDatabaseException extends DatabaseException {
|
class CorruptDatabaseException extends DatabaseException {
|
||||||
|
|
||||||
|
|||||||
@@ -17,6 +17,7 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.data.nvdcve;
|
package org.owasp.dependencycheck.data.nvdcve;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
import java.io.UnsupportedEncodingException;
|
import java.io.UnsupportedEncodingException;
|
||||||
import java.sql.Connection;
|
import java.sql.Connection;
|
||||||
import java.sql.PreparedStatement;
|
import java.sql.PreparedStatement;
|
||||||
@@ -24,10 +25,13 @@ import java.sql.ResultSet;
|
|||||||
import java.sql.SQLException;
|
import java.sql.SQLException;
|
||||||
import java.sql.Statement;
|
import java.sql.Statement;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
|
import java.util.HashMap;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
import java.util.Map.Entry;
|
import java.util.Map.Entry;
|
||||||
import java.util.Properties;
|
import java.util.Properties;
|
||||||
|
import java.util.ResourceBundle;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
import java.util.logging.Logger;
|
import java.util.logging.Logger;
|
||||||
@@ -38,27 +42,38 @@ import org.owasp.dependencycheck.dependency.VulnerableSoftware;
|
|||||||
import org.owasp.dependencycheck.utils.DBUtils;
|
import org.owasp.dependencycheck.utils.DBUtils;
|
||||||
import org.owasp.dependencycheck.utils.DependencyVersion;
|
import org.owasp.dependencycheck.utils.DependencyVersion;
|
||||||
import org.owasp.dependencycheck.utils.DependencyVersionUtil;
|
import org.owasp.dependencycheck.utils.DependencyVersionUtil;
|
||||||
|
import org.owasp.dependencycheck.utils.Pair;
|
||||||
|
import org.owasp.dependencycheck.utils.Settings;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The database holding information about the NVD CVE data.
|
* The database holding information about the NVD CVE data.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class CveDB {
|
public class CveDB {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(CveDB.class.getName());
|
||||||
/**
|
/**
|
||||||
* Database connection
|
* Database connection
|
||||||
*/
|
*/
|
||||||
private Connection conn;
|
private Connection conn;
|
||||||
|
/**
|
||||||
|
* The bundle of statements used when accessing the database.
|
||||||
|
*/
|
||||||
|
private ResourceBundle statementBundle = null;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a new CveDB object and opens the database connection. Note, the connection must be closed by the caller
|
* Creates a new CveDB object and opens the database connection. Note, the connection must be closed by the caller by calling
|
||||||
* by calling the close method.
|
* the close method.
|
||||||
*
|
*
|
||||||
* @throws DatabaseException thrown if there is an exception opening the database.
|
* @throws DatabaseException thrown if there is an exception opening the database.
|
||||||
*/
|
*/
|
||||||
public CveDB() throws DatabaseException {
|
public CveDB() throws DatabaseException {
|
||||||
super();
|
super();
|
||||||
|
statementBundle = java.util.ResourceBundle.getBundle("data/dbStatements");
|
||||||
try {
|
try {
|
||||||
open();
|
open();
|
||||||
databaseProperties = new DatabaseProperties(this);
|
databaseProperties = new DatabaseProperties(this);
|
||||||
@@ -82,7 +97,9 @@ public class CveDB {
|
|||||||
* @throws DatabaseException thrown if there is an error opening the database connection
|
* @throws DatabaseException thrown if there is an error opening the database connection
|
||||||
*/
|
*/
|
||||||
public final void open() throws DatabaseException {
|
public final void open() throws DatabaseException {
|
||||||
conn = ConnectionFactory.getConnection();
|
if (!isOpen()) {
|
||||||
|
conn = ConnectionFactory.getConnection();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -94,8 +111,12 @@ public class CveDB {
|
|||||||
conn.close();
|
conn.close();
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = "There was an error attempting to close the CveDB, see the log for more details.";
|
final String msg = "There was an error attempting to close the CveDB, see the log for more details.";
|
||||||
Logger.getLogger(DBUtils.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(DBUtils.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
|
} catch (Throwable ex) {
|
||||||
|
final String msg = "There was an exception attempting to close the CveDB, see the log for more details.";
|
||||||
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
}
|
}
|
||||||
conn = null;
|
conn = null;
|
||||||
}
|
}
|
||||||
@@ -128,7 +149,9 @@ public class CveDB {
|
|||||||
* @throws Throwable thrown if there is a problem
|
* @throws Throwable thrown if there is a problem
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
|
@SuppressWarnings("FinalizeDeclaration")
|
||||||
protected void finalize() throws Throwable {
|
protected void finalize() throws Throwable {
|
||||||
|
LOGGER.log(Level.FINE, "Entering finalize");
|
||||||
close();
|
close();
|
||||||
super.finalize();
|
super.finalize();
|
||||||
}
|
}
|
||||||
@@ -145,116 +168,10 @@ public class CveDB {
|
|||||||
public DatabaseProperties getDatabaseProperties() {
|
public DatabaseProperties getDatabaseProperties() {
|
||||||
return databaseProperties;
|
return databaseProperties;
|
||||||
}
|
}
|
||||||
//<editor-fold defaultstate="collapsed" desc="Constants to create, maintain, and retrieve data from the CVE Database">
|
|
||||||
/**
|
|
||||||
* SQL Statement to delete references by vulnerability ID.
|
|
||||||
*/
|
|
||||||
private static final String DELETE_REFERENCE = "DELETE FROM reference WHERE cveid = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to delete software by vulnerability ID.
|
|
||||||
*/
|
|
||||||
private static final String DELETE_SOFTWARE = "DELETE FROM software WHERE cveid = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to delete a vulnerability by CVE.
|
|
||||||
*/
|
|
||||||
private static final String DELETE_VULNERABILITY = "DELETE FROM vulnerability WHERE id = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to cleanup orphan entries. Yes, the db schema could be a little tighter, but what we have works
|
|
||||||
* well to keep the data file size down a bit.
|
|
||||||
*/
|
|
||||||
private static final String CLEANUP_ORPHANS = "DELETE FROM CpeEntry WHERE id not in (SELECT CPEEntryId FROM Software); ";
|
|
||||||
/**
|
|
||||||
* SQL Statement to insert a new reference.
|
|
||||||
*/
|
|
||||||
private static final String INSERT_REFERENCE = "INSERT INTO reference (cveid, name, url, source) VALUES (?, ?, ?, ?)";
|
|
||||||
/**
|
|
||||||
* SQL Statement to insert a new software.
|
|
||||||
*/
|
|
||||||
private static final String INSERT_SOFTWARE = "INSERT INTO software (cveid, cpeEntryId, previousVersion) VALUES (?, ?, ?)";
|
|
||||||
/**
|
|
||||||
* SQL Statement to insert a new cpe.
|
|
||||||
*/
|
|
||||||
private static final String INSERT_CPE = "INSERT INTO cpeEntry (cpe, vendor, product) VALUES (?, ?, ?)";
|
|
||||||
/**
|
|
||||||
* SQL Statement to get a CPEProductID.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_CPE_ID = "SELECT id FROM cpeEntry WHERE cpe = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to insert a new vulnerability.
|
|
||||||
*/
|
|
||||||
private static final String INSERT_VULNERABILITY = "INSERT INTO vulnerability (cve, description, cwe, cvssScore, cvssAccessVector, "
|
|
||||||
+ "cvssAccessComplexity, cvssAuthentication, cvssConfidentialityImpact, cvssIntegrityImpact, cvssAvailabilityImpact) "
|
|
||||||
+ "VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?)";
|
|
||||||
/**
|
|
||||||
* SQL Statement to update a vulnerability.
|
|
||||||
*/
|
|
||||||
private static final String UPDATE_VULNERABILITY = "UPDATE vulnerability SET description=?, cwe=?, cvssScore=?, cvssAccessVector=?, "
|
|
||||||
+ "cvssAccessComplexity=?, cvssAuthentication=?, cvssConfidentialityImpact=?, cvssIntegrityImpact=?, cvssAvailabilityImpact=? "
|
|
||||||
+ "WHERE id=?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to find CVE entries based on CPE data.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_CVE_FROM_SOFTWARE = "SELECT cve, cpe, previousVersion "
|
|
||||||
+ "FROM software INNER JOIN vulnerability ON vulnerability.id = software.cveId "
|
|
||||||
+ "INNER JOIN cpeEntry ON cpeEntry.id = software.cpeEntryId "
|
|
||||||
+ "WHERE vendor = ? AND product = ?";
|
|
||||||
//unfortunately, the version info is too complicated to do in a select. Need to filter this afterwards
|
|
||||||
// + " AND (version = '-' OR previousVersion IS NOT NULL OR version=?)";
|
|
||||||
//
|
|
||||||
/**
|
|
||||||
* SQL Statement to find the CPE entry based on the vendor and product.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_CPE_ENTRIES = "SELECT cpe FROM cpeEntry WHERE vendor = ? AND product = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to select references by CVEID.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_REFERENCE = "SELECT source, name, url FROM reference WHERE cveid = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to select vendor and product for lucene index.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_VENDOR_PRODUCT_LIST = "SELECT vendor, product FROM cpeEntry GROUP BY vendor, product";
|
|
||||||
/**
|
|
||||||
* SQL Statement to select software by CVEID.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_SOFTWARE = "SELECT cpe, previousVersion "
|
|
||||||
+ "FROM software INNER JOIN cpeEntry ON software.cpeEntryId = cpeEntry.id WHERE cveid = ?";
|
|
||||||
// public static final String SELECT_SOFTWARE = "SELECT part, vendor, product, version, revision, previousVersion "
|
|
||||||
// + "FROM software INNER JOIN cpeProduct ON cpeProduct.id = software.cpeProductId LEFT JOIN cpeVersion ON "
|
|
||||||
// + "software.cpeVersionId = cpeVersion.id LEFT JOIN Version ON cpeVersion.versionId = version.id WHERE cveid = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to select a vulnerability by CVEID.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_VULNERABILITY = "SELECT id, description, cwe, cvssScore, cvssAccessVector, cvssAccessComplexity, "
|
|
||||||
+ "cvssAuthentication, cvssConfidentialityImpact, cvssIntegrityImpact, cvssAvailabilityImpact FROM vulnerability WHERE cve = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to select a vulnerability's primary key.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_VULNERABILITY_ID = "SELECT id FROM vulnerability WHERE cve = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to retrieve the properties from the database.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_PROPERTIES = "SELECT id, value FROM properties";
|
|
||||||
/**
|
|
||||||
* SQL Statement to retrieve a property from the database.
|
|
||||||
*/
|
|
||||||
private static final String SELECT_PROPERTY = "SELECT id, value FROM properties WHERE id = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to insert a new property.
|
|
||||||
*/
|
|
||||||
private static final String INSERT_PROPERTY = "INSERT INTO properties (id, value) VALUES (?, ?)";
|
|
||||||
/**
|
|
||||||
* SQL Statement to update a property.
|
|
||||||
*/
|
|
||||||
private static final String UPDATE_PROPERTY = "UPDATE properties SET value = ? WHERE id = ?";
|
|
||||||
/**
|
|
||||||
* SQL Statement to delete a property.
|
|
||||||
*/
|
|
||||||
private static final String DELETE_PROPERTY = "DELETE FROM properties WHERE id = ?";
|
|
||||||
|
|
||||||
//</editor-fold>
|
|
||||||
/**
|
/**
|
||||||
* Searches the CPE entries in the database and retrieves all entries for a given vendor and product combination.
|
* Searches the CPE entries in the database and retrieves all entries for a given vendor and product combination. The returned
|
||||||
* The returned list will include all versions of the product that are registered in the NVD CVE data.
|
* list will include all versions of the product that are registered in the NVD CVE data.
|
||||||
*
|
*
|
||||||
* @param vendor the identified vendor name of the dependency being analyzed
|
* @param vendor the identified vendor name of the dependency being analyzed
|
||||||
* @param product the identified name of the product of the dependency being analyzed
|
* @param product the identified name of the product of the dependency being analyzed
|
||||||
@@ -265,7 +182,7 @@ public class CveDB {
|
|||||||
ResultSet rs = null;
|
ResultSet rs = null;
|
||||||
PreparedStatement ps = null;
|
PreparedStatement ps = null;
|
||||||
try {
|
try {
|
||||||
ps = getConnection().prepareStatement(SELECT_CPE_ENTRIES);
|
ps = getConnection().prepareStatement(statementBundle.getString("SELECT_CPE_ENTRIES"));
|
||||||
ps.setString(1, vendor);
|
ps.setString(1, vendor);
|
||||||
ps.setString(2, product);
|
ps.setString(2, product);
|
||||||
rs = ps.executeQuery();
|
rs = ps.executeQuery();
|
||||||
@@ -277,8 +194,8 @@ public class CveDB {
|
|||||||
}
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} finally {
|
} finally {
|
||||||
DBUtils.closeResultSet(rs);
|
DBUtils.closeResultSet(rs);
|
||||||
DBUtils.closeStatement(ps);
|
DBUtils.closeStatement(ps);
|
||||||
@@ -289,19 +206,27 @@ public class CveDB {
|
|||||||
/**
|
/**
|
||||||
* Returns the entire list of vendor/product combinations.
|
* Returns the entire list of vendor/product combinations.
|
||||||
*
|
*
|
||||||
* @return the entire list of vendor/product combinations.
|
* @return the entire list of vendor/product combinations
|
||||||
|
* @throws DatabaseException thrown when there is an error retrieving the data from the DB
|
||||||
*/
|
*/
|
||||||
public ResultSet getVendorProductList() {
|
public Set<Pair<String, String>> getVendorProductList() throws DatabaseException {
|
||||||
|
final Set<Pair<String, String>> data = new HashSet<Pair<String, String>>();
|
||||||
ResultSet rs = null;
|
ResultSet rs = null;
|
||||||
|
PreparedStatement ps = null;
|
||||||
try {
|
try {
|
||||||
final PreparedStatement ps = getConnection().prepareStatement(SELECT_VENDOR_PRODUCT_LIST);
|
ps = getConnection().prepareStatement(statementBundle.getString("SELECT_VENDOR_PRODUCT_LIST"));
|
||||||
rs = ps.executeQuery();
|
rs = ps.executeQuery();
|
||||||
|
while (rs.next()) {
|
||||||
|
data.add(new Pair<String, String>(rs.getString(1), rs.getString(2)));
|
||||||
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.SEVERE, msg);
|
throw new DatabaseException(msg, ex);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, null, ex);
|
} finally {
|
||||||
} // can't close the statement in the PS as the resultset is returned, closing PS would close the resultset
|
DBUtils.closeResultSet(rs);
|
||||||
return rs;
|
DBUtils.closeStatement(ps);
|
||||||
|
}
|
||||||
|
return data;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -314,15 +239,15 @@ public class CveDB {
|
|||||||
PreparedStatement ps = null;
|
PreparedStatement ps = null;
|
||||||
ResultSet rs = null;
|
ResultSet rs = null;
|
||||||
try {
|
try {
|
||||||
ps = getConnection().prepareStatement(SELECT_PROPERTIES);
|
ps = getConnection().prepareStatement(statementBundle.getString("SELECT_PROPERTIES"));
|
||||||
rs = ps.executeQuery();
|
rs = ps.executeQuery();
|
||||||
while (rs.next()) {
|
while (rs.next()) {
|
||||||
prop.setProperty(rs.getString(1), rs.getString(2));
|
prop.setProperty(rs.getString(1), rs.getString(2));
|
||||||
}
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} finally {
|
} finally {
|
||||||
DBUtils.closeStatement(ps);
|
DBUtils.closeStatement(ps);
|
||||||
DBUtils.closeResultSet(rs);
|
DBUtils.closeResultSet(rs);
|
||||||
@@ -340,11 +265,11 @@ public class CveDB {
|
|||||||
PreparedStatement insertProperty = null;
|
PreparedStatement insertProperty = null;
|
||||||
try {
|
try {
|
||||||
try {
|
try {
|
||||||
updateProperty = getConnection().prepareStatement(UPDATE_PROPERTY);
|
updateProperty = getConnection().prepareStatement(statementBundle.getString("UPDATE_PROPERTY"));
|
||||||
insertProperty = getConnection().prepareStatement(INSERT_PROPERTY);
|
insertProperty = getConnection().prepareStatement(statementBundle.getString("INSERT_PROPERTY"));
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.WARNING, "Unable to save properties to the database");
|
LOGGER.log(Level.WARNING, "Unable to save properties to the database");
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Unable to save properties to the database", ex);
|
LOGGER.log(Level.FINE, "Unable to save properties to the database", ex);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
for (Entry<Object, Object> entry : props.entrySet()) {
|
for (Entry<Object, Object> entry : props.entrySet()) {
|
||||||
@@ -359,8 +284,8 @@ public class CveDB {
|
|||||||
}
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = String.format("Unable to save property '%s' with a value of '%s' to the database", key, value);
|
final String msg = String.format("Unable to save property '%s' with a value of '%s' to the database", key, value);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.WARNING, msg);
|
LOGGER.log(Level.WARNING, msg);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} finally {
|
} finally {
|
||||||
@@ -380,10 +305,10 @@ public class CveDB {
|
|||||||
PreparedStatement insertProperty = null;
|
PreparedStatement insertProperty = null;
|
||||||
try {
|
try {
|
||||||
try {
|
try {
|
||||||
updateProperty = getConnection().prepareStatement(UPDATE_PROPERTY);
|
updateProperty = getConnection().prepareStatement(statementBundle.getString("UPDATE_PROPERTY"));
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.WARNING, "Unable to save properties to the database");
|
LOGGER.log(Level.WARNING, "Unable to save properties to the database");
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Unable to save properties to the database", ex);
|
LOGGER.log(Level.FINE, "Unable to save properties to the database", ex);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
@@ -391,10 +316,10 @@ public class CveDB {
|
|||||||
updateProperty.setString(2, key);
|
updateProperty.setString(2, key);
|
||||||
if (updateProperty.executeUpdate() == 0) {
|
if (updateProperty.executeUpdate() == 0) {
|
||||||
try {
|
try {
|
||||||
insertProperty = getConnection().prepareStatement(INSERT_PROPERTY);
|
insertProperty = getConnection().prepareStatement(statementBundle.getString("INSERT_PROPERTY"));
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.WARNING, "Unable to save properties to the database");
|
LOGGER.log(Level.WARNING, "Unable to save properties to the database");
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, "Unable to save properties to the database", ex);
|
LOGGER.log(Level.FINE, "Unable to save properties to the database", ex);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
insertProperty.setString(1, key);
|
insertProperty.setString(1, key);
|
||||||
@@ -403,8 +328,8 @@ public class CveDB {
|
|||||||
}
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = String.format("Unable to save property '%s' with a value of '%s' to the database", key, value);
|
final String msg = String.format("Unable to save property '%s' with a value of '%s' to the database", key, value);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.WARNING, msg);
|
LOGGER.log(Level.WARNING, msg);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
}
|
}
|
||||||
} finally {
|
} finally {
|
||||||
DBUtils.closeStatement(updateProperty);
|
DBUtils.closeStatement(updateProperty);
|
||||||
@@ -425,36 +350,47 @@ public class CveDB {
|
|||||||
try {
|
try {
|
||||||
cpe.parseName(cpeStr);
|
cpe.parseName(cpeStr);
|
||||||
} catch (UnsupportedEncodingException ex) {
|
} catch (UnsupportedEncodingException ex) {
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
final DependencyVersion detectedVersion = parseDependencyVersion(cpe);
|
final DependencyVersion detectedVersion = parseDependencyVersion(cpe);
|
||||||
final List<Vulnerability> vulnerabilities = new ArrayList<Vulnerability>();
|
final List<Vulnerability> vulnerabilities = new ArrayList<Vulnerability>();
|
||||||
|
|
||||||
PreparedStatement ps;
|
PreparedStatement ps;
|
||||||
final HashSet<String> cveEntries = new HashSet<String>();
|
|
||||||
try {
|
try {
|
||||||
ps = getConnection().prepareStatement(SELECT_CVE_FROM_SOFTWARE);
|
ps = getConnection().prepareStatement(statementBundle.getString("SELECT_CVE_FROM_SOFTWARE"));
|
||||||
ps.setString(1, cpe.getVendor());
|
ps.setString(1, cpe.getVendor());
|
||||||
ps.setString(2, cpe.getProduct());
|
ps.setString(2, cpe.getProduct());
|
||||||
rs = ps.executeQuery();
|
rs = ps.executeQuery();
|
||||||
|
String currentCVE = "";
|
||||||
|
|
||||||
|
final Map<String, Boolean> vulnSoftware = new HashMap<String, Boolean>();
|
||||||
while (rs.next()) {
|
while (rs.next()) {
|
||||||
final String cveId = rs.getString(1);
|
final String cveId = rs.getString(1);
|
||||||
|
if (!currentCVE.equals(cveId)) { //check for match and add
|
||||||
|
final Entry<String, Boolean> matchedCPE = getMatchingSoftware(vulnSoftware, cpe.getVendor(), cpe.getProduct(), detectedVersion);
|
||||||
|
if (matchedCPE != null) {
|
||||||
|
final Vulnerability v = getVulnerability(currentCVE);
|
||||||
|
v.setMatchedCPE(matchedCPE.getKey(), matchedCPE.getValue() ? "Y" : null);
|
||||||
|
vulnerabilities.add(v);
|
||||||
|
}
|
||||||
|
vulnSoftware.clear();
|
||||||
|
currentCVE = cveId;
|
||||||
|
}
|
||||||
|
|
||||||
final String cpeId = rs.getString(2);
|
final String cpeId = rs.getString(2);
|
||||||
final String previous = rs.getString(3);
|
final String previous = rs.getString(3);
|
||||||
if (!cveEntries.contains(cveId) && isAffected(cpe.getVendor(), cpe.getProduct(), detectedVersion, cpeId, previous)) {
|
final Boolean p = previous != null && !previous.isEmpty();
|
||||||
cveEntries.add(cveId);
|
vulnSoftware.put(cpeId, p);
|
||||||
final Vulnerability v = getVulnerability(cveId);
|
}
|
||||||
v.setMatchedCPE(cpeId, previous);
|
//remember to process the last set of CVE/CPE entries
|
||||||
vulnerabilities.add(v);
|
final Entry<String, Boolean> matchedCPE = getMatchingSoftware(vulnSoftware, cpe.getVendor(), cpe.getProduct(), detectedVersion);
|
||||||
}
|
if (matchedCPE != null) {
|
||||||
|
final Vulnerability v = getVulnerability(currentCVE);
|
||||||
|
v.setMatchedCPE(matchedCPE.getKey(), matchedCPE.getValue() ? "Y" : null);
|
||||||
|
vulnerabilities.add(v);
|
||||||
}
|
}
|
||||||
DBUtils.closeResultSet(rs);
|
DBUtils.closeResultSet(rs);
|
||||||
DBUtils.closeStatement(ps);
|
DBUtils.closeStatement(ps);
|
||||||
// for (String cve : cveEntries) {
|
|
||||||
// final Vulnerability v = getVulnerability(cve);
|
|
||||||
// vulnerabilities.add(v);
|
|
||||||
// }
|
|
||||||
|
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
throw new DatabaseException("Exception retrieving vulnerability for " + cpeStr, ex);
|
throw new DatabaseException("Exception retrieving vulnerability for " + cpeStr, ex);
|
||||||
} finally {
|
} finally {
|
||||||
@@ -479,7 +415,7 @@ public class CveDB {
|
|||||||
ResultSet rsS = null;
|
ResultSet rsS = null;
|
||||||
Vulnerability vuln = null;
|
Vulnerability vuln = null;
|
||||||
try {
|
try {
|
||||||
psV = getConnection().prepareStatement(SELECT_VULNERABILITY);
|
psV = getConnection().prepareStatement(statementBundle.getString("SELECT_VULNERABILITY"));
|
||||||
psV.setString(1, cve);
|
psV.setString(1, cve);
|
||||||
rsV = psV.executeQuery();
|
rsV = psV.executeQuery();
|
||||||
if (rsV.next()) {
|
if (rsV.next()) {
|
||||||
@@ -503,13 +439,13 @@ public class CveDB {
|
|||||||
vuln.setCvssIntegrityImpact(rsV.getString(9));
|
vuln.setCvssIntegrityImpact(rsV.getString(9));
|
||||||
vuln.setCvssAvailabilityImpact(rsV.getString(10));
|
vuln.setCvssAvailabilityImpact(rsV.getString(10));
|
||||||
|
|
||||||
psR = getConnection().prepareStatement(SELECT_REFERENCE);
|
psR = getConnection().prepareStatement(statementBundle.getString("SELECT_REFERENCES"));
|
||||||
psR.setInt(1, cveId);
|
psR.setInt(1, cveId);
|
||||||
rsR = psR.executeQuery();
|
rsR = psR.executeQuery();
|
||||||
while (rsR.next()) {
|
while (rsR.next()) {
|
||||||
vuln.addReference(rsR.getString(1), rsR.getString(2), rsR.getString(3));
|
vuln.addReference(rsR.getString(1), rsR.getString(2), rsR.getString(3));
|
||||||
}
|
}
|
||||||
psS = getConnection().prepareStatement(SELECT_SOFTWARE);
|
psS = getConnection().prepareStatement(statementBundle.getString("SELECT_SOFTWARE"));
|
||||||
psS.setInt(1, cveId);
|
psS.setInt(1, cveId);
|
||||||
rsS = psS.executeQuery();
|
rsS = psS.executeQuery();
|
||||||
while (rsS.next()) {
|
while (rsS.next()) {
|
||||||
@@ -554,16 +490,18 @@ public class CveDB {
|
|||||||
PreparedStatement insertSoftware = null;
|
PreparedStatement insertSoftware = null;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
selectVulnerabilityId = getConnection().prepareStatement(SELECT_VULNERABILITY_ID);
|
selectVulnerabilityId = getConnection().prepareStatement(statementBundle.getString("SELECT_VULNERABILITY_ID"));
|
||||||
deleteVulnerability = getConnection().prepareStatement(DELETE_VULNERABILITY);
|
deleteVulnerability = getConnection().prepareStatement(statementBundle.getString("DELETE_VULNERABILITY"));
|
||||||
deleteReferences = getConnection().prepareStatement(DELETE_REFERENCE);
|
deleteReferences = getConnection().prepareStatement(statementBundle.getString("DELETE_REFERENCE"));
|
||||||
deleteSoftware = getConnection().prepareStatement(DELETE_SOFTWARE);
|
deleteSoftware = getConnection().prepareStatement(statementBundle.getString("DELETE_SOFTWARE"));
|
||||||
updateVulnerability = getConnection().prepareStatement(UPDATE_VULNERABILITY);
|
updateVulnerability = getConnection().prepareStatement(statementBundle.getString("UPDATE_VULNERABILITY"));
|
||||||
insertVulnerability = getConnection().prepareStatement(INSERT_VULNERABILITY, Statement.RETURN_GENERATED_KEYS);
|
insertVulnerability = getConnection().prepareStatement(statementBundle.getString("INSERT_VULNERABILITY"),
|
||||||
insertReference = getConnection().prepareStatement(INSERT_REFERENCE);
|
Statement.RETURN_GENERATED_KEYS);
|
||||||
selectCpeId = getConnection().prepareStatement(SELECT_CPE_ID);
|
insertReference = getConnection().prepareStatement(statementBundle.getString("INSERT_REFERENCE"));
|
||||||
insertCpe = getConnection().prepareStatement(INSERT_CPE, Statement.RETURN_GENERATED_KEYS);
|
selectCpeId = getConnection().prepareStatement(statementBundle.getString("SELECT_CPE_ID"));
|
||||||
insertSoftware = getConnection().prepareStatement(INSERT_SOFTWARE);
|
insertCpe = getConnection().prepareStatement(statementBundle.getString("INSERT_CPE"),
|
||||||
|
Statement.RETURN_GENERATED_KEYS);
|
||||||
|
insertSoftware = getConnection().prepareStatement(statementBundle.getString("INSERT_SOFTWARE"));
|
||||||
int vulnerabilityId = 0;
|
int vulnerabilityId = 0;
|
||||||
selectVulnerabilityId.setString(1, vuln.getName());
|
selectVulnerabilityId.setString(1, vuln.getName());
|
||||||
ResultSet rs = selectVulnerabilityId.executeQuery();
|
ResultSet rs = selectVulnerabilityId.executeQuery();
|
||||||
@@ -663,7 +601,7 @@ public class CveDB {
|
|||||||
|
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = String.format("Error updating '%s'", vuln.getName());
|
final String msg = String.format("Error updating '%s'", vuln.getName());
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
throw new DatabaseException(msg, ex);
|
throw new DatabaseException(msg, ex);
|
||||||
} finally {
|
} finally {
|
||||||
DBUtils.closeStatement(selectVulnerabilityId);
|
DBUtils.closeStatement(selectVulnerabilityId);
|
||||||
@@ -680,64 +618,137 @@ public class CveDB {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* It is possible that orphaned rows may be generated during database updates. This should be called after all
|
* Checks to see if data exists so that analysis can be performed.
|
||||||
* updates have been completed to ensure orphan entries are removed.
|
*
|
||||||
|
* @return <code>true</code> if data exists; otherwise <code>false</code>
|
||||||
|
*/
|
||||||
|
public boolean dataExists() {
|
||||||
|
Statement cs = null;
|
||||||
|
ResultSet rs = null;
|
||||||
|
try {
|
||||||
|
cs = conn.createStatement();
|
||||||
|
rs = cs.executeQuery("SELECT COUNT(*) records FROM cpeEntry");
|
||||||
|
if (rs.next()) {
|
||||||
|
if (rs.getInt(1) > 0) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
String dd;
|
||||||
|
try {
|
||||||
|
dd = Settings.getDataDirectory().getAbsolutePath();
|
||||||
|
} catch (IOException ex1) {
|
||||||
|
dd = Settings.getString(Settings.KEYS.DATA_DIRECTORY);
|
||||||
|
}
|
||||||
|
final String msg = String.format("Unable to access the local database.%n%nEnsure that '%s' is a writable directory. "
|
||||||
|
+ "If the problem persist try deleting the files in '%s' and running %s again. If the problem continues, please "
|
||||||
|
+ "create a log file (see documentation at http://jeremylong.github.io/DependencyCheck/) and open a ticket at "
|
||||||
|
+ "https://github.com/jeremylong/DependencyCheck/issues and include the log file.%n%n",
|
||||||
|
dd, dd, Settings.getString(Settings.KEYS.APPLICATION_VAME));
|
||||||
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
|
LOGGER.log(Level.FINE, "", ex);
|
||||||
|
} finally {
|
||||||
|
DBUtils.closeResultSet(rs);
|
||||||
|
DBUtils.closeStatement(cs);
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* It is possible that orphaned rows may be generated during database updates. This should be called after all updates have
|
||||||
|
* been completed to ensure orphan entries are removed.
|
||||||
*/
|
*/
|
||||||
public void cleanupDatabase() {
|
public void cleanupDatabase() {
|
||||||
PreparedStatement ps = null;
|
PreparedStatement ps = null;
|
||||||
try {
|
try {
|
||||||
ps = getConnection().prepareStatement(CLEANUP_ORPHANS);
|
ps = getConnection().prepareStatement(statementBundle.getString("CLEANUP_ORPHANS"));
|
||||||
if (ps != null) {
|
if (ps != null) {
|
||||||
ps.executeUpdate();
|
ps.executeUpdate();
|
||||||
}
|
}
|
||||||
} catch (SQLException ex) {
|
} catch (SQLException ex) {
|
||||||
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
final String msg = "An unexpected SQL Exception occurred; please see the verbose log for more details.";
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.SEVERE, msg);
|
LOGGER.log(Level.SEVERE, msg);
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINE, null, ex);
|
LOGGER.log(Level.FINE, null, ex);
|
||||||
} finally {
|
} finally {
|
||||||
DBUtils.closeStatement(ps);
|
DBUtils.closeStatement(ps);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Determines if the given identifiedVersion is affected by the given cpeId and previous version flag. A non-null,
|
* Determines if the given identifiedVersion is affected by the given cpeId and previous version flag. A non-null, non-empty
|
||||||
* non-empty string passed to the previous version argument indicates that all previous versions are affected.
|
* string passed to the previous version argument indicates that all previous versions are affected.
|
||||||
*
|
*
|
||||||
* @param vendor the vendor of the dependency being analyzed
|
* @param vendor the vendor of the dependency being analyzed
|
||||||
* @param product the product name of the dependency being analyzed
|
* @param product the product name of the dependency being analyzed
|
||||||
|
* @param vulnerableSoftware a map of the vulnerable software with a boolean indicating if all previous versions are affected
|
||||||
* @param identifiedVersion the identified version of the dependency being analyzed
|
* @param identifiedVersion the identified version of the dependency being analyzed
|
||||||
* @param cpeId the cpe identifier of software that has a known vulnerability
|
|
||||||
* @param previous a flag indicating if previous versions of the product are vulnerable
|
|
||||||
* @return true if the identified version is affected, otherwise false
|
* @return true if the identified version is affected, otherwise false
|
||||||
*/
|
*/
|
||||||
private boolean isAffected(String vendor, String product, DependencyVersion identifiedVersion, String cpeId, String previous) {
|
Entry<String, Boolean> getMatchingSoftware(Map<String, Boolean> vulnerableSoftware, String vendor, String product,
|
||||||
boolean affected = false;
|
DependencyVersion identifiedVersion) {
|
||||||
final boolean isStruts = "apache".equals(vendor) && "struts".equals(product);
|
|
||||||
final DependencyVersion v = parseDependencyVersion(cpeId);
|
final boolean isVersionTwoADifferentProduct = "apache".equals(vendor) && "struts".equals(product);
|
||||||
final boolean prevAffected = previous != null && !previous.isEmpty();
|
|
||||||
if (identifiedVersion == null || "-".equals(identifiedVersion.toString())) {
|
final Set<String> majorVersionsAffectingAllPrevious = new HashSet<String>();
|
||||||
if (v == null || "-".equals(v.toString())) {
|
final boolean matchesAnyPrevious = identifiedVersion == null || "-".equals(identifiedVersion.toString());
|
||||||
affected = true;
|
String majorVersionMatch = null;
|
||||||
|
for (Entry<String, Boolean> entry : vulnerableSoftware.entrySet()) {
|
||||||
|
final DependencyVersion v = parseDependencyVersion(entry.getKey());
|
||||||
|
if (v == null || "-".equals(v.toString())) { //all versions
|
||||||
|
return entry;
|
||||||
}
|
}
|
||||||
} else if (identifiedVersion.equals(v) || (prevAffected && identifiedVersion.compareTo(v) < 0)) {
|
if (entry.getValue()) {
|
||||||
if (isStruts) { //struts 2 vulns don't affect struts 1
|
if (matchesAnyPrevious) {
|
||||||
if (identifiedVersion.getVersionParts().get(0).equals(v.getVersionParts().get(0))) {
|
return entry;
|
||||||
affected = true;
|
|
||||||
}
|
}
|
||||||
} else {
|
if (identifiedVersion != null && identifiedVersion.getVersionParts().get(0).equals(v.getVersionParts().get(0))) {
|
||||||
affected = true;
|
majorVersionMatch = v.getVersionParts().get(0);
|
||||||
|
}
|
||||||
|
majorVersionsAffectingAllPrevious.add(v.getVersionParts().get(0));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
/*
|
if (matchesAnyPrevious) {
|
||||||
* TODO consider utilizing the matchThreeVersion method to get additional results. However, this
|
return null;
|
||||||
* might also introduce false positives.
|
}
|
||||||
*/
|
|
||||||
return affected;
|
final boolean canSkipVersions = majorVersionMatch != null && majorVersionsAffectingAllPrevious.size() > 1;
|
||||||
|
//yes, we are iterating over this twice. The first time we are skipping versions those that affect all versions
|
||||||
|
//then later we process those that affect all versions. This could be done with sorting...
|
||||||
|
for (Entry<String, Boolean> entry : vulnerableSoftware.entrySet()) {
|
||||||
|
if (!entry.getValue()) {
|
||||||
|
final DependencyVersion v = parseDependencyVersion(entry.getKey());
|
||||||
|
//this can't dereference a null 'majorVersionMatch' as canSkipVersions accounts for this.
|
||||||
|
if (canSkipVersions && !majorVersionMatch.equals(v.getVersionParts().get(0))) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
//this can't dereference a null 'identifiedVersion' because if it was null we would have exited
|
||||||
|
//in the above loop or just after loop (if matchesAnyPrevious return null).
|
||||||
|
if (identifiedVersion.equals(v)) {
|
||||||
|
return entry;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for (Entry<String, Boolean> entry : vulnerableSoftware.entrySet()) {
|
||||||
|
if (entry.getValue()) {
|
||||||
|
final DependencyVersion v = parseDependencyVersion(entry.getKey());
|
||||||
|
//this can't dereference a null 'majorVersionMatch' as canSkipVersions accounts for this.
|
||||||
|
if (canSkipVersions && !majorVersionMatch.equals(v.getVersionParts().get(0))) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
//this can't dereference a null 'identifiedVersion' because if it was null we would have exited
|
||||||
|
//in the above loop or just after loop (if matchesAnyPrevious return null).
|
||||||
|
if (entry.getValue() && identifiedVersion.compareTo(v) <= 0) {
|
||||||
|
if (!(isVersionTwoADifferentProduct && !identifiedVersion.getVersionParts().get(0).equals(v.getVersionParts().get(0)))) {
|
||||||
|
return entry;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Parses the version (including revision) from a CPE identifier. If no version is identified then a '-' is
|
* Parses the version (including revision) from a CPE identifier. If no version is identified then a '-' is returned.
|
||||||
* returned.
|
|
||||||
*
|
*
|
||||||
* @param cpeStr a cpe identifier
|
* @param cpeStr a cpe identifier
|
||||||
* @return a dependency version
|
* @return a dependency version
|
||||||
@@ -748,7 +759,7 @@ public class CveDB {
|
|||||||
cpe.parseName(cpeStr);
|
cpe.parseName(cpeStr);
|
||||||
} catch (UnsupportedEncodingException ex) {
|
} catch (UnsupportedEncodingException ex) {
|
||||||
//never going to happen.
|
//never going to happen.
|
||||||
Logger.getLogger(CveDB.class.getName()).log(Level.FINEST, null, ex);
|
LOGGER.log(Level.FINEST, null, ex);
|
||||||
}
|
}
|
||||||
return parseDependencyVersion(cpe);
|
return parseDependencyVersion(cpe);
|
||||||
}
|
}
|
||||||
@@ -761,9 +772,9 @@ public class CveDB {
|
|||||||
*/
|
*/
|
||||||
private DependencyVersion parseDependencyVersion(VulnerableSoftware cpe) {
|
private DependencyVersion parseDependencyVersion(VulnerableSoftware cpe) {
|
||||||
DependencyVersion cpeVersion;
|
DependencyVersion cpeVersion;
|
||||||
if (cpe.getVersion() != null && cpe.getVersion().length() > 0) {
|
if (cpe.getVersion() != null && !cpe.getVersion().isEmpty()) {
|
||||||
String versionText;
|
String versionText;
|
||||||
if (cpe.getRevision() != null && cpe.getRevision().length() > 0) {
|
if (cpe.getRevision() != null && !cpe.getRevision().isEmpty()) {
|
||||||
versionText = String.format("%s.%s", cpe.getVersion(), cpe.getRevision());
|
versionText = String.format("%s.%s", cpe.getVersion(), cpe.getRevision());
|
||||||
} else {
|
} else {
|
||||||
versionText = cpe.getVersion();
|
versionText = cpe.getVersion();
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ package org.owasp.dependencycheck.data.nvdcve;
|
|||||||
/**
|
/**
|
||||||
* An exception thrown if an operation against the database fails.
|
* An exception thrown if an operation against the database fails.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class DatabaseException extends Exception {
|
public class DatabaseException extends Exception {
|
||||||
|
|
||||||
|
|||||||
@@ -17,7 +17,6 @@
|
|||||||
*/
|
*/
|
||||||
package org.owasp.dependencycheck.data.nvdcve;
|
package org.owasp.dependencycheck.data.nvdcve;
|
||||||
|
|
||||||
import com.hazelcast.logging.Logger;
|
|
||||||
import java.text.DateFormat;
|
import java.text.DateFormat;
|
||||||
import java.text.SimpleDateFormat;
|
import java.text.SimpleDateFormat;
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
@@ -26,16 +25,21 @@ import java.util.Map.Entry;
|
|||||||
import java.util.Properties;
|
import java.util.Properties;
|
||||||
import java.util.TreeMap;
|
import java.util.TreeMap;
|
||||||
import java.util.logging.Level;
|
import java.util.logging.Level;
|
||||||
|
import java.util.logging.Logger;
|
||||||
import org.owasp.dependencycheck.data.update.NvdCveInfo;
|
import org.owasp.dependencycheck.data.update.NvdCveInfo;
|
||||||
import org.owasp.dependencycheck.data.update.exception.UpdateException;
|
import org.owasp.dependencycheck.data.update.exception.UpdateException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This is a wrapper around a set of properties that are stored in the database.
|
* This is a wrapper around a set of properties that are stored in the database.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class DatabaseProperties {
|
public class DatabaseProperties {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The Logger.
|
||||||
|
*/
|
||||||
|
private static final Logger LOGGER = Logger.getLogger(DatabaseProperties.class.getName());
|
||||||
/**
|
/**
|
||||||
* Modified key word, used as a key to store information about the modified file (i.e. the containing the last 8
|
* Modified key word, used as a key to store information about the modified file (i.e. the containing the last 8
|
||||||
* days of updates)..
|
* days of updates)..
|
||||||
@@ -87,7 +91,7 @@ public class DatabaseProperties {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Writes a properties file containing the last updated date to the VULNERABLE_CPE directory.
|
* Saves the last updated information to the properties file.
|
||||||
*
|
*
|
||||||
* @param updatedValue the updated NVD CVE entry
|
* @param updatedValue the updated NVD CVE entry
|
||||||
* @throws UpdateException is thrown if there is an update exception
|
* @throws UpdateException is thrown if there is an update exception
|
||||||
@@ -96,8 +100,19 @@ public class DatabaseProperties {
|
|||||||
if (updatedValue == null) {
|
if (updatedValue == null) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
properties.put(LAST_UPDATED_BASE + updatedValue.getId(), String.valueOf(updatedValue.getTimestamp()));
|
save(LAST_UPDATED_BASE + updatedValue.getId(), String.valueOf(updatedValue.getTimestamp()));
|
||||||
cveDB.saveProperty(LAST_UPDATED_BASE + updatedValue.getId(), String.valueOf(updatedValue.getTimestamp()));
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Saves the key value pair to the properties store.
|
||||||
|
*
|
||||||
|
* @param key the property key
|
||||||
|
* @param value the property value
|
||||||
|
* @throws UpdateException is thrown if there is an update exception
|
||||||
|
*/
|
||||||
|
public void save(String key, String value) throws UpdateException {
|
||||||
|
properties.put(key, value);
|
||||||
|
cveDB.saveProperty(key, value);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -138,8 +153,8 @@ public class DatabaseProperties {
|
|||||||
*
|
*
|
||||||
* @return a map of the database meta data
|
* @return a map of the database meta data
|
||||||
*/
|
*/
|
||||||
public Map getMetaData() {
|
public Map<String, String> getMetaData() {
|
||||||
final TreeMap map = new TreeMap();
|
final Map<String, String> map = new TreeMap<String, String>();
|
||||||
for (Entry<Object, Object> entry : properties.entrySet()) {
|
for (Entry<Object, Object> entry : properties.entrySet()) {
|
||||||
final String key = (String) entry.getKey();
|
final String key = (String) entry.getKey();
|
||||||
if (!"version".equals(key)) {
|
if (!"version".equals(key)) {
|
||||||
@@ -150,12 +165,12 @@ public class DatabaseProperties {
|
|||||||
final DateFormat format = new SimpleDateFormat("dd/MM/yyyy HH:mm:ss");
|
final DateFormat format = new SimpleDateFormat("dd/MM/yyyy HH:mm:ss");
|
||||||
final String formatted = format.format(date);
|
final String formatted = format.format(date);
|
||||||
map.put(key, formatted);
|
map.put(key, formatted);
|
||||||
} catch (Throwable ex) { //deliberatly being broad in this catch clause
|
} catch (Throwable ex) { //deliberately being broad in this catch clause
|
||||||
Logger.getLogger(DatabaseProperties.class.getName()).log(Level.FINE, "Unable to parse timestamp from DB", ex);
|
LOGGER.log(Level.FINE, "Unable to parse timestamp from DB", ex);
|
||||||
map.put(key, entry.getValue());
|
map.put(key, (String) entry.getValue());
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
map.put(key, entry.getValue());
|
map.put(key, (String) entry.getValue());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ package org.owasp.dependencycheck.data.nvdcve;
|
|||||||
/**
|
/**
|
||||||
* An exception thrown the database driver is unable to be loaded.
|
* An exception thrown the database driver is unable to be loaded.
|
||||||
*
|
*
|
||||||
* @author Jeremy Long <jeremy.long@owasp.org>
|
* @author Jeremy Long
|
||||||
*/
|
*/
|
||||||
public class DriverLoadException extends Exception {
|
public class DriverLoadException extends Exception {
|
||||||
|
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user