linux git 依赖,linuxea:gitlab-ci/cd Dependency依赖扫描两种方式 (五)

I. Dependency

如果正在使用GitLab CI / CD,则可以使用依赖项扫描来分析已知漏洞的依赖关系,方法是将CI作业包含在现有.gitlab-ci.yml文件中,或使用Auto DevOps 提供的自动依赖项扫描

依赖扫描参考:

https://docs.gitlab.com/ee/user/project/merge_requests/dependency_scanning.html

https://docs.gitlab.com/ee/ci/examples/dependency_scanning.html

使用dependency-scanning替代Dependency-Check,我顺便介绍下Dependency-Check,在后面

https://github.com/jeremylong/DependencyCheck

支持的语言和包管理器

The following table shows which languages and package managers are supported and which tools are used.

JavaScript (npm, yarn) --->> gemnasium, Retire.js

Python (pip)--->> gemnasium

Ruby (gem)--->> gemnasium, bundler-audit

Java (Maven) --->> gemnasium

PHP (Composer) --->> gemnasium

集成GitLab

# 依赖扫描

4/8 dependency-scanning:

<<:>

script:

- export SP_VERSION=$(echo "$CI_SERVER_VERSION" | sed 's/^\([0-9]*\)\.\([0-9]*\).*/\1-\2-stable/')

- docker run --rm

--env DEP_SCAN_DISABLE_REMOTE_CHECKS="${DEP_SCAN_DISABLE_REMOTE_CHECKS:-false}"

--volume "$PWD:/code"

--volume /etc/localtime:/etc/localtime:ro

--volume /var/run/docker.sock:/var/run/docker.sock

"registry.gitlab.com/gitlab-org/security-products/dependency-scanning:$SP_VERSION" /code

- date

artifacts:

paths: [gl-dependency-scanning-report.json]

# except:

# variables:

# - $CONTAINER_SCANNING_DISABLE

so,在gitlab官网提供的镜像中,很明显的这个报:Source code language/dependency manager is not yet supported for analyze

5c1967c5325842cec010c6abd3e07965.gif

II. Dependency-Check

假如你觉得上面的那个不好用,没关系,还可以用Dependency-Check

Dependency-Check是一种软件组合分析(SCA)工具,它试图检测项目依赖项中包含的公开披露的漏洞。它通过确定给定依赖项是否存在公共平台枚举(CPE)标识符来完成此操作。如果找到,它将生成链接到相关CVE条目的报告。

文档和生产二进制版本的链接可以在github页面上找到。此外,关于体系结构的更多信息和扩展依赖性检查的方法可以在wiki上找到。

目前,支持Java和.NET; 针对Ruby,Node.js,Python以及对C / C ++构建系统(autoconf和cmake)的有限支持已添加额外的实验支持

参考:

https://jeremylong.github.io/DependencyCheck/dependency-check-cli/index.html

原本的docker脚本如下:

#!/bin/sh

OWASPDC_DIRECTORY=$HOME/OWASP-Dependency-Check

DATA_DIRECTORY="$OWASPDC_DIRECTORY/data"

REPORT_DIRECTORY="$OWASPDC_DIRECTORY/reports"

if [ ! -d "$DATA_DIRECTORY" ]; then

echo "Initially creating persistent directories"

mkdir -p "$DATA_DIRECTORY"

chmod -R 777 "$DATA_DIRECTORY"

mkdir -p "$REPORT_DIRECTORY"

chmod -R 777 "$REPORT_DIRECTORY"

fi

# Make sure we are using the latest version

docker pull owasp/dependency-check

docker run --rm \

--volume $(pwd):/src \

--volume "$DATA_DIRECTORY":/usr/share/dependency-check/data \

--volume "$REPORT_DIRECTORY":/report \

owasp/dependency-check \

--scan /src \

--format "ALL" \

--project "My OWASP Dependency Check Project" \

--out /report

# Use suppression like this: (/src == $pwd)

# --suppression "/src/security/dependency-check-suppression.xml"

ok,我们修改下集成到gitlab里面(当然,提前pull镜像 docker pull owasp/dependency-check)

集成GitLab

注意:这里有个权限问题gitlab-runner ALL=(root)NOPASSWD:/bin/chown,/bin/mkdir,/bin/chmod

5/8 dependency-check:

stage: code-check

script:

- export OWASPDC_DIRECTORY=$PWD/OWASP-Dependency-Check

- export DATA_DIRECTORY=$OWASPDC_DIRECTORY/data

- export REPORT_DIRECTORY=$OWASPDC_DIRECTORY/reports

- '[[ ! -d "$DATA_DIRECTORY" ]] || echo "Initially creating persistent directories" && mkdir -p "$DATA_DIRECTORY" && sudo chmod -R 777 "$DATA_DIRECTORY" && mkdir -p "$REPORT_DIRECTORY" && sudo chmod -R 777 "$REPORT_DIRECTORY"'

- docker run --rm

--volume $(pwd):/src

--volume "$DATA_DIRECTORY":/usr/share/dependency-check/data

--volume "$REPORT_DIRECTORY":/report

"owasp/dependency-check"

--scan /src

--format "ALL"

--project "My OWASP Dependency Check Project"

--out /report

- cp OWASP-Dependency-Check/reports/dependency-check-report.json $PWD/dependency-check-report.json

- sudo chown -R gitlab-runner.gitlab-runner ${PWD}

- date

artifacts:

paths:

- dependency-check-report.json

- OWASP-Dependency-Check/reports/

试着运行一次

5c1967c5325842cec010c6abd3e07965.gif

这里会产生几个文件

[gitlab-runner@linuxea-VM-Node_10_10_240_145 linuxea]$ ll OWASP-Dependency-Check/reports/

总用量 272

-rw-r--r-- 1 gitlab-runner gitlab-runner 223 7月 1 21:09 dependency-check-report.csv

-rw-r--r-- 1 gitlab-runner gitlab-runner 139030 7月 1 21:09 dependency-check-report.html

-rw-r--r-- 1 gitlab-runner gitlab-runner 12086 7月 1 21:09 dependency-check-report.json

-rw-r--r-- 1 gitlab-runner gitlab-runner 8964 7月 1 21:09 dependency-check-report.xml

-rw-r--r-- 1 gitlab-runner gitlab-runner 110002 7月 1 21:09 dependency-check-vulnerability.html

[gitlab-runner@DS-VM-Node_10_10_240_145 linuxea]$

下载下来即可查看

5c1967c5325842cec010c6abd3e07965.gif

打开dependency-check-report.html,如下图:

点击:Display: Showing Vulnerable Dependencies (click to show all) 即可查看

5c1967c5325842cec010c6abd3e07965.gif

除非另有说明,否则本站上的内容根据以下许可进行许可: CC署名-非商业性使用-相同方式共享4.0国际许可协议4.0进行许可

本文作者:www.linuxea.com for Mark

文章链接:http://www.linuxea.com/1837.html (转载请注明本文出处和本章链接)

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
GitLab-CI/CD可以很方便地集成Dependency-Check来实现依赖扫描。下面是具体的集成步骤: 1. 安装Dependency-Check 首先需要安装Dependency-Check工具。可以到官网下载对应的软件包,然后解压到任意目录即可。 2. 配置GitLab-CI/CD 在项目的根目录下创建一个名为`.gitlab-ci.yml`的文件,并添加以下内容: ``` image: maven:3.6.3-jdk-11 stages: - build - test - dependency-check before_script: - mvn --version build: stage: build script: - mvn clean package test: stage: test script: - mvn test dependency-check: stage: dependency-check script: - wget https://dl.bintray.com/jeremy-long/owasp/dependency-check-5.3.2-release.zip - unzip dependency-check-5.3.2-release.zip - cd dependency-check-5.3.2-release/bin - ./dependency-check.sh --project "My Project" --scan ./../../target/*.jar --out ./../../dependency-check-report artifacts: paths: - dependency-check-report ``` 以上配置文件定义了三个阶段:build、test和dependency-check。其中,build和test阶段是项目的编译和测试阶段,dependency-check阶段是依赖扫描阶段。在dependency-check阶段中,我们下载并安装了Dependency-Check工具,并使用它来扫描项目的依赖关系。扫描结果将以HTML报告的形式保存在`dependency-check-report`目录下。 3. 提交并运行Pipeline 将`.gitlab-ci.yml`文件提交到项目的Git仓库中,并在GitLab上开启CI/CD功能。然后,就可以运行Pipeline了。Pipeline运行结束后,可以在GitLab的Pipeline页面查看扫描结果。 以上就是集成Dependency-Check的具体步骤,希望可以帮到你。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值