|
22 | 22 | <javadoc.excluded.packages />
|
23 | 23 | <checkstyle.excludes />
|
24 | 24 |
|
25 |
| - <!-- OWASP dependency vulnerability scanner--> |
26 |
| - <bt.owasp.dependency-check.version>3.3.1</bt.owasp.dependency-check.version> |
27 |
| - <bt.owasp.dependency-check.skip>false</bt.owasp.dependency-check.skip> |
| 25 | + <!-- |
| 26 | + OWASP dependency vulnerability scanner. |
| 27 | + --> |
| 28 | + <bt.owasp.dependency-check.version>3.3.2</bt.owasp.dependency-check.version> |
| 29 | + <bt.owasp.dependency-check.enable>false</bt.owasp.dependency-check.enable> |
28 | 30 | <!-- properties to allow for mirroring of CVE definitions -->
|
29 | 31 | <bt.owasp.dependency-check.cve.mirror>https://nvd.nist.gov/feeds/xml/cve</bt.owasp.dependency-check.cve.mirror>
|
30 | 32 | <bt.owasp.dependency-check.cve.12.path>1.2</bt.owasp.dependency-check.cve.12.path>
|
31 | 33 | <bt.owasp.dependency-check.cve.20.path>2.0</bt.owasp.dependency-check.cve.20.path>
|
| 34 | + <!-- Non java analysers are off by default because, well this is a Maven builder! --> |
| 35 | + <!-- nodejs nsp requires nsp on the path at scan time --> |
| 36 | + <bt.owasp.dependency-check.enableNsp>false</bt.owasp.dependency-check.enableNsp> |
| 37 | + <!-- RetireJs analyser has a known bug https://github.com/jeremylong/DependencyCheck/issues/1467 --> |
| 38 | + <bt.owasp.dependency-check.enableRetireJs>false</bt.owasp.dependency-check.enableRetireJs> |
| 39 | + <!-- nuspec analyser --> |
| 40 | + <bt.owasp.dependency-check.enableNuspec>false</bt.owasp.dependency-check.enableNuspec> |
| 41 | + <!-- swift analyser --> |
| 42 | + <bt.owasp.dependency-check.enableSwift>false</bt.owasp.dependency-check.enableSwift> |
| 43 | + <!-- assembly .net analyser --> |
| 44 | + <bt.owasp.dependency-check.enableAssembly.Net>false</bt.owasp.dependency-check.enableAssembly.Net> |
32 | 45 | </properties>
|
33 | 46 |
|
34 | 47 | <description>
|
|
37 | 50 | configuration from bordertech-parent.
|
38 | 51 | </description>
|
39 | 52 |
|
| 53 | + |
40 | 54 | <build>
|
| 55 | + <pluginManagement> |
| 56 | + <plugins> |
| 57 | + <plugin> |
| 58 | + <groupId>org.owasp</groupId> |
| 59 | + <artifactId>dependency-check-maven</artifactId> |
| 60 | + <version>${bt.owasp.dependency-check.version}</version> |
| 61 | + <configuration> |
| 62 | + <failBuildOnAnyVulnerability>true</failBuildOnAnyVulnerability> |
| 63 | + <cveUrl12Modified>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.12.path}/nvdcve-Modified.xml.gz</cveUrl12Modified> |
| 64 | + <cveUrl20Modified>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.20.path}/nvdcve-2.0-Modified.xml.gz</cveUrl20Modified> |
| 65 | + <cveUrl12Base>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.12.path}/nvdcve-%d.xml.gz</cveUrl12Base> |
| 66 | + <cveUrl20Base>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.20.path}/nvdcve-2.0-%d.xml.gz</cveUrl20Base> |
| 67 | + <retireJsAnalyzerEnabled>${bt.owasp.dependency-check.enableRetireJs}</retireJsAnalyzerEnabled><!-- see https://github.com/jeremylong/DependencyCheck/issues/1467 before turning this on --> |
| 68 | + <nspAnalyzerEnabled>${bt.owasp.dependency-check.enableNsp}</nspAnalyzerEnabled> |
| 69 | + <nuspecAnalyzerEnabled>${bt.owasp.dependency-check.enableNuspec}</nuspecAnalyzerEnabled> |
| 70 | + <swiftPackageManagerAnalyzerEnabled>${bt.owasp.dependency-check.enableSwift}</swiftPackageManagerAnalyzerEnabled> |
| 71 | + <assemblyAnalyzerEnabled>${bt.owasp.dependency-check.enableAssembly.Net}</assemblyAnalyzerEnabled> |
| 72 | + </configuration> |
| 73 | + </plugin> |
| 74 | + </plugins> |
| 75 | + </pluginManagement> |
41 | 76 | <plugins>
|
42 | 77 | <!-- Check the code style. -->
|
43 | 78 | <plugin>
|
|
171 | 206 | <plugin>
|
172 | 207 | <groupId>org.owasp</groupId>
|
173 | 208 | <artifactId>dependency-check-maven</artifactId>
|
174 |
| - <version>${bt.owasp.dependency-check.version}</version> |
175 | 209 | <configuration>
|
176 |
| - <skip>${bt.owasp.dependency-check.skip}</skip> |
177 |
| - <failBuildOnAnyVulnerability>true</failBuildOnAnyVulnerability> |
178 |
| - <cveUrl12Modified>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.12.path}/nvdcve-Modified.xml.gz</cveUrl12Modified> |
179 |
| - <cveUrl20Modified>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.20.path}/nvdcve-2.0-Modified.xml.gz</cveUrl20Modified> |
180 |
| - <cveUrl12Base>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.12.path}/nvdcve-%d.xml.gz</cveUrl12Base> |
181 |
| - <cveUrl20Base>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.20.path}/nvdcve-2.0-%d.xml.gz</cveUrl20Base> |
| 210 | + <skip>${bt.owasp.dependency-check.enable}</skip> |
182 | 211 | </configuration>
|
183 | 212 | <executions>
|
184 | 213 | <execution>
|
|
357 | 386 | <cveUrl20Modified>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.20.path}/nvdcve-2.0-Modified.xml.gz</cveUrl20Modified>
|
358 | 387 | <cveUrl12Base>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.12.path}/nvdcve-%d.xml.gz</cveUrl12Base>
|
359 | 388 | <cveUrl20Base>${bt.owasp.dependency-check.cve.mirror}/${bt.owasp.dependency-check.cve.20.path}/nvdcve-2.0-%d.xml.gz</cveUrl20Base>
|
| 389 | + <retireJsAnalyzerEnabled>${bt.owasp.dependency-check.enableRetireJs}</retireJsAnalyzerEnabled><!-- see https://github.com/jeremylong/DependencyCheck/issues/1467 before turning this on --> |
| 390 | + <nspAnalyzerEnabled>${bt.owasp.dependency-check.enableNsp}</nspAnalyzerEnabled> |
| 391 | + <nuspecAnalyzerEnabled>${bt.owasp.dependency-check.enableNuspec}</nuspecAnalyzerEnabled> |
| 392 | + <swiftPackageManagerAnalyzerEnabled>${bt.owasp.dependency-check.enableSwift}</swiftPackageManagerAnalyzerEnabled> |
| 393 | + <assemblyAnalyzerEnabled>${bt.owasp.dependency-check.enableAssembly.Net}</assemblyAnalyzerEnabled> |
360 | 394 | </configuration>
|
361 | 395 | </reportSet>
|
362 | 396 | </reportSets>
|
|
0 commit comments