Skip to content

TomerFi/crda-backend

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CRDA Backend

License CI

Dependencies

See the application.properties for default values and configuration properties

  • Trusted Content service: api.trustedContent.gav.host
  • Trusted Content VEX stub: api.trustedContent.vex.host

Third party dependencies

  • Snyk API
  • OSS Index
  • Tidelift API (currently disabled)

Required parameters

  • api.snyk.token Snyk API token for default authentication
  • api.tidelift.token Tidelift API token for default authentication (currently ignored)

OpenAPI and SwaggerUI

Providers

Currently there are 2 available providers that will provide a vulnerability report for your components or full dependency graph.

  • Snyk (snyk)
  • OSS Index (oss-index)
  • Tidelift (tidelift) Disabled

You can disable a given provider for the dependency graph analysis by using api.<provider>.disabled=true property at startup.

Providers should be defined as a multi-valued list in the providers Query Parameter. e.g. /component-analysis/maven?providers=snyk&providers=oss-index

Package Managers

The following Package Managers are currently supported:

  • Maven (maven)
  • Gradle (gradle)
  • NPM (npm)
  • Go Modules (gomodules)
  • Pip (pip)

Dependency Graph Analysis /api/v3/dependency-analysis/<pkgManager>

DOT Graph

With Maven it is possible to generate a DOT graph with all the resolved dependencies. The following command will generate a dependencies.txt file in the project target folder.

mvn --quiet clean -f "/path/to/project/pom.xml" && mvn --quiet -Dversion=3.5.0 dependency:tree -f "/path/to/project/pom.xml" -DoutputFile="/path/to/project/target/dependencies.txt" -DoutputType=dot

You can submit this file to the /dependency-analysis/<pkgManager> endpoint in order to get a dependency graph analysis backed from the selected provider. Make sure youre passing the right Content-Type and a valid pkgManager

This is an example for maven:

$ http :8080/api/v3/dependency-analysis/maven Content-Type:"text/vnd.graphviz" @'./src/test/resources/dependencies.txt'

SBOM File

The CycloneDX Maven plugin generates CycloneDX Software Bill of Materials (SBOM) containing the aggregate of all direct and transitive dependencies of a project. CycloneDX is a lightweight software bill of materials (SBOM) standard designed for use in application security contexts and supply chain component analysis.

You can generate a JSON SBOM with the following command:

mvn org.cyclonedx:cyclonedx-maven-plugin:2.7.6:makeBom -DoutputFormat=json -DexcludeTestProject

The generated file will be located under ./target/bom.json. Make sure the request Content-Type is set to application/json. Then you can analyise the vulnerabilities with the following command:

$ http :8080/api/v3/dependency-analysis/maven Content-Type:"application/json" Accept:"application/json" @'target/bom.json'

Verbose Mode

When the Dependency Graph Analysis returns a JSON report it contains all vulnerability data by default. The Verbose mode can be disabled in order to retrieve just a Summary. Use the verbose=false Query parameter to disable it.

$ http :8080/api/v3/dependency-analysis/maven Content-Type:"text/vnd.graphviz" Accept:"application/json" @'target/dependencies.txt' verbose==false

{
    "dependencies": [],
    "summary": {
        "dependencies": {
            "scanned": 11,
            "transitive": 217
        },
        "vulnerabilities": {
            "critical": 1,
            "direct": 6,
            "high": 4,
            "low": 5,
            "medium": 10,
            "total": 20
        }
    }
}

Client Token Authentication

If clients don't provide the token to authenticate against the Vulnerability Provider the default one will be used instead but vulnerabilities unique to that specific provider will not show all the details.

To provide the client authentication tokens use HTTP Headers in the request. The format for the tokens Headers is crda-provider-token. e.g. crda-snyk-token:

http :8080/api/v3/dependency-analysis/maven Content-Type:"text/vnd.graphviz" Accept:"text/html" @'target/dependencies.txt' crda-snyk-token:the-client-token

In case the vulnerability provider requires of Basic Authentication the headers will be crda-provider-user and crda-provider-token.

http :8080/api/v3/dependency-analysis/maven Content-Type:"text/vnd.graphviz" Accept:"text/html" @'target/dependencies.txt' crda-oss-index-user:the-client-username crda-oss-index-token:the-client-token

HTML Report

By default the response Content-Type will be application/json but if the text/html media type is requested instead, the response will be processed and converted into HTML.

The HTML report will show limited information:

  • Public vulnerabilities retrieved with the default token will not show the Exploit Maturity
  • Private vulnerabilities (i.e. vulnerabilities reported by the provider) will not be displayed.
$ http :8080/api/v3/dependency-analysis/maven Content-Type:"text/vnd.graphviz" Accept:"text/html" @'./src/test/resources/dependencies.txt'

<html>
...
</html>

Mime-Multipart response

It is also possible to get a MIME Multipart response containing a JSON report with the HTML attached. For that, use the Accept: multipart/mixed request header.

http :8080/api/v3/dependency-analysis/maven Content-Type:"text/vnd.graphviz" Accept:"multipart/mixed" @'./target/dependencies.txt'
HTTP/1.1 200 OK
    boundary="----=_Part_2_2047647971.1682593849895"
Content-Type: multipart/mixed;
MIME-Version: 1.0
Message-Id: <49857413.3.1682593849896@granada>
User-Agent: HTTPie/3.2.1
transfer-encoding: chunked
x-quarkus-hot-deployment-done: true

------=_Part_2_2047647971.1682593849895
Content-Type: application/json
Content-Transfer-Encoding: binary

{
    "summary": {
        "dependencies": {
            ...
        },
        "vulnerabilities": {
            ...
        }
    },
    "dependencies": [
        {
        "ref": {
            "name": "log4j:log4j",
            "version": "1.2.17"
        },
        ...
        }
    ]
}
------=_Part_2_2047647971.1682593849895
Content-Type: text/html
Content-Transfer-Encoding: 8bit
Content-Disposition: attachment; filename=report.html

<html>
    <header>
        <title>CRDA Stack Report</title>
    </header>
    <body>
        <h1>Stack Report</h1>
        <p>This is an example</p>
    </body>
</html>
------=_Part_2_2047647971.1682593849895--

Component Analysis /api/v3/component-analysis/<pkgManager>

It is also possible to provide a list of packages in order to get a similar report. This method accepts a JSON object instead of a DOT graph.

Make sure you are providing a valid pkgManager

$ curl 'http://localhost:8080/api/v3/component-analysis/maven' \
--header 'Content-Type: application/json' \
--data '[
    {"name": "log4j:log4j", "version": "1.2.17"},
    {"name": "io.netty:netty-common", "version": "4.1.86"},
]'
...
{
    "summary": {
        "dependencies": {
            ...
        },
        "vulnerabilities": {
            ...
        }
    },
    "dependencies": [
        {
        "ref": {
            "name": "log4j:log4j",
            "version": "1.2.17"
        },
        ...
        }
    ]
}

Token validation

Clients are allowed to validate the vulnerability provider token with a specific endpoint. That will allow IDEs and the CLI to persist the different tokens and validate them when saving them.

The request will be a GET to the /token path containing the HTTP header with the token. The header format will follow the same rules as for the other HTTP requests. i.e. crda-<provider>-token

http -v :8080/api/v3/token crda-snyk-token==example-token

The possible responses are:

  • 200 - Token validated successfully
  • 400 - Missing authentication header
  • 401 - Invalid auth token provided
  • 403 - The token is not authorized
  • 429 - Rate limit exceeded
  • 500 - Server error

Deploy on OpenShift

The required parameters can be injected as environment variables through a secret. Create the crda-secret Secret before deploying the application.

oc create secret generic -n crda --from-literal=api-snyk-token=<snyk_api_token> --from-literal=api-tidelift-token=<tidelift_api_token> crda-secret

After that you can use the crda-backend.yaml

oc apply -f deploy/crda-backend.yaml

Running the application in dev mode

You can run your application in dev mode that enables live coding using:

./mvnw compile quarkus:dev

NOTE: Quarkus now ships with a Dev UI, which is available in dev mode only at http://localhost:8080/q/dev/.

Packaging and running the application

The application can be packaged using:

./mvnw package

It produces the quarkus-run.jar file in the target/quarkus-app/ directory. Be aware that it’s not an über-jar as the dependencies are copied into the target/quarkus-app/lib/ directory.

The application is now runnable using java -jar target/quarkus-app/quarkus-run.jar.

If you want to build an über-jar, execute the following command:

./mvnw package -Dquarkus.package.type=uber-jar

The application, packaged as an über-jar, is now runnable using java -jar target/*-runner.jar.

Creating a native executable

You can create a native executable using:

./mvnw package -Pnative

Or, if you don't have GraalVM installed, you can run the native executable build in a container using:

./mvnw package -Pnative -Dquarkus.native.container-build=true

You can then execute your native executable with: ./target/crda-backend-1.0.0-SNAPSHOT-runner

If you want to learn more about building native executables, please consult https://quarkus.io/guides/maven-tooling.

About

No description, website, or topics provided.

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Java 61.5%
  • HTML 28.7%
  • FreeMarker 9.8%