diff --git a/ant/src/site/markdown/configuration.md b/ant/src/site/markdown/configuration.md index 125c975dfa2..6d1fe3a0b75 100644 --- a/ant/src/site/markdown/configuration.md +++ b/ant/src/site/markdown/configuration.md @@ -30,27 +30,28 @@ Configuration: dependency-check Task -------------------- The following properties can be set on the dependency-check task. -Property | Description | Default Value -----------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------- -autoUpdate | Sets whether auto-updating of the NVD CVE/CPE data is enabled. It is not recommended that this be turned to false. | true -failOnError | Whether the build should fail if there is an error executing the dependency-check analysis | true -failBuildOnCVSS | Specifies if the build should be failed if a CVSS score equal to or above a specified level is identified. The default is 11 which means since the CVSS scores are 0-10, by default the build will never fail. More information on CVSS scores can be found at the [NVD](https://nvd.nist.gov/vuln-metrics/cvss)| 11 -junitFailOnCVSS | If using the JUNIT report format the junitFailOnCVSS sets the CVSS score threshold that is considered a failure. | 0 -prettyPrint | Whether the XML and JSON formatted reports should be pretty printed. | false -projectName | The name of the project being scanned. | Dependency-Check -reportFormat | The report format to be generated (HTML, XML, CSV, JSON, JUNIT, SARIF, JENKINS, GITLAB, ALL). | HTML -reportOutputDirectory | The location to write the report(s). Note, this is not used if generating the report as part of a `mvn site` build | 'target' -hintsFile | The file path to the XML hints file \- used to resolve [false negatives](../general/hints.html) |   -proxyServer | The Proxy Server; see the [proxy configuration](../data/proxy.html) page for more information. |   -proxyPort | The Proxy Port. |   -proxyUsername | Defines the proxy user name. |   -proxyPassword | Defines the proxy password. |   -nonProxyHosts | Defines the hosts that will not be proxied. |   -connectionTimeout | The URL Connection Timeout. |   -enableExperimental | Enable the [experimental analyzers](../analyzers/index.html). If not enabled the experimental analyzers (see below) will not be loaded or used. | false -enableRetired | Enable the [retired analyzers](../analyzers/index.html). If not enabled the retired analyzers (see below) will not be loaded or used. | false -suppressionFile | The file path to the XML suppression file \- used to suppress [false positives](../general/suppression.html). The parameter value can be a local file path, a URL to a suppression file, or even a reference to a file on the class path (see https://github.com/jeremylong/DependencyCheck/issues/1878#issuecomment-487533799) |   -junitFailOnCVSS | If using the JUNIT report format the junitFailOnCVSS sets the CVSS score threshold that is considered a failure. | 0 +Property | Description | Default Value +---------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------- +autoUpdate | Sets whether auto-updating of the NVD CVE/CPE data is enabled. It is not recommended that this be turned to false. | true +failOnError | Whether the build should fail if there is an error executing the dependency-check analysis | true +failBuildOnCVSS | Specifies if the build should be failed if a CVSS score equal to or above a specified level is identified. The default is 11 which means since the CVSS scores are 0-10, by default the build will never fail. More information on CVSS scores can be found at the [NVD](https://nvd.nist.gov/vuln-metrics/cvss)| 11 +junitFailOnCVSS | If using the JUNIT report format the junitFailOnCVSS sets the CVSS score threshold that is considered a failure. | 0 +prettyPrint | Whether the XML and JSON formatted reports should be pretty printed. | false +projectName | The name of the project being scanned. | Dependency-Check +reportFormat | The report format to be generated (HTML, XML, CSV, JSON, JUNIT, SARIF, JENKINS, GITLAB, ALL). | HTML +reportOutputDirectory | The location to write the report(s). Note, this is not used if generating the report as part of a `mvn site` build | 'target' +hintsFile | The file path to the XML hints file \- used to resolve [false negatives](../general/hints.html) |   +proxyServer | The Proxy Server; see the [proxy configuration](../data/proxy.html) page for more information. |   +proxyPort | The Proxy Port. |   +proxyUsername | Defines the proxy user name. |   +proxyPassword | Defines the proxy password. |   +nonProxyHosts | Defines the hosts that will not be proxied. |   +connectionTimeout | The URL Connection Timeout. |   +enableExperimental | Enable the [experimental analyzers](../analyzers/index.html). If not enabled the experimental analyzers (see below) will not be loaded or used. | false +enableRetired | Enable the [retired analyzers](../analyzers/index.html). If not enabled the retired analyzers (see below) will not be loaded or used. | false +suppressionFile | The file path to the XML suppression file \- used to suppress [false positives](../general/suppression.html). The parameter value can be a local file path, a URL to a suppression file, or even a reference to a file on the class path (see https://github.com/jeremylong/DependencyCheck/issues/1878#issuecomment-487533799) |   +junitFailOnCVSS | If using the JUNIT report format the junitFailOnCVSS sets the CVSS score threshold that is considered a failure. | 0 +failBuildOnUnusedSuppressionRule | Specifies that if any unused suppression rule is found, the build will fail. | false The following nested elements can be set on the dependency-check task. diff --git a/core/src/main/java/org/owasp/dependencycheck/agent/DependencyCheckScanAgent.java b/core/src/main/java/org/owasp/dependencycheck/agent/DependencyCheckScanAgent.java index 5343585b4f9..a6c1ada92d8 100644 --- a/core/src/main/java/org/owasp/dependencycheck/agent/DependencyCheckScanAgent.java +++ b/core/src/main/java/org/owasp/dependencycheck/agent/DependencyCheckScanAgent.java @@ -177,6 +177,10 @@ public class DependencyCheckScanAgent { * Whether the Maven Central analyzer is enabled. */ private boolean centralAnalyzerEnabled = true; + /** + * Whether the build should fail if there are unused suppression rules. + */ + private boolean failOnUnusedSuppressionRule = false; /** * The URL of Maven Central. */ @@ -619,6 +623,24 @@ public String getCpeStartsWithFilter() { return cpeStartsWithFilter; } + /** + * Get the value of failOnUnusedSuppressionRule. + * + * @return the value of failOnUnusedSuppressionRule + */ + public boolean isFailOnUnusedSuppressionRule() { + return failOnUnusedSuppressionRule; + } + + /** + * Set the value of failOnUnusedSuppressionRule. + * + * @param failOnUnusedSuppressionRule new value of failOnUnusedSuppressionRule + */ + public void setFailOnUnusedSuppressionRule(boolean failOnUnusedSuppressionRule) { + this.failOnUnusedSuppressionRule = failOnUnusedSuppressionRule; + } + /** * Get the value of centralAnalyzerEnabled. * @@ -952,6 +974,7 @@ private void populateSettings() { settings.setStringIfNotEmpty(Settings.KEYS.ADDITIONAL_ZIP_EXTENSIONS, zipExtensions); settings.setStringIfNotEmpty(Settings.KEYS.NVD_API_KEY, nvdApiKey); settings.setStringIfNotEmpty(Settings.KEYS.ANALYZER_ASSEMBLY_DOTNET_PATH, pathToCore); + settings.setBoolean(Settings.KEYS.FAIL_ON_UNUSED_SUPPRESSION_RULE, failOnUnusedSuppressionRule); } /** diff --git a/core/src/main/java/org/owasp/dependencycheck/analyzer/UnusedSuppressionRuleAnalyzer.java b/core/src/main/java/org/owasp/dependencycheck/analyzer/UnusedSuppressionRuleAnalyzer.java index 4c95fdbb78d..4cdec670050 100644 --- a/core/src/main/java/org/owasp/dependencycheck/analyzer/UnusedSuppressionRuleAnalyzer.java +++ b/core/src/main/java/org/owasp/dependencycheck/analyzer/UnusedSuppressionRuleAnalyzer.java @@ -33,7 +33,8 @@ * @author Jeremy Long */ public class UnusedSuppressionRuleAnalyzer extends AbstractAnalyzer { - + protected static final String EXCEPTION_MSG = "There are %d unused suppression rule(s): check logs."; + /** * The Logger for use throughout the class. */ @@ -43,27 +44,54 @@ public class UnusedSuppressionRuleAnalyzer extends AbstractAnalyzer { * been reported. */ private boolean reported = false; + /** + * A flag indicating whether build should fail on unused suppression rule + */ + private boolean shouldFailForUnusedSuppressionRule = false; + /** + * unused suppression rule count + */ + private int unusedSuppressionRuleCount = 0; + + @Override + public synchronized void initialize(Settings settings) { + super.initialize(settings); + if (settings.getBoolean(Settings.KEYS.FAIL_ON_UNUSED_SUPPRESSION_RULE, false)) { + this.shouldFailForUnusedSuppressionRule = true; + } + } @Override protected void analyzeDependency(Dependency dependency, Engine engine) throws AnalysisException { if (!reported) { - logUnusedRules(engine); - reported = true; + checkUnusedRules(engine); + reported = true; + if(unusedSuppressionRuleCount > 0 && failsForUnusedSuppressionRule()) { + final String message = String.format(EXCEPTION_MSG, unusedSuppressionRuleCount); + LOGGER.error(message); + throw new AnalysisException(message); + } } } /** - * Logs unused suppression RULES. + * check unused suppression RULES. * * @param engine a reference to the ODC engine */ - private void logUnusedRules(Engine engine) { + protected void checkUnusedRules(Engine engine) { if (engine.hasObject(SUPPRESSION_OBJECT_KEY)) { @SuppressWarnings("unchecked") final List rules = (List) engine.getObject(SUPPRESSION_OBJECT_KEY); rules.forEach((rule) -> { if (!rule.isMatched() && !rule.isBase()) { - LOGGER.info("Suppression Rule had zero matches: {}", rule.toString()); + final String message = String.format("Suppression Rule had zero matches: %s", rule); + if(failsForUnusedSuppressionRule()) { + LOGGER.error(message); + } else { + LOGGER.info(message); + } + increaseUnusedSuppressionRuleCount(); } }); } @@ -89,4 +117,25 @@ public AnalysisPhase getAnalysisPhase() { public boolean supportsParallelProcessing() { return false; } + + /** + * increases the count of unused suppression rules + */ + public void increaseUnusedSuppressionRuleCount() { + unusedSuppressionRuleCount++; + } + + /** + * @return the count of unused suppression rules + */ + public int getUnusedSuppressionRuleCount() { + return unusedSuppressionRuleCount; + } + + /** + * @return whether the analyzer will fail for a unused suppression rule + */ + public boolean failsForUnusedSuppressionRule() { + return shouldFailForUnusedSuppressionRule; + } } diff --git a/core/src/main/resources/dependencycheck.properties b/core/src/main/resources/dependencycheck.properties index 8e11c5837ef..9281923db66 100644 --- a/core/src/main/resources/dependencycheck.properties +++ b/core/src/main/resources/dependencycheck.properties @@ -164,6 +164,7 @@ database.batchinsert.maxsize=1000 analyzer.artifactory.enabled=false analyzer.libman.enabled=true odc.reports.pretty.print=false +analyzer.suppression.unused.fail=false hosted.suppressions.enabled=true hosted.suppressions.url=https://jeremylong.github.io/DependencyCheck/suppressions/publishedSuppressions.xml diff --git a/core/src/test/java/org/owasp/dependencycheck/analyzer/UnusedSuppressionRuleAnalyzerTest.java b/core/src/test/java/org/owasp/dependencycheck/analyzer/UnusedSuppressionRuleAnalyzerTest.java new file mode 100644 index 00000000000..4eb933b8431 --- /dev/null +++ b/core/src/test/java/org/owasp/dependencycheck/analyzer/UnusedSuppressionRuleAnalyzerTest.java @@ -0,0 +1,157 @@ +package org.owasp.dependencycheck.analyzer; + +import static org.junit.Assert.assertNotNull; +import static org.junit.Assert.assertEquals; + +import java.util.ArrayList; +import java.util.List; + +import org.junit.Test; +import org.owasp.dependencycheck.BaseTest; +import org.owasp.dependencycheck.Engine; +import static org.owasp.dependencycheck.analyzer.AbstractSuppressionAnalyzer.SUPPRESSION_OBJECT_KEY; +import org.owasp.dependencycheck.analyzer.exception.AnalysisException; +import static org.owasp.dependencycheck.analyzer.UnusedSuppressionRuleAnalyzer.EXCEPTION_MSG; +import org.owasp.dependencycheck.dependency.Confidence; +import org.owasp.dependencycheck.dependency.Dependency; +import org.owasp.dependencycheck.dependency.naming.Identifier; +import org.owasp.dependencycheck.dependency.naming.PurlIdentifier; +import org.owasp.dependencycheck.utils.Settings; +import org.owasp.dependencycheck.xml.suppression.SuppressionRule; +import org.owasp.dependencycheck.xml.suppression.PropertyType; + +public class UnusedSuppressionRuleAnalyzerTest extends BaseTest { + private static final String NAME = "Unused Suppression Rule Analyzer"; + private static final String PACKAGE_NAME = "CoolAsACucumber"; + private static final String EXPECTED_EX = "should have thrown an AnalysisException"; + + @Test + public void testGetName() { + UnusedSuppressionRuleAnalyzer analyzer = new UnusedSuppressionRuleAnalyzer(); + assertEquals(NAME, analyzer.getName()); + } + + @Test + public void testException() throws Exception { + boolean shouldFail = true; + Dependency dependency10 = getDependency("1.0"); + Dependency dependency11 = getDependency("1.1"); + + UnusedSuppressionRuleAnalyzer analyzer = getAnalyzer(shouldFail); + Engine engine = getEngine(true, false, dependency10, dependency11); + try { + analyzer.analyzeDependency(dependency10, engine); + throw new Exception("should have thrown an AnalysisException"); + } catch(AnalysisException ok){ + assertEquals(String.format(EXCEPTION_MSG, 1), ok.getMessage()); + } + + // no exception + shouldFail = false; + analyzer = getAnalyzer(shouldFail); + engine = getEngine(true, false, dependency10, dependency11); + analyzer.analyzeDependency(dependency10, engine); + assertEquals(1, analyzer.getUnusedSuppressionRuleCount()); + } + + @Test + public void testCheckUnusedRules() throws Exception { + // flag unset + boolean shouldFail = false; + Dependency dependency10 = getDependency("1.0"); + Dependency dependency11 = getDependency("1.1"); + + // a run without any suppression rule ➫ no unused suppression + checkUnusedRules(shouldFail, 0, false, false, dependency10); + + // a run without no matching rule ➫ one unused suppression + checkUnusedRules(shouldFail, 1, true, false, dependency10, dependency11); + + // a run with the vulnerable package ➫ no unused suppression + checkUnusedRules(shouldFail, 0, true, true, dependency10, dependency11); + + + // set flag + shouldFail = true; + + // a run without any suppression rule ➫ no unused suppression + checkUnusedRules(shouldFail, 0, false, false, dependency10); + + // a run without no matching rule ➫ one unused suppression + checkUnusedRules(shouldFail, 1, true, false, dependency10, dependency11); + + // a run with the vulnerable package ➫ no unused suppression + checkUnusedRules(shouldFail, 0, true, true, dependency10, dependency11); + } + + private void checkUnusedRules(boolean shouldFail, int expectedCount, + boolean withSuppressionRules, boolean matching, + Dependency ... dependencies) throws Exception { + UnusedSuppressionRuleAnalyzer analyzer = getAnalyzer(shouldFail); + assertNotNull(analyzer); + Engine engine = getEngine(withSuppressionRules, matching, dependencies); + analyzer.checkUnusedRules(engine); + assertEquals(expectedCount, analyzer.getUnusedSuppressionRuleCount()); + } + + + private Dependency getDependency(String type, String namespace, String name, String version) throws Exception { + Dependency dependency = new Dependency(); + Identifier id = new PurlIdentifier(type,namespace,name,version,Confidence.HIGHEST); + dependency.addSoftwareIdentifier(id); + return dependency; + } + + private Dependency getDependency(String version) throws Exception { + return getDependency("maven", "test", PACKAGE_NAME, version); + } + + + private Engine getEngine(boolean hasSuppressionRules, boolean matching, Dependency ... dependencies) throws Exception { + Engine engine = new Engine(getSettings()); + List dependencyList = new ArrayList<>(); + if (dependencies!=null) { + for(Dependency d : dependencies) + dependencyList.add(d); + } + engine.setDependencies(dependencyList); + if(!hasSuppressionRules) return engine; + List rules = new ArrayList<>(); + rules.add(getSuppressionRule(matching)); + engine.putObject(SUPPRESSION_OBJECT_KEY,rules); + return engine; + } + + private UnusedSuppressionRuleAnalyzer getAnalyzer(boolean flag) throws AnalysisException { + UnusedSuppressionRuleAnalyzer analyzer = new UnusedSuppressionRuleAnalyzer(); + assertNotNull(analyzer); + + Settings settings = getSettings(); + settings.setBoolean(Settings.KEYS.FAIL_ON_UNUSED_SUPPRESSION_RULE, flag); + analyzer.initialize(settings); + assertEquals(flag, analyzer.failsForUnusedSuppressionRule()); + assertEquals(0, analyzer.getUnusedSuppressionRuleCount()); + + return analyzer; + } + + private SuppressionRule getSuppressionRule(boolean matching) { + SuppressionRule instance = new SuppressionRule(); + instance.addVulnerabilityName(getPropertyType("CVE-2023-5072", false, false)); + instance.setPackageUrl(getPropertyType("^pkg:maven/test." + PACKAGE_NAME + "." + matching, false, false)); + instance.addCpe(getPropertyType(PACKAGE_NAME, false, false)); + instance.setBase(false); + instance.setMatched(matching); + return instance; + } + + private PropertyType getPropertyType(String value, boolean regex, boolean caseSensitive) { + PropertyType property = new PropertyType(); + property.setValue(value); + property.setRegex(regex); + property.setCaseSensitive(caseSensitive); + return property; + } + + +} diff --git a/maven/src/main/java/org/owasp/dependencycheck/maven/BaseDependencyCheckMojo.java b/maven/src/main/java/org/owasp/dependencycheck/maven/BaseDependencyCheckMojo.java index 4778b26565b..2e05a2c2fc8 100644 --- a/maven/src/main/java/org/owasp/dependencycheck/maven/BaseDependencyCheckMojo.java +++ b/maven/src/main/java/org/owasp/dependencycheck/maven/BaseDependencyCheckMojo.java @@ -685,6 +685,12 @@ public abstract class BaseDependencyCheckMojo extends AbstractMojo implements Ma @SuppressWarnings("CanBeFinal") @Parameter(property = "artifactoryAnalyzerParallelAnalysis", defaultValue = "true") private Boolean artifactoryAnalyzerParallelAnalysis; + /** + * Whether the Unused Suppression Rule analyzer should fail if there are unused rules. + */ + @SuppressWarnings("CanBeFinal") + @Parameter(property = "failBuildOnUnusedSuppressionRule", defaultValue = "false") + private Boolean failBuildOnUnusedSuppressionRule; /** * Whether or not the Nexus Analyzer is enabled. */ @@ -2268,6 +2274,7 @@ protected void populateSettings() { settings.setStringIfNotNull(Settings.KEYS.ANALYZER_ARTIFACTORY_URL, artifactoryAnalyzerUrl); settings.setBooleanIfNotNull(Settings.KEYS.ANALYZER_ARTIFACTORY_USES_PROXY, artifactoryAnalyzerUseProxy); settings.setBooleanIfNotNull(Settings.KEYS.ANALYZER_ARTIFACTORY_PARALLEL_ANALYSIS, artifactoryAnalyzerParallelAnalysis); + settings.setBooleanIfNotNull(Settings.KEYS.FAIL_ON_UNUSED_SUPPRESSION_RULE, failBuildOnUnusedSuppressionRule); if (Boolean.TRUE.equals(artifactoryAnalyzerEnabled)) { if (artifactoryAnalyzerServerId != null) { configureServerCredentials(artifactoryAnalyzerServerId, Settings.KEYS.ANALYZER_ARTIFACTORY_API_USERNAME, diff --git a/maven/src/site/markdown/configuration.md b/maven/src/site/markdown/configuration.md index fba95d8d463..751bac531c7 100644 --- a/maven/src/site/markdown/configuration.md +++ b/maven/src/site/markdown/configuration.md @@ -12,34 +12,35 @@ Configuration ==================== The following properties can be set on the dependency-check-maven plugin. -Property | Description | Default Value -----------------------------|------------------------------------|------------------ -autoUpdate | Sets whether auto-updating of the NVD CVE/CPE, retireJS and hosted suppressions data is enabled. It is not recommended that this be turned to false. | true -format | The report format to be generated (HTML, XML, CSV, JSON, JUNIT, SARIF, JENKINS, GITLAB, ALL). This configuration is ignored if `formats` is defined. This configuration option has no affect if using this within the Site plugin unless the externalReport is set to true. | HTML -formats | A list of report formats to be generated (HTML, XML, CSV, JSON, JUNIT, SARIF, JENKINS, GITLAB, ALL). This configuration overrides the value from `format`. This configuration option has no affect if using this within the Site plugin unless the externalReport is set to true. |   -junitFailOnCVSS | If using the JUNIT report format the junitFailOnCVSS sets the CVSS score threshold that is considered a failure. | 0 -prettyPrint | Whether the XML and JSON formatted reports should be pretty printed. | false -failBuildOnCVSS | Specifies if the build should be failed if a CVSS score equal to or above a specified level is identified. The default is 11 which means since the CVSS scores are 0-10, by default the build will never fail. More information on CVSS scores can be found at the [NVD](https://nvd.nist.gov/vuln-metrics/cvss) | 11 -failBuildOnAnyVulnerability | Specific that if any vulnerability is identified, the build will fail. | false -failOnError | Whether the build should fail if there is an error executing the dependency-check analysis. | true -name | The name of the report in the site. | dependency-check or dependency-check:aggregate -outputDirectory | The location to write the report(s). This can be specified on the command line via `-Dodc.outputDirectory`. Note, this is not used if generating the report as part of a `mvn site` build. | 'target' -scanSet | An optional collection of file sets that specify additional files and/or directories to analyze as part of the scan. If not specified, defaults to standard Maven conventions. This cannot be configured via the command line parameters (e.g. `-DscanSet=./path`) - use the below `scanDirectory` instead. Note that the scan sets specified should be relative from the base directory - do not use Maven project variable substitution (e.g. `${project.basedir}/src/webpack`). Using Maven project variable substitution can cause directories to be missed especially when using an aggregate build. | ['src/main/resources', 'src/main/filters', 'src/main/webapp', './package.json', './package-lock.json', './npm-shrinkwrap.json', './Gopkg.lock', './go.mod'] -scanDirectory | An optional collection of directories to include in the scan. This configuration should only be used via the command line - if configuring the scan directories within the `pom.xml` please consider using the above `scanSet`. |   -scanDependencies | Sets whether the dependencies should be scanned. | true -scanPlugins | Sets whether the plugins and their dependencies should be scanned. | false -skip | Skips the dependency-check analysis. | false -skipProvidedScope | Skip analysis for artifacts with Provided Scope. | false -skipRuntimeScope | Skip analysis for artifacts with Runtime Scope. | false -skipSystemScope | Skip analysis for artifacts with System Scope. | false -skipTestScope | Skip analysis for artifacts with Test Scope. | true -skipDependencyManagement | Skip analysis for dependencyManagement sections. | true -skipArtifactType | A regular expression used to filter/skip artifact types. This filters on the `type` of dependency as defined in the dependency section: jar, pom, test-jar, etc. |   -suppressionFiles | The file paths to the XML suppression files \- used to suppress [false positives](../general/suppression.html). The configuration value can be a local file path, a URL to a suppression file, or even a reference to a file on the class path (see https://github.com/jeremylong/DependencyCheck/issues/1878#issuecomment-487533799) |   -hintsFile | The file path to the XML hints file \- used to resolve [false negatives](../general/hints.html). |   -enableExperimental | Enable the [experimental analyzers](../analyzers/index.html). If not enabled the experimental analyzers (see below) will not be loaded or used. | false -enableRetired | Enable the [retired analyzers](../analyzers/index.html). If not enabled the retired analyzers (see below) will not be loaded or used. | false -versionCheckEnabled | Whether dependency-check should check if a new version of dependency-check-maven exists. | true +Property | Description | Default Value +---------------------------------|------------------------------------|------------------ +autoUpdate | Sets whether auto-updating of the NVD CVE/CPE, retireJS and hosted suppressions data is enabled. It is not recommended that this be turned to false. | true +format | The report format to be generated (HTML, XML, CSV, JSON, JUNIT, SARIF, JENKINS, GITLAB, ALL). This configuration is ignored if `formats` is defined. This configuration option has no affect if using this within the Site plugin unless the externalReport is set to true. | HTML +formats | A list of report formats to be generated (HTML, XML, CSV, JSON, JUNIT, SARIF, JENKINS, GITLAB, ALL). This configuration overrides the value from `format`. This configuration option has no affect if using this within the Site plugin unless the externalReport is set to true. |   +junitFailOnCVSS | If using the JUNIT report format the junitFailOnCVSS sets the CVSS score threshold that is considered a failure. | 0 +prettyPrint | Whether the XML and JSON formatted reports should be pretty printed. | false +failBuildOnCVSS | Specifies if the build should be failed if a CVSS score equal to or above a specified level is identified. The default is 11 which means since the CVSS scores are 0-10, by default the build will never fail. More information on CVSS scores can be found at the [NVD](https://nvd.nist.gov/vuln-metrics/cvss) | 11 +failBuildOnAnyVulnerability | Specifies that if any vulnerability is identified, the build will fail. | false +failOnError | Whether the build should fail if there is an error executing the dependency-check analysis. | true +name | The name of the report in the site. | dependency-check or dependency-check:aggregate +outputDirectory | The location to write the report(s). This can be specified on the command line via `-Dodc.outputDirectory`. Note, this is not used if generating the report as part of a `mvn site` build. | 'target' +scanSet | An optional collection of file sets that specify additional files and/or directories to analyze as part of the scan. If not specified, defaults to standard Maven conventions. This cannot be configured via the command line parameters (e.g. `-DscanSet=./path`) - use the below `scanDirectory` instead. Note that the scan sets specified should be relative from the base directory - do not use Maven project variable substitution (e.g. `${project.basedir}/src/webpack`). Using Maven project variable substitution can cause directories to be missed especially when using an aggregate build. | ['src/main/resources', 'src/main/filters', 'src/main/webapp', './package.json', './package-lock.json', './npm-shrinkwrap.json', './Gopkg.lock', './go.mod'] +scanDirectory | An optional collection of directories to include in the scan. This configuration should only be used via the command line - if configuring the scan directories within the `pom.xml` please consider using the above `scanSet`. |   +scanDependencies | Sets whether the dependencies should be scanned. | true +scanPlugins | Sets whether the plugins and their dependencies should be scanned. | false +skip | Skips the dependency-check analysis. | false +skipProvidedScope | Skip analysis for artifacts with Provided Scope. | false +skipRuntimeScope | Skip analysis for artifacts with Runtime Scope. | false +skipSystemScope | Skip analysis for artifacts with System Scope. | false +skipTestScope | Skip analysis for artifacts with Test Scope. | true +skipDependencyManagement | Skip analysis for dependencyManagement sections. | true +skipArtifactType | A regular expression used to filter/skip artifact types. This filters on the `type` of dependency as defined in the dependency section: jar, pom, test-jar, etc. |   +suppressionFiles | The file paths to the XML suppression files \- used to suppress [false positives](../general/suppression.html). The configuration value can be a local file path, a URL to a suppression file, or even a reference to a file on the class path (see https://github.com/jeremylong/DependencyCheck/issues/1878#issuecomment-487533799) |   +hintsFile | The file path to the XML hints file \- used to resolve [false negatives](../general/hints.html). |   +enableExperimental | Enable the [experimental analyzers](../analyzers/index.html). If not enabled the experimental analyzers (see below) will not be loaded or used. | false +enableRetired | Enable the [retired analyzers](../analyzers/index.html). If not enabled the retired analyzers (see below) will not be loaded or used. | false +versionCheckEnabled | Whether dependency-check should check if a new version of dependency-check-maven exists. | true +failBuildOnUnusedSuppressionRule | Specifies that if any unused suppression rule is found, the build will fail. | false Analyzer Configuration ==================== diff --git a/utils/src/main/java/org/owasp/dependencycheck/utils/Settings.java b/utils/src/main/java/org/owasp/dependencycheck/utils/Settings.java index d8c48eab53e..fa398a87411 100644 --- a/utils/src/main/java/org/owasp/dependencycheck/utils/Settings.java +++ b/utils/src/main/java/org/owasp/dependencycheck/utils/Settings.java @@ -861,6 +861,10 @@ public static final class KEYS { * query results; append the ecosystem to obtain the default query size. */ public static final String MAX_QUERY_SIZE_PREFIX = "odc.ecosystem.maxquerylimit."; + /** + * The properties key for whether the build should fail if there are unused suppression rules. + */ + public static final String FAIL_ON_UNUSED_SUPPRESSION_RULE = "analyzer.suppression.unused.fail"; /** * private constructor because this is a "utility" class containing