mirror of https://github.com/hashicorp/consul
Browse Source
This was previously disabled due to an unresolved false-positive CVE. Re-enabling both secrets and OSV + Go Modules scanning, which per our current scan results should not be a blocker to future releases.pull/19978/head
Michael Zalimeni
12 months ago
1 changed files with 36 additions and 7 deletions
@ -1,17 +1,46 @@
|
||||
# Copyright (c) HashiCorp, Inc. |
||||
# SPDX-License-Identifier: BUSL-1.1 |
||||
|
||||
# These scan results are run as part of CRT workflows. |
||||
|
||||
# Un-triaged results will block release. See `security-scanner` docs for more |
||||
# information on how to add `triage` config to unblock releases for specific results. |
||||
# In most cases, we should not need to disable the entire scanner to unblock a release. |
||||
|
||||
# To run manually, install scanner and then from the repository root run |
||||
# `SECURITY_SCANNER_CONFIG_FILE=.release/security-scan.hcl scan ...` |
||||
# To scan a local container, add `local_daemon = true` to the `container` block below. |
||||
# See `security-scanner` docs or run with `--help` for scan target syntax. |
||||
|
||||
container { |
||||
dependencies = true |
||||
alpine_secdb = false |
||||
secrets = false |
||||
alpine_secdb = true |
||||
|
||||
secrets { |
||||
all = true |
||||
} |
||||
|
||||
# Triage items that are _safe_ to ignore here. Note that this list should be |
||||
# periodically cleaned up to remove items that are no longer found by the scanner. |
||||
triage { |
||||
suppress { |
||||
# N.b. `vulnerabilites` is the correct spelling for this tool. |
||||
vulnerabilites = [ |
||||
"CVE-2023-46218", # curl@8.4.0-r0 |
||||
"CVE-2023-46219", # curl@8.4.0-r0 |
||||
"CVE-2023-5678", # openssl@3.1.4-r0 |
||||
] |
||||
} |
||||
} |
||||
} |
||||
|
||||
binary { |
||||
secrets = false |
||||
go_modules = false |
||||
go_modules = true |
||||
osv = true |
||||
# TODO(spatel): CE refactor |
||||
oss_index = true |
||||
nvd = true |
||||
# We can't enable npm for binary targets today because we don't yet embed the relevant file |
||||
# (yarn.lock) in the Consul binary. This is something we may investigate in the future. |
||||
|
||||
secrets { |
||||
all = true |
||||
} |
||||
} |
||||
|
Loading…
Reference in new issue