2023-03-22 13:17:19 +00:00
|
|
|
# Copyright (c) HashiCorp, Inc.
|
2023-08-11 13:12:13 +00:00
|
|
|
# SPDX-License-Identifier: BUSL-1.1
|
2023-03-22 13:17:19 +00:00
|
|
|
|
2023-12-21 15:11:05 +00:00
|
|
|
# These scan results are run as part of CRT workflows.
|
|
|
|
|
|
|
|
# Un-triaged results will block release. See `security-scanner` docs for more
|
|
|
|
# information on how to add `triage` config to unblock releases for specific results.
|
|
|
|
# In most cases, we should not need to disable the entire scanner to unblock a release.
|
|
|
|
|
|
|
|
# To run manually, install scanner and then from the repository root run
|
|
|
|
# `SECURITY_SCANNER_CONFIG_FILE=.release/security-scan.hcl scan ...`
|
|
|
|
# To scan a local container, add `local_daemon = true` to the `container` block below.
|
|
|
|
# See `security-scanner` docs or run with `--help` for scan target syntax.
|
|
|
|
|
2021-12-16 16:49:22 +00:00
|
|
|
container {
|
|
|
|
dependencies = true
|
2023-12-21 15:11:05 +00:00
|
|
|
alpine_secdb = true
|
|
|
|
|
|
|
|
secrets {
|
2024-01-19 17:08:54 +00:00
|
|
|
matchers {
|
|
|
|
// Use most of default list, minus Vault (`hashicorp`), which has experienced false positives.
|
2024-01-19 04:00:54 +00:00
|
|
|
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
|
|
|
|
known = [
|
|
|
|
// "hashicorp",
|
|
|
|
"aws",
|
|
|
|
"google",
|
|
|
|
"slack",
|
|
|
|
"github",
|
|
|
|
"azure",
|
|
|
|
"npm",
|
|
|
|
]
|
|
|
|
}
|
2023-12-21 15:11:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# Triage items that are _safe_ to ignore here. Note that this list should be
|
|
|
|
# periodically cleaned up to remove items that are no longer found by the scanner.
|
|
|
|
triage {
|
|
|
|
suppress {
|
|
|
|
# N.b. `vulnerabilites` is the correct spelling for this tool.
|
|
|
|
vulnerabilites = [
|
|
|
|
"CVE-2023-46218", # curl@8.4.0-r0
|
|
|
|
"CVE-2023-46219", # curl@8.4.0-r0
|
|
|
|
"CVE-2023-5678", # openssl@3.1.4-r0
|
2024-08-07 20:55:48 +00:00
|
|
|
"CVE-2024-7264", # curl@8.9.0
|
2023-12-21 15:11:05 +00:00
|
|
|
]
|
2024-05-03 19:09:40 +00:00
|
|
|
paths = [
|
|
|
|
"internal/tools/proto-gen-rpc-glue/e2e/consul/*",
|
|
|
|
"test/integration/connect/envoy/test-sds-server/*",
|
|
|
|
"test/integration/consul-container/*",
|
|
|
|
"testing/deployer/*",
|
|
|
|
"test-integ/*",
|
|
|
|
]
|
2023-12-21 15:11:05 +00:00
|
|
|
}
|
|
|
|
}
|
2021-12-16 16:49:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
binary {
|
2023-12-21 15:11:05 +00:00
|
|
|
go_modules = true
|
2021-12-16 16:49:22 +00:00
|
|
|
osv = true
|
2024-05-23 17:40:59 +00:00
|
|
|
go_stdlib = true
|
2023-12-21 15:11:05 +00:00
|
|
|
# We can't enable npm for binary targets today because we don't yet embed the relevant file
|
|
|
|
# (yarn.lock) in the Consul binary. This is something we may investigate in the future.
|
|
|
|
|
|
|
|
secrets {
|
2024-01-19 17:08:54 +00:00
|
|
|
matchers {
|
|
|
|
// Use most of default list, minus Vault (`hashicorp`), which has experienced false positives.
|
|
|
|
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
|
|
|
|
known = [
|
|
|
|
// "hashicorp",
|
|
|
|
"aws",
|
|
|
|
"google",
|
|
|
|
"slack",
|
|
|
|
"github",
|
|
|
|
"azure",
|
|
|
|
"npm",
|
|
|
|
]
|
|
|
|
}
|
2023-12-21 15:11:05 +00:00
|
|
|
}
|
2024-03-26 21:27:50 +00:00
|
|
|
|
|
|
|
# Triage items that are _safe_ to ignore here. Note that this list should be
|
|
|
|
# periodically cleaned up to remove items that are no longer found by the scanner.
|
|
|
|
triage {
|
|
|
|
suppress {
|
|
|
|
# N.b. `vulnerabilites` is the correct spelling for this tool.
|
|
|
|
vulnerabilites = [
|
|
|
|
]
|
2024-05-03 19:09:40 +00:00
|
|
|
paths = [
|
|
|
|
"internal/tools/proto-gen-rpc-glue/e2e/consul/*",
|
|
|
|
"test/integration/connect/envoy/test-sds-server/*",
|
|
|
|
"test/integration/consul-container/*",
|
|
|
|
"testing/deployer/*",
|
|
|
|
"test-integ/*",
|
|
|
|
]
|
2024-03-26 21:27:50 +00:00
|
|
|
}
|
|
|
|
}
|
2021-12-16 16:49:22 +00:00
|
|
|
}
|