gitlab-security_report_schemas 0.1.3.min15.0.0.max15.2.1 → 0.1.3.min15.0.0.max15.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile.lock +1 -1
- data/README.md +12 -12
- data/RUNBOOK.md +35 -1
- data/gem_version +1 -1
- data/schemas/15.2.2/cluster-image-scanning-report-format.json +1259 -0
- data/schemas/15.2.2/container-scanning-report-format.json +1192 -0
- data/schemas/15.2.2/coverage-fuzzing-report-format.json +1169 -0
- data/schemas/15.2.2/dast-report-format.json +1574 -0
- data/schemas/15.2.2/dependency-scanning-report-format.json +1180 -0
- data/schemas/15.2.2/sast-report-format.json +1164 -0
- data/schemas/15.2.2/secret-detection-report-format.json +1188 -0
- data/supported_versions +1 -0
- metadata +9 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d69ed2a06ec3ed14840cb492a0fb999a6ea1ce02ae7359cac919d9e03fe86155
|
4
|
+
data.tar.gz: 482cad69c32ce1d46229b133eb9c536126572616eec770413ec1f7a1c22b2fa9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 35a601473896abf26a5206ed96906c7b9516ed5dfa2086418eedcbc7b8c801e36d45e5d186ec6df86629db886e56543898a6dc2e0b7eed2b96a0ec42595c67d1
|
7
|
+
data.tar.gz: 55daaeaad381551d36108a09db9385bcbedaf9f3e2e497241a7d1dd3a7efca1d7972149c116c9fd9b3e66a8227e1316014f82e4760a2533a5ce4c551e71931c2
|
data/Gemfile.lock
CHANGED
data/README.md
CHANGED
@@ -8,6 +8,10 @@ Rubygem for https://gitlab.com/gitlab-org/security-products/security-report-sche
|
|
8
8
|
|
9
9
|
This gem provides a Ruby and command line interface to validate the report artifact generated by the security analyzers.
|
10
10
|
|
11
|
+
## Maintenance
|
12
|
+
|
13
|
+
See [`RUNBOOK.md`](./RUNBOOK.md) for common release and maintenance tasks.
|
14
|
+
|
11
15
|
## Installation
|
12
16
|
|
13
17
|
Install the gem and add to the application's Gemfile by executing:
|
@@ -47,21 +51,17 @@ bundle exec security-reports-schemas $FILE_PATH
|
|
47
51
|
|
48
52
|
#### Credentials
|
49
53
|
|
50
|
-
| Key | Description
|
51
|
-
|
52
|
-
| `GITLAB_PUSH_ACCESS_TOKEN` |
|
53
|
-
| `GEM_HOST_API_KEY` | rubygems.org API key
|
54
|
+
| Key | Description |
|
55
|
+
|-----------------------------|---------------------------------------------------------------------------------------------------------------------|
|
56
|
+
| `GITLAB_PUSH_ACCESS_TOKEN` | Access token for the `gl-service-dev-govern-sec-report-schemas` service account of the top-level `gitlab-org` group |
|
57
|
+
| `GEM_HOST_API_KEY` | rubygems.org API key (inherited from parent group) |
|
54
58
|
|
55
59
|
#### Configuration
|
56
60
|
|
57
|
-
| Key | Default | Description
|
58
|
-
|
59
|
-
| `SCHEMAS_PATH` | `./schemas` | Schema storage location
|
60
|
-
| `SCHEMA_PROJECT` | `gitlab-org/security-products/security-report-schemas` | Where to source schemas
|
61
|
-
|
62
|
-
## Maintenance
|
63
|
-
|
64
|
-
See [`RUNBOOK.md`](./RUNBOOK.md) for solutions to common maintenance tasks.
|
61
|
+
| Key | Default | Description |
|
62
|
+
|---------------------------|--------------------------------------------------------|-------------------------|
|
63
|
+
| `SCHEMAS_PATH` | `./schemas` | Schema storage location |
|
64
|
+
| `SCHEMA_PROJECT` | `gitlab-org/security-products/security-report-schemas` | Where to source schemas |
|
65
65
|
|
66
66
|
## Development
|
67
67
|
|
data/RUNBOOK.md
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# Common maintenance tasks
|
2
2
|
|
3
|
-
|
3
|
+
## Manually release a new RubyGem version
|
4
4
|
|
5
5
|
* an upstream [security-report-schemas](https://gitlab.com/gitlab-org/security-products/security-report-schemas) pipeline failed to trigger the release pipeline
|
6
6
|
* you want to add, remove or deprecate support for report schema versions
|
@@ -22,6 +22,40 @@
|
|
22
22
|
variable.
|
23
23
|
3. Trigger the manual `manual-release` job in the resulting pipeline.
|
24
24
|
|
25
|
+
## Jobs fail to self-push due to an expired service account access token
|
26
|
+
|
27
|
+
To self-push commits, we use an access token of a service account which
|
28
|
+
belongs to the top-level `gitlab-org` group. This token is kept in this project's
|
29
|
+
`GITLAB_PUSH_ACCESS_TOKEN` CI variable and the token expires yearly.
|
30
|
+
|
31
|
+
The service account access token [should get automatically rotated](https://gitlab.com/gitlab-com/team-member-epics/access-requests/-/issues/29595#note_2433504597)
|
32
|
+
and the CI variable should get updated with the updated token.
|
33
|
+
|
34
|
+
Should auto-rotation fail or the access token become invalid for another
|
35
|
+
reason, the `add-schema-version` and `manual-release` jobs fail:
|
36
|
+
|
37
|
+
```
|
38
|
+
$ git push origin $CI_COMMIT_REF_NAME
|
39
|
+
remote: HTTP Basic: Access denied. If a password was provided for Git authentication, the password was incorrect or you're required to use a token instead of a password. If a token was provided, it was either incorrect, expired, or improperly scoped.
|
40
|
+
```
|
41
|
+
|
42
|
+
### Solution: Manually rotate the service account access token
|
43
|
+
|
44
|
+
Owners of the top-level `gitlab-org` group can manually
|
45
|
+
[rotate the service account access token](https://docs.gitlab.com/user/profile/service_accounts/#rotate-the-personal-access-token)
|
46
|
+
and update this project's `GITLAB_PUSH_ACCESS_TOKEN` CI variable with the
|
47
|
+
renewed token.
|
48
|
+
|
49
|
+
### Workaround: Use a temporary personal access token
|
50
|
+
|
51
|
+
To release urgently without Owner access to `gitlab-org`:
|
52
|
+
|
53
|
+
1. update the default branch protection so that you can push
|
54
|
+
2. create a short-lived personal access token and rerun the failed `manual-release`
|
55
|
+
job, setting the CI variable `GITLAB_PUSH_ACCESS_TOKEN` to your short-lived token
|
56
|
+
3. after the job succeeded, revoke your short-lived token and restore the default
|
57
|
+
branch protection so that you can no longer push
|
58
|
+
|
25
59
|
## Find the commit SHA for a RubyGem version
|
26
60
|
|
27
61
|
Before a rubygems.org release is created, a git tag referencing the full
|
data/gem_version
CHANGED
@@ -1 +1 @@
|
|
1
|
-
0.1.3.min15.0.0.max15.2.
|
1
|
+
0.1.3.min15.0.0.max15.2.2
|