RULEAPI-653: Add a new language identifier for secrets detection rules (#154)

This commit is contained in:
Pierre-Loup 2021-07-01 14:26:02 +02:00 committed by GitHub
parent 582f2720ad
commit 49aa2dcd4f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
115 changed files with 89 additions and 308 deletions

View File

@ -66,6 +66,7 @@ const languageToJiraProject = new Map(Object.entries({
"KOTLIN": "SONARKT",
"SCALA": "SONARSLANG",
"GO": "SONARSLANG",
"SECRETS": "SECRETS",
"SWIFT": "SONARSWIFT",
"TSQL": "SONARTSQL",
"VB6": "SONARVBSIX",
@ -102,6 +103,7 @@ const languageToGithubProject = new Map(Object.entries({
"XML": "sonar-xml",
"CLOUDFORMATION": "sonar-iac",
"TERRAFORM": "sonar-iac",
"SECRETS": "sonar-secrets",
}));
function ticketsAndImplementationPRsLinks(ruleNumber: string, title: string, language?: string) {

View File

@ -26,6 +26,7 @@ export function useRuleCoverage() {
'plsql': ['PLSQL'],
'python': ['PY'],
'rpg': ['RPG'],
'secrets': ['SECRETS'],
'swift': ['SWIFT'],
'tsql': ['TSQL'],
'vb6': ['VB'],

View File

@ -23,6 +23,7 @@ LANG_TO_LABEL = {'abap': 'abap',
'ruby': 'slang',
'rust': 'rust',
'scala': 'slang',
'secrets': 'secrets',
'solidity': 'solidity',
'swift': 'swift',
'tsql': 'tsql',

View File

@ -6,7 +6,7 @@ from git import Repo
from git import Git
from pathlib import Path
repos=['sonar-abap','sonar-cpp','sonar-cobol','sonar-dotnet','sonar-css','sonar-flex','slang-enterprise','sonar-java','SonarJS','sonar-php','sonar-pli','sonar-plsql','sonar-python','sonar-rpg','sonar-swift','sonar-tsql','sonar-vb','sonar-html','sonar-xml','sonar-kotlin']
repos=['sonar-abap','sonar-cpp','sonar-cobol','sonar-dotnet','sonar-css','sonar-flex','slang-enterprise','sonar-java','SonarJS','sonar-php','sonar-pli','sonar-plsql','sonar-python','sonar-rpg','sonar-swift','sonar-tsql','sonar-vb','sonar-html','sonar-xml','sonar-kotlin', 'sonar-secrets']
#repos=['sonar-php','sonar-pli','sonar-plsql','sonar-python','sonar-rpg','sonar-swift','sonar-tsql','sonar-vb','sonar-html','sonar-xml']
def load_json(file):

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,8 +0,0 @@
{
"tags": [
"cwe",
"cert",
"sans-top25-porous",
"owasp-a2"
]
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,8 +0,0 @@
{
"tags": [
"cwe",
"cert",
"sans-top25-porous",
"owasp-a2"
]
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,41 +1,2 @@
{
"title": "Amazon Web Services credentials should not be disclosed",
"type": "VULNERABILITY",
"status": "ready",
"remediation": {
"func": "Constant\/Issue",
"constantCost": "30min"
},
"tags": [
"cwe",
"sans-top25-porous",
"owasp-a2"
],
"extra": {
"coveredLanguages": [
],
"replacementRules": [
]
},
"defaultSeverity": "Blocker",
"ruleSpecification": "RSPEC-6290",
"sqKey": "S6290",
"scope": "All",
"securityStandards": {
"CWE": [
798,
259
],
"OWASP": [
"A2"
],
"CERT": [
"MSC03-J."
]
},
"defaultQualityProfiles": [
"Sonar way"
]
}

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -0,0 +1,42 @@
{
"title": "Amazon Web Services credentials should not be disclosed",
"type": "VULNERABILITY",
"status": "ready",
"remediation": {
"func": "Constant\/Issue",
"constantCost": "30min"
},
"tags": [
"cwe",
"sans-top25-porous",
"owasp-a2"
],
"extra": {
"coveredLanguages": [
],
"replacementRules": [
]
},
"defaultSeverity": "Blocker",
"ruleSpecification": "RSPEC-6290",
"sqKey": "S6290",
"scope": "All",
"securityStandards": {
"CWE": [
798,
259
],
"OWASP": [
"A2"
],
"CERT": [
"MSC03-J."
]
},
"defaultQualityProfiles": [
"Sonar way"
]
}

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,8 +0,0 @@
{
"tags": [
"cwe",
"cert",
"sans-top25-porous",
"owasp-a2"
]
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,8 +0,0 @@
{
"tags": [
"cwe",
"cert",
"sans-top25-porous",
"owasp-a2"
]
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,41 +1,2 @@
{
"title": "Amazon MWS credentials should not be disclosed",
"type": "VULNERABILITY",
"status": "ready",
"remediation": {
"func": "Constant\/Issue",
"constantCost": "30min"
},
"tags": [
"cwe",
"sans-top25-porous",
"owasp-a2"
],
"extra": {
"coveredLanguages": [
],
"replacementRules": [
]
},
"defaultSeverity": "Blocker",
"ruleSpecification": "RSPEC-6292",
"sqKey": "S6292",
"scope": "All",
"securityStandards": {
"CWE": [
798,
259
],
"OWASP": [
"A2"
],
"CERT": [
"MSC03-J."
]
},
"defaultQualityProfiles": [
"Sonar way"
]
}

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

View File

@ -1,3 +0,0 @@
{
}

View File

@ -1 +0,0 @@
include::../rule.adoc[]

Some files were not shown because too many files have changed in this diff Show More