Skip to content

Commit dce08b4

Browse files
authored
Merge pull request #12087 from DefectDojo/master-into-dev/2.44.3-2.45.0-dev
Release: Merge back 2.44.3 into dev from: master-into-dev/2.44.3-2.45.0-dev
2 parents da639b9 + daf9c8d commit dce08b4

35 files changed

+7202
-262
lines changed
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
name: "Docs: Dry Run Production Deployment"
2+
3+
on:
4+
pull_request:
5+
paths:
6+
- 'docs/**'
7+
8+
jobs:
9+
deploy:
10+
runs-on: ubuntu-latest
11+
steps:
12+
- name: Setup Hugo
13+
uses: peaceiris/actions-hugo@75d2e84710de30f6ff7268e08f310b60ef14033f # v3.0.0
14+
with:
15+
hugo-version: '0.125.3'
16+
extended: true
17+
18+
- name: Setup Node
19+
uses: actions/setup-node@1d0ff469b7ec7b3cb9d8673fde0c81c44821de2a # v4.2.0
20+
with:
21+
node-version: '22.14.0'
22+
23+
- name: Cache dependencies
24+
uses: actions/cache@d4323d4df104b026a6aa633fdb11d772146be0bf # v4.2.2
25+
with:
26+
path: ~/.npm
27+
key: ${{ runner.os }}-node-${{ hashFiles('**/package-lock.json') }}
28+
restore-keys: |
29+
${{ runner.os }}-node-
30+
31+
- name: Checkout
32+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
33+
with:
34+
submodules: recursive
35+
fetch-depth: 0
36+
37+
- name: Test the build process
38+
env:
39+
HUGO_ENVIRONMENT: production
40+
HUGO_ENV: production
41+
run: cd docs && npm ci && hugo --minify --gc --config config/production/hugo.toml
File renamed without changes.
118 KB
Loading
171 KB
Loading
272 KB
Loading

docs/config/_default/hugo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ baseurl = "http://localhost/"
33
canonifyURLs = false
44
disableAliases = true
55
disableHugoGeneratorInject = true
6-
# disableKinds = ["taxonomy", "term"]
6+
disableKinds = ["taxonomy", "term"]
77
enableEmoji = true
88
enableGitInfo = false
99
enableRobotsTXT = true

docs/content/en/changelog/changelog.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ For Open Source release notes, please see the [Releases page on GitHub](https://
1414

1515
- **(Beta UI)** Added a field in the View Engagement page which allows a user to navigate to the linked Jira Epic, if one exists.
1616
- **(Universal Parser)** XML is now a supported file type for Universal Parser.
17-
- **(SSO)** SSO can now be set up with any kind of [OIDC Configuration](https://auth0.com/docs/authenticate/protocols/openid-connect-protocol). See ODIC Settings in the Beta UI:
17+
- **(SSO)** SSO can now be set up with any kind of [OIDC Configuration](https://auth0.com/docs/authenticate/protocols/openid-connect-protocol). See OIDC Settings in the Beta UI:
1818

19-
![image](images/odic.png)
19+
![image](images/oidc.png)
2020

2121
### Mar 3, 2025: v2.44.0
2222

docs/content/en/connecting_your_tools/parsers/file/anchore_engine.md

Lines changed: 1 addition & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -9,32 +9,7 @@ DefectDojo parser accepts a .json file.
99
Using the [Anchore CLI](https://docs.anchore.com/current/docs/using/cli_usage/images/inspecting_image_content/) is the most reliable way to generate an Anchore report which DefectDojo can parse. When generating a report with the Anchore CLI, please use the following command to ensure complete data: `anchore-cli --json image vuln <image:tag> all`
1010

1111
### Acceptable JSON Format
12-
All properties are strings and are required by the parser.
13-
14-
~~~
15-
16-
{
17-
"imageDigest": "sha256:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
18-
"vulnerabilities": [
19-
{
20-
"feed": "example-feed",
21-
"feed_group": "example-feed-group",
22-
"fix": "1.2.4",
23-
"package": "example-package",
24-
"package_cpe": "cpe:2.3:a:*:example:1.2.3:*:*:*:*:*:*:*",
25-
"package_name": "example-package-name",
26-
"package_path": "path/to/package",
27-
"package_type": "dpkg",
28-
"package_version": "1.2.3",
29-
"severity": "Medium",
30-
"url": "https://example.com/cve/CVE-2011-3389",
31-
"vuln": "CVE-2011-3389"
32-
},
33-
...
34-
],
35-
"vulnerability_type": "os"
36-
}
37-
~~~
12+
All properties are strings and are required by the parser. As the parser evolved, two anchore engine parser JSON formats are present till now. Both ([old](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/anchore_engine/many_vulns.json) / [new](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/anchore_engine/new_format_issue_11552.json)) are supported.
3813

3914
### Sample Scan Data
4015
Sample Anchore-Engine scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/anchore_engine).

docs/content/en/connecting_your_tools/parsers/file/aqua.md

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,37 @@
22
title: "Aqua"
33
toc_hide: true
44
---
5-
JSON report format.
5+
6+
### File Types
7+
DefectDojo parser accepts JSON report format.
8+
9+
See Aqua documention: https://docs.aquasec.com
10+
11+
### CI/CD Scans
12+
Aqua scanning can be integrated with several types of third-party CI/CD systems.
13+
14+
If there is no plugin available for a particular development tool, Aqua can be integrated with the CI/CD pipeline using Scanner CLI.
15+
16+
CI/CD scans produces JSON scan reports that are supported by the parser. With this kind of report, the parser is able to retrieve vulnerabilities as well as sensitive datas.
17+
18+
### REST API
19+
20+
You can also retrieve the JSON directly from Aqua if you use one of the following endpoint:
21+
22+
- `/api/v1/scanner/registry/<registryName>/image/<imageName>/scan_result`
23+
24+
- `/api/v2/risks/vulnerabilities`
25+
26+
Example
27+
```
28+
curl -X GET <aquaseceurl>/api/v1/scanner/registry/<registryName>/image/<imageName>/scan_result > report.json
29+
```
30+
31+
```
32+
curl -X GET <aquaseceurl>/api/v2/risks/vulnerabilities?show_negligible=true&image_name_exact_match=true&registry_name=<registryName>&image_name=<imageName> > report.json
33+
```
34+
35+
Those JSON files will only list vulnerabilities. Thus, DefectDojo parser will not retrieve findings such as sensitive datas.
636

737
### Sample Scan Data
8-
Sample Aqua scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/aqua).
38+
Sample Aqua scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/aqua).

docs/content/en/customize_dojo/user_management/about_perms_and_roles.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
---
2-
title: "User permissions & Roles"
2+
title: "Permissions in DefectDojo"
33
description: "Summary of all DefectDojo permission options, in detail"
4-
weight: 1
4+
weight: 2
55
---
66

77
If you have a team of users working in DefectDojo, it's important to set up Role\-Based Access Control (RBAC) appropriately so that users can only access specific data. Security data is highly sensitive, and DefectDojo's options for access control allow you to be specific about each team member’s access to information.
88

9+
This article is an overview of how permissions in DefectDojo work. If you would prefer to see a detailed breakdown of **each action** that can be controlled by Permissions, see our **[Permissions Chart](../user_permission_chart/)** article.
10+
911
## Types of Permissions
1012

1113
DefectDojo manages four different kinds of permissions:

0 commit comments

Comments
 (0)