This is an automated email from the ASF dual-hosted git repository.

pvillard pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/nifi.git


The following commit(s) were added to refs/heads/main by this push:
     new d84f0dabaf NIFI-14208 Removed Dependency Check Plugin
d84f0dabaf is described below

commit d84f0dabaf87b60abd01e8035864922606d092ab
Author: exceptionfactory <[email protected]>
AuthorDate: Wed Jan 29 11:17:09 2025 -0600

    NIFI-14208 Removed Dependency Check Plugin
    
    - Removed OWASP Dependency Check in favor of Grype scan in code-compliance 
workflow
    
    Signed-off-by: Pierre Villard <[email protected]>
    
    This closes #9673.
---
 nifi-dependency-check-maven/suppressions.xml | 248 ---------------------------
 pom.xml                                      |  31 ----
 2 files changed, 279 deletions(-)

diff --git a/nifi-dependency-check-maven/suppressions.xml 
b/nifi-dependency-check-maven/suppressions.xml
deleted file mode 100644
index 86069db3df..0000000000
--- a/nifi-dependency-check-maven/suppressions.xml
+++ /dev/null
@@ -1,248 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!--
-  Licensed to the Apache Software Foundation (ASF) under one or more
-  contributor license agreements. See the NOTICE file distributed with
-  this work for additional information regarding copyright ownership.
-  The ASF licenses this file to You under the Apache License, Version 2.0
-  (the "License"); you may not use this file except in compliance with
-  the License. You may obtain a copy of the License at
-  http://www.apache.org/licenses/LICENSE-2.0
-  Unless required by applicable law or agreed to in writing, software
-  distributed under the License is distributed on an "AS IS" BASIS,
-  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-  See the License for the specific language governing permissions and
-  limitations under the License.
--->
-<suppressions 
xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd";>
-    <suppress>
-        <notes>NiFi packages contain other project names, which can cause 
incorrect identification</notes>
-        <packageUrl regex="true">^pkg:maven/org\.apache\.nifi.*$</packageUrl>
-        <cpe regex="true">^cpe:.*$</cpe>
-    </suppress>
-    <suppress>
-        <notes>Elasticsearch Server vulnerabilities do not apply to 
elasticsearch-rest-client</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.elasticsearch\.client/elasticsearch\-.*?\-client@.*$</packageUrl>
-        <cpe regex="true">^cpe:/a:elastic.*$</cpe>
-    </suppress>
-    <suppress>
-        <notes>Elasticsearch Server vulnerabilities do not apply to 
elasticsearch-rest-client-sniffer</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.elasticsearch\.client/elasticsearch\-.*?\-client-sniffer@.*$</packageUrl>
-        <cpe regex="true">^cpe:/a:elastic.*$</cpe>
-    </suppress>
-    <suppress>
-        <notes>CVE-2022-30187 applies to Azure Blob not the EventHubs 
Checkpoint Store Blob library</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.azure/azure\-messaging\-eventhubs\-checkpointstore\-blob@.*$</packageUrl>
-        <cve>CVE-2022-30187</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2018-14335 applies to H2 running with a web server console 
enabled</notes>
-        <packageUrl regex="true">^pkg:maven/com\.h2database/h2@.*$</packageUrl>
-        <vulnerabilityName>CVE-2018-14335</vulnerabilityName>
-    </suppress>
-    <suppress>
-        <notes>The Jetty Apache JSP library is not subject to Apache Tomcat 
vulnerabilities</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.mortbay\.jasper/apache\-jsp@.*$</packageUrl>
-        <cpe>cpe:/a:apache:tomcat</cpe>
-    </suppress>
-    <suppress>
-        <notes>Google BigQuery Storage is not the same as the gGRPC framework 
library</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.google\.api\.grpc/grpc\-google\-cloud\-bigquerystorage\-.*$</packageUrl>
-        <cpe>cpe:/a:grpc:grpc</cpe>
-    </suppress>
-    <suppress>
-        <notes>Google PubSubLite is not the same as the gRPC framework 
library</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.google\.api\.grpc/grpc\-google\-cloud\-pubsublite\-v1@.*$</packageUrl>
-        <cpe>cpe:/a:grpc:grpc</cpe>
-    </suppress>
-    <suppress>
-        <notes>CVE-2021-34538 applies to Apache Hive server not the Storage 
API library</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.hive/hive\-storage\-api@.*$</packageUrl>
-        <cve>CVE-2021-34538</cve>
-    </suppress>
-    <suppress>
-        <notes>The Jackson maintainers dispute the applicability of 
CVE-2023-35116 based on cyclic nature of reported concern</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.fasterxml\.jackson\.core/jackson\-databind@.*$</packageUrl>
-        <vulnerabilityName>CVE-2023-35116</vulnerabilityName>
-    </suppress>
-    <suppress>
-        <notes>The Square Wire framework is not the same as the Wire secure 
communication application</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.squareup\.wire/.*$</packageUrl>
-        <cpe>cpe:/a:wire:wire</cpe>
-    </suppress>
-    <suppress>
-        <notes>Avro project vulnerabilities do not apply to Parquet 
Avro</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.parquet/parquet\-avro@.*$</packageUrl>
-        <cpe>cpe:/a:avro_project:avro</cpe>
-    </suppress>
-    <suppress>
-        <notes>CVE-2016-5397 applies to Apache Thrift Go not Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libthrift@.*$</packageUrl>
-        <cve>CVE-2016-5397</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-0210 applies to Apache Thrift Go server not 
Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libthrift@.*$</packageUrl>
-        <cve>CVE-2019-0210</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2018-11798 applies Apache Thrift Node.js not Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libthrift@.*$</packageUrl>
-        <cve>CVE-2018-11798</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-11939 applies to Thrift Servers in Go not Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-11939</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-3552 applies to Thrift Servers in CPP not Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-3552</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-3553 applies to Thrift Servers in CPP not Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-3553</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-3558 applies to Thrift Servers in Python not 
Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-3558</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-3564 applies to Thrift Servers in Go not Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-3564</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-3565 applies to Thrift Servers in CPP not Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-3565</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2021-24028 applies to Facebook Thrift CPP</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2021-24028</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-11938 applies to Facebook Thrift Servers</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-11938</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-3559 applies to Facebook Thrift Servers</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.thrift/libfb303@.*$</packageUrl>
-        <cve>CVE-2019-3559</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2023-37475 applies to Hamba Avro in Go not Apache Avro for 
Java</notes>
-        <packageUrl regex="true">^pkg:maven/org\.apache\.avro/.*$</packageUrl>
-        <cve>CVE-2023-37475</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2023-36415 applies to Azure Identity for Python not 
Java</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.azure/azure\-identity@.*$</packageUrl>
-        <cve>CVE-2023-36415</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2020-13949 applies to Thrift and not to Hive</notes>
-        <packageUrl regex="true">^pkg:maven/org\.apache\.hive.*$</packageUrl>
-        <cve>CVE-2020-13949</cve>
-    </suppress>
-    <suppress>
-        <notes>Parquet MR vulnerabilities do not apply to other Parquet 
libraries</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.parquet/parquet\-(?!mr).*$</packageUrl>
-        <cpe>cpe:/a:apache:parquet-mr</cpe>
-    </suppress>
-    <suppress>
-        <notes>CVE-2019-11358 applies to bundled copies of jQuery not used in 
the project</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <cve>CVE-2019-11358</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2020-11022 applies to bundled copies of jQuery not used in 
the project</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <cve>CVE-2020-11022</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2020-11023 applies to bundled copies of jQuery not used in 
the project</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <cve>CVE-2020-11023</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2011-4969 applies to bundled copies of jQUery not used in 
the project</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <cve>CVE-2011-4969</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2012-6708 applies to bundled copies of jQUery not used in 
the project</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <cve>CVE-2012-6708</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2015-9251 applies to bundled copies of jQUery not used in 
the project</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <cve>CVE-2015-9251</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2020-7656 applies to bundled copies of jQUery not used in 
the project</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <cve>CVE-2020-7656</cve>
-    </suppress>
-    <suppress>
-        <notes>CVE-2023-44487 references gRPC for Go</notes>
-        <packageUrl regex="true">^pkg:maven/io\.grpc/grpc.*$</packageUrl>
-        <cve>CVE-2023-44487</cve>
-    </suppress>
-    <suppress>
-        <notes>Guava temporary directory file creation is not used</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.google\.guava/guava@.*$</packageUrl>
-        <cve>CVE-2023-2976</cve>
-    </suppress>
-    <suppress>
-        <notes>Guava temporary directory file creation is not used</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.google\.guava/guava@.*$</packageUrl>
-        <cve>CVE-2020-8908</cve>
-    </suppress>
-    <suppress>
-        <notes>Findings for Apache Hadoop do not apply to the shaded Protobuf 
library</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.apache\.hadoop\.thirdparty/hadoop\-shaded\-protobuf_3_25@.*$</packageUrl>
-        <cpe>cpe:/a:apache:hadoop</cpe>
-    </suppress>
-    <suppress>
-        <notes>CVE-2024-23081 applies to threetenbp 1.6.8 and earlier not 
1.6.9</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.threeten/threetenbp@.*$</packageUrl>
-        <vulnerabilityName>CVE-2024-23081</vulnerabilityName>
-    </suppress>
-    <suppress>
-        <notes>CVE-2024-23082 applies to threetenbp 1.6.8 and earlier not 
1.6.9</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.threeten/threetenbp@.*$</packageUrl>
-        <vulnerabilityName>CVE-2024-23082</vulnerabilityName>
-    </suppress>
-    <suppress>
-        <notes>CVE-2023-7272 applies to Eclipse Parrson not javax.json</notes>
-        <packageUrl 
regex="true">^pkg:maven/org\.glassfish/javax\.json@.*$</packageUrl>
-        <vulnerabilityName>CVE-2023-7272</vulnerabilityName>
-    </suppress>
-    <suppress>
-        <notes>CVE-2024-43591 applies to Azure CLI not azure-core-amqp</notes>
-        <packageUrl regex="true">^pkg:maven/com\.azure/.*$</packageUrl>
-        <cpe>cpe:/a:microsoft:azure_cli</cpe>
-        <cve>CVE-2024-43591</cve>
-    </suppress>
-    <suppress>
-        <notes>jquery is not used although bundled in Hadoop avro-ipc 
libraries</notes>
-        <packageUrl regex="true">^pkg:javascript/jquery@.*$</packageUrl>
-        <vulnerabilityName>jquery issue: 162</vulnerabilityName>
-    </suppress>
-    <suppress>
-        <notes>Google OpenTelemetry shared-resourcemapping versions do not 
align with base OpenTelemetry versions leading to false positives</notes>
-        <packageUrl 
regex="true">^pkg:maven/com\.google\.cloud\.opentelemetry/.*$</packageUrl>
-        <cpe>cpe:/a:opentelemetry:opentelemetry</cpe>
-    </suppress>
-    <suppress>
-        <notes>CVE-2024-35255 is resolved in msal4j 1.15.1 and the CPE for 
other languages does not apply</notes>
-        <cve>CVE-2024-35255</cve>
-        <cpe>cpe:/a:microsoft:authentication_library:*:*:*:*:*:.net:*:*</cpe>
-    </suppress>
-</suppressions>
diff --git a/pom.xml b/pom.xml
index a9d8912899..728d86ab32 100644
--- a/pom.xml
+++ b/pom.xml
@@ -1154,36 +1154,5 @@
                 </plugins>
             </build>
         </profile>
-        <profile>
-            <!-- Run "mvn validate -P dependency-check" to generate 
dependency-check-report.html in the target directory -->
-            <!-- Report results require detailed analysis to determine whether 
the vulnerability impacts the application -->
-            <id>dependency-check</id>
-            <build>
-                <plugins>
-                    <plugin>
-                        <groupId>org.owasp</groupId>
-                        <artifactId>dependency-check-maven</artifactId>
-                        <version>11.1.0</version>
-                        <executions>
-                            <execution>
-                                <inherited>false</inherited>
-                                <phase>validate</phase>
-                                <goals>
-                                    <goal>aggregate</goal>
-                                </goals>
-                                <configuration>
-                                    
<suppressionFiles>nifi-dependency-check-maven/suppressions.xml</suppressionFiles>
-                                    <!-- Skip System Scope to avoid dependency 
resolution errors with jdk.tools on Java 8 -->
-                                    <skipSystemScope>true</skipSystemScope>
-                                    <!-- Disable .NET Assembly Analyzer to 
avoid non-applicable errors -->
-                                    
<assemblyAnalyzerEnabled>false</assemblyAnalyzerEnabled>
-                                    <skipProvidedScope>true</skipProvidedScope>
-                                </configuration>
-                            </execution>
-                        </executions>
-                    </plugin>
-                </plugins>
-            </build>
-        </profile>
     </profiles>
 </project>

Reply via email to