From nobody Mon Dec 19 05:08:06 2022 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Nb7530Lg9zZkcT; Mon, 19 Dec 2022 05:08:07 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Nb7526wTvz4Y7G; Mon, 19 Dec 2022 05:08:06 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1671426487; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=+oIwESzTpC9AERF/PrQ55W3k3nS9utW/mmV2SJpORU8=; b=KXDHncEyLuWfKc5ISSkq8kSFeJZWrtNm5gZIDEBLoB2iCksdDhBLvUxDgjH3wZZ+67a2ft v48e44V7SWwdADU2YuYLY260FOvw+Vr1TBHnH4pL1KLHULhdo3XSpx+vzm429CmgKIDTFp Dauj71biLHiHSxkWzvKhtedf/p3SzUzrGPpjosfFsKzFBxkxWzOF4QtuP6t5XBPyw9Fwdh WuahuI6yM4qOxiI6ekp+ER5wA5cstfmReF7sNgYnH01u9eD29WvpUxekWDbHtoUP8O7YSX jnaW8zyOjyvVuuKcETjkXPkmh2BEBEZ+BM0+dOpcBPt+JZU40UKZoqBwmxdLzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1671426487; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=+oIwESzTpC9AERF/PrQ55W3k3nS9utW/mmV2SJpORU8=; b=ar7Aoh2kUYHl1MEULCnHxQz0xEoIboydvzFvBo/2QGpDbIrCDGTuaVuEQe6b2/2ArCn5qO iVFEF5o0yvrZfSx+lQNiG1FA1BaYyJhq7/g1r7tm7yBAwSTBzgI1rKaRj+visNG8znyNKn WXqqw8TYjgBqcO6dEmwOXRwe6DzCWQ3OqQIxoLhs/yU4g9mdYYhzSWy0KiaEISarRkcVmk ns7ZnLVexLA9jwTzbpPnBsme4FTv4zix/EbjrixkjszpNYWXKAjpxmoix78Ik2bbo86bRH AGjl6w1Q7qQDKtNJ/5PCTu8gfiOACHgnIVWde935MJLYDE6iD3Dxi8XPoFkmyg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1671426487; a=rsa-sha256; cv=none; b=JLvFIVo5psl10pcleYknnPfRpblmjT1Jk9haCCIHtxvkZ8X/TddOsOWZO/0AOxGMkl2uc8 w0ZaOIFWDTYBZJuTbgq4Ot+WcSBPo8Uw3wIP8L54pqIMLRC6M8cPx35W0tVJCpMr+7cTf7 8HyBQd+R7yLvz6r8wG8oAIWYohmIDT5346bFn7/5aWSSfW+loR6XkshZ2VXnNJuVnkwynp SLP+sSnFEc60JQkq0wB9xXlCWYTaVZmU7HNiLRj92xxRtHMkrGxmBUPThH2AkIBL9sqOQu EGGAYg8JXyo+4k9HdN90EhJP1DnPkFWW+Vqqaa7knMGr3QsT3oTX6BLhi0/V8A== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Nb7525zznzk5F; Mon, 19 Dec 2022 05:08:06 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 2BJ586PM081500; Mon, 19 Dec 2022 05:08:06 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 2BJ586uL081499; Mon, 19 Dec 2022 05:08:06 GMT (envelope-from git) Date: Mon, 19 Dec 2022 05:08:06 GMT Message-Id: <202212190508.2BJ586uL081499@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Lewis Cook Subject: git: b2dc69c0153f - main - security/osv-scanner: Vulnerability scanner written in Go which uses the OSV database List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: lcook X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: b2dc69c0153f1d16549950550a8aeafb78adeda0 Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by lcook: URL: https://cgit.FreeBSD.org/ports/commit/?id=b2dc69c0153f1d16549950550a8aeafb78adeda0 commit b2dc69c0153f1d16549950550a8aeafb78adeda0 Author: Lewis Cook AuthorDate: 2022-12-19 05:05:02 +0000 Commit: Lewis Cook CommitDate: 2022-12-19 05:07:06 +0000 security/osv-scanner: Vulnerability scanner written in Go which uses the OSV database Use OSV-Scanner to find existing vulnerabilities affecting your projects dependencies. OSV-Scanner provides an officially supported frontend to the OSV database that connects a projects list of dependencies with the vulnerabilities that affect them. Since the OSV.dev database is open source and distributed, it has several benefits in comparison with closed source advisory databases and scanners: * Each advisory comes from an open and authoritative source. * Anyone can suggest improvements to advisories, resulting in a very high quality database. * The OSV format unambiguously stores information about affected versions in a machine-readable format that precisely maps onto a developers list of packages. The above all results in fewer, more actionable vulnerability notifications, which reduces the time needed to resolve them. WWW: https://github.com/google/osv-scanner --- security/Makefile | 1 + security/osv-scanner/Makefile | 35 +++++++++++++++++++++++++++++++++++ security/osv-scanner/distinfo | 5 +++++ security/osv-scanner/pkg-descr | 18 ++++++++++++++++++ 4 files changed, 59 insertions(+) diff --git a/security/Makefile b/security/Makefile index 45dca716f0c4..fac5e5b6805e 100644 --- a/security/Makefile +++ b/security/Makefile @@ -423,6 +423,7 @@ SUBDIR += ossec-hids-server SUBDIR += ossec-hids-server-config SUBDIR += osslsigncode + SUBDIR += osv-scanner SUBDIR += otpw SUBDIR += owasp-dependency-check SUBDIR += p11-kit diff --git a/security/osv-scanner/Makefile b/security/osv-scanner/Makefile new file mode 100644 index 000000000000..4c2440900318 --- /dev/null +++ b/security/osv-scanner/Makefile @@ -0,0 +1,35 @@ +PORTNAME= osv-scanner +DISTVERSIONPREFIX= v +DISTVERSION= 1.0.1 +CATEGORIES= security + +MAINTAINER= lcook@FreeBSD.org +COMMENT= Vulnerability scanner written in Go which uses the OSV database +WWW= https://github.com/google/osv-scanner + +LICENSE= APACHE20 +LICENSE_FILE= ${WRKSRC}/LICENSE + +USES= go:modules + +_BUILD_VERSION= ${DISTVERSION} +_BUILD_COMMIT= ac28fb9 + +GO_MODULE= github.com/google/${PORTNAME} +GO_TARGET= ./cmd/${PORTNAME} +GO_BUILDFLAGS= -ldflags "\ + -s -w \ + -X main.version=${_BUILD_VERSION} \ + -X main.commit=${_BUILD_COMMIT}" + +PORTDOCS= README.md +PLIST_FILES= ${GO_TARGET:C/.\/cmd/bin/} + +OPTIONS_DEFINE= DOCS + +post-install-DOCS-on: + @${MKDIR} ${STAGEDIR}${DOCSDIR} + ${INSTALL_DATA} ${WRKSRC}/${PORTDOCS} \ + ${STAGEDIR}${DOCSDIR} + +.include diff --git a/security/osv-scanner/distinfo b/security/osv-scanner/distinfo new file mode 100644 index 000000000000..df1493dc740d --- /dev/null +++ b/security/osv-scanner/distinfo @@ -0,0 +1,5 @@ +TIMESTAMP = 1671425146 +SHA256 (go/security_osv-scanner/osv-scanner-v1.0.1/v1.0.1.mod) = 41cc1f1962a203e7608947fd522c919db6f412d9ac679a11992eda093f523380 +SIZE (go/security_osv-scanner/osv-scanner-v1.0.1/v1.0.1.mod) = 850 +SHA256 (go/security_osv-scanner/osv-scanner-v1.0.1/v1.0.1.zip) = 3267c46f44d241939baf5e855b0b74b8eb9a31e5bca0285e22f71204d0472b2b +SIZE (go/security_osv-scanner/osv-scanner-v1.0.1/v1.0.1.zip) = 169996 diff --git a/security/osv-scanner/pkg-descr b/security/osv-scanner/pkg-descr new file mode 100644 index 000000000000..647c27762382 --- /dev/null +++ b/security/osv-scanner/pkg-descr @@ -0,0 +1,18 @@ +Use OSV-Scanner to find existing vulnerabilities affecting your projects +dependencies. + +OSV-Scanner provides an officially supported frontend to the OSV database +that connects a projects list of dependencies with the vulnerabilities +that affect them. Since the OSV.dev database is open source and distributed, +it has several benefits in comparison with closed source advisory databases +and scanners: + +* Each advisory comes from an open and authoritative source. +* Anyone can suggest improvements to advisories, resulting in a very high + quality database. +* The OSV format unambiguously stores information about affected versions + in a machine-readable format that precisely maps onto a developers list + of packages. + +The above all results in fewer, more actionable vulnerability notifications, +which reduces the time needed to resolve them.