Skip to content

Commit a6ef9d7

Browse files
authored
Merge pull request #4026 from czoido/ar/audit-command
Audit docs
1 parent 44cab64 commit a6ef9d7

File tree

5 files changed

+171
-0
lines changed

5 files changed

+171
-0
lines changed

devops/audit.rst

+125
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,125 @@
1+
.. _devops_audit:
2+
3+
Checking package vulnerabilities
4+
================================
5+
6+
The ``conan audit`` command is used to check for known vulnerabilities in your Conan packages.
7+
8+
By default, Conan provides access to a ConanCenter provider, which is a public provider that checks
9+
for vulnerabilities in ConanCenter packages, which uses JFrog Advanced Security to scan packages.
10+
11+
12+
Requesting a token
13+
------------------
14+
15+
To use the command, you will first need to register for the free service in https://audit.conan.io/register and
16+
get a token to use the service. Upon registration, you can auth into the conancenter provider with your token with:
17+
18+
.. code-block:: bash
19+
20+
$ conan audit provider auth conancenter --token=<your_token>
21+
22+
23+
Scanning packages
24+
-----------------
25+
26+
Once you have authenticated, you can check for vulnerabilities in your packages with the
27+
``conan audit scan`` and ``conan audit list`` commands.
28+
29+
- ``conan audit scan`` will check for the vulnerabilities of the given package(s) and their dependencies.
30+
- ``conan audit list`` will list the vulnerabilities of the given package(s) without checking their dependencies.
31+
32+
.. code-block:: bash
33+
34+
$ conan audit list openssl/1.1.1w
35+
36+
Requesting vulnerability info for: openssl/1.1.1w
37+
38+
******************
39+
* openssl/1.1.1w *
40+
******************
41+
42+
2 vulnerabilities found:
43+
44+
- CVE-2023-5678 (Severity: Medium, CVSS: 5.3)
45+
46+
Issue summary: Generating excessively long X9.42 DH keys or checking
47+
excessively long X9.42 DH keys or parameters may be very slow. Impact summary:
48+
Applications that use the functions DH_generate_key() to generate an X9.42 DH
49+
key may exper...
50+
url: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
51+
52+
- CVE-2024-0727 (Severity: Medium, CVSS: 5.5)
53+
54+
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL
55+
to crash leading to a potential Denial of Service attack Impact summary:
56+
Applications loading files in the PKCS12 format from untrusted sources might
57+
terminate ...
58+
url: https://github.com/alexcrichton/openssl-src-rs/commit/add20f73b6b42be7451af2e1044d4e0e778992b2
59+
60+
Total vulnerabilities found: 2
61+
62+
63+
Summary:
64+
65+
- openssl/1.1.1w 2 vulnerabilities found
66+
67+
Vulnerability information provided by JFrog. Please check https://jfrog.com/advanced-security/ for more information.
68+
You can send questions and report issues about the returned vulnerabilities to [email protected].
69+
70+
71+
To scan the entire dependency graph of a package, the simplest way is using the ``conan audit scan`` command
72+
and providing a path to your conanfile, just as you would do with other Conan commands such as ``conan install``.
73+
74+
For example, for a project with a conanfile.txt:
75+
76+
.. code-block:: ini
77+
78+
[requires]
79+
libpng/1.5.30
80+
openssl/1.1.1w
81+
82+
83+
You can run:
84+
85+
.. code-block::
86+
87+
$ conan audit scan .
88+
89+
90+
Note that all of these commands support various output formats, such as JSON and HTML.
91+
92+
.. code-block::
93+
94+
$ conan audit scan . -f=html > report.html
95+
96+
This generates an HTML report with the vulnerabilities found in the given package(s) and their dependencies,
97+
which will look something like:
98+
99+
.. image:: ../images/devops/audit-report.png
100+
:width: 100%
101+
:align: center
102+
:alt: Conan audit report
103+
104+
.. _devops_audit_private_providers:
105+
106+
Adding private providers
107+
------------------------
108+
109+
You can add your own private providers to the list of providers used by the ``conan audit`` subcommands.
110+
For now, only JFrog Advanced Security providers are supported.
111+
112+
To add a provider, the recommended way is to first create a specific user in Artifactory to use as the read-only user,
113+
which can be given no extra permissions. Then, after creating an access token for the user, you can add the provider
114+
with the following command:
115+
116+
.. code-block:: bash
117+
118+
$ conan audit provider add myprovider --type=private --url=https://your.artifactory.url --token=<your_token>
119+
120+
121+
Note the ``--type=private`` argument, which specifies that the provider is a private provider, and that the supplied URL
122+
should be the base URL of the Artifactory instance.
123+
124+
With this, you can now use the provider with the ``conan audit scan`` and ``conan audit list`` commands, by specifying
125+
the provider name with the ``-p``/``--provider`` argument.

devops/devops.rst

+1
Original file line numberDiff line numberDiff line change
@@ -22,3 +22,4 @@ If you plan to use Conan in production in your project, team, or organization, t
2222
save_restore
2323
vendoring
2424
package_promotions
25+
audit

images/devops/audit-report.png

200 KB
Loading

reference/commands.rst

+2
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ and these :ref:`custom command examples <examples_extensions_custom_commands>`
1616
:maxdepth: 1
1717
:hidden:
1818

19+
commands/audit
1920
commands/cache
2021
commands/config
2122
commands/graph
@@ -30,6 +31,7 @@ and these :ref:`custom command examples <examples_extensions_custom_commands>`
3031
commands/search
3132
commands/version
3233

34+
- :doc:`conan audit <commands/audit>`: Check for vulnerabilities in your Conan packages
3335
- :doc:`conan cache <commands/cache>`: Return the path of recipes and packages in the cache
3436
- :doc:`conan config <commands/config>`: Manage Conan configuration (remotes, settings, plugins, etc)
3537
- :doc:`conan graph <commands/graph>`: Obtain information about the dependency graph without fetching binaries

reference/commands/audit.rst

+43
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
.. _reference_commands_audit:
2+
3+
conan audit
4+
===========
5+
6+
The ``conan audit`` command is used to check for known vulnerabilities in your Conan packages.
7+
8+
See :ref:`the audit devops page<devops_audit>` to see examples on how to use the ``conan audit`` command.
9+
10+
11+
conan audit scan
12+
================
13+
14+
.. autocommand::
15+
:command: conan audit scan -h
16+
17+
The ``conan audit scan`` checks for vulnerabilities in the given references and their transitive dependencies.
18+
This command receives configuration arguments such as profiles and settings, to control the expansion of the graph.
19+
20+
conan audit list
21+
================
22+
23+
.. autocommand::
24+
:command: conan audit list -h
25+
26+
The ``conan audit list`` command lists vulnerabilities for the given references, without checking their transitive dependencies.
27+
You can pass a single reference, or a pkglist file with multiple references.
28+
29+
conan audit provider
30+
====================
31+
32+
.. autocommand::
33+
:command: conan audit provider -h
34+
35+
The ``conan audit provider`` command manages the list of providers used to check for vulnerabilities.
36+
37+
By default the ``conan audit`` subcommands use the ConanCenter provider, but you can add your own providers to the list.
38+
For now, besides the default ConanCenter provider, only private JFrog Security providers are supported, see :ref:`the audit devops page<devops_audit_private_providers>` for more information.
39+
40+
There are 3 subcommands:
41+
- ``conan audit provider auth``: Authenticates a provider with a token.
42+
- ``conan audit provider add``: Adds a provider to the list.
43+
- ``conan audit provider remove``: Removes a provider from the list.

0 commit comments

Comments
 (0)