diff --git a/ee/spec/lib/gitlab/ci/templates/secure_binaries_ci_yaml_spec.rb b/ee/spec/lib/gitlab/ci/templates/secure_binaries_ci_yaml_spec.rb index 20b43261a2b6c39faa0e1e45eacf2af63d9a04da..0d055daffb68afa0d5d0a11aa76ccc5b8086b721 100644 --- a/ee/spec/lib/gitlab/ci/templates/secure_binaries_ci_yaml_spec.rb +++ b/ee/spec/lib/gitlab/ci/templates/secure_binaries_ci_yaml_spec.rb @@ -9,6 +9,136 @@ specify { expect(template).not_to be_nil } + describe 'template content' do + let(:secure_binaries) { YAML.safe_load(template.content) } + let(:secure_binaries_analyzers) { secure_binaries["variables"]["SECURE_BINARIES_ANALYZERS"].split(%r{\s*,\s*}) } + let(:secure_analyzers_prefix) { secure_binaries["variables"]["SECURE_ANALYZERS_PREFIX"] } + + context 'when compared to DAST-API template' do + let(:dast_api_template) { Gitlab::Template::GitlabCiYmlTemplate.find('DAST-API') } + let(:dast_api) { YAML.safe_load(dast_api_template.content) } + let(:dast_api_image_prefix) { dast_api["variables"]["SECURE_ANALYZERS_PREFIX"] } + let(:dast_api_image_version) { dast_api["variables"]["DAST_API_VERSION"] } + let(:dast_api_image_name) { dast_api["variables"]["DAST_API_IMAGE"] } + + it 'includes the same DAST API image prefix' do + expect(secure_analyzers_prefix).to eq(dast_api_image_prefix) + end + + it 'includes the DAST API image name in secure binary analyzers' do + expect(secure_binaries_analyzers).to include(dast_api_image_name) + end + + it 'includes a job named after the DAST API image name' do + expect(secure_binaries.has_key?(dast_api_image_name)).to be true + end + + it 'includes the same DAST API image version' do + version = secure_binaries[dast_api_image_name]["variables"]["SECURE_BINARIES_ANALYZER_VERSION"] + expect(version).to eq(dast_api_image_version) + end + + it 'filters the secure binary analyzers by the DAST API image name' do + only_variables = secure_binaries[dast_api_image_name]["only"]["variables"][0] + filter_expr = "$SECURE_BINARIES_ANALYZERS =~ /\\b#{dast_api_image_name}\\b/" + expect(only_variables).to include(filter_expr) + end + end + + context 'when compared to DAST-API.latest template' do + let(:dast_api_latest_template) { Gitlab::Template::GitlabCiYmlTemplate.find('DAST-API.latest') } + let(:dast_api_latest) { YAML.safe_load(dast_api_latest_template.content) } + let(:dast_api_latest_image_prefix) { dast_api_latest["variables"]["SECURE_ANALYZERS_PREFIX"] } + let(:dast_api_latest_image_version) { dast_api_latest["variables"]["DAST_API_VERSION"] } + let(:dast_api_latest_image_name) { dast_api_latest["variables"]["DAST_API_IMAGE"] } + + it 'includes the same DAST API image prefix' do + expect(secure_analyzers_prefix).to eq(dast_api_latest_image_prefix) + end + + it 'includes the DAST API image name in secure binary analyzers' do + expect(secure_binaries_analyzers).to include(dast_api_latest_image_name) + end + + it 'includes a job named after the DAST API image name' do + expect(secure_binaries.has_key?(dast_api_latest_image_name)).to be true + end + + it 'includes the same DAST API image version' do + version = secure_binaries[dast_api_latest_image_name]["variables"]["SECURE_BINARIES_ANALYZER_VERSION"] + expect(version).to eq(dast_api_latest_image_version) + end + + it 'filters the secure binary analyzers by the DAST API image name' do + only_variables = secure_binaries[dast_api_latest_image_name]["only"]["variables"][0] + filter_expr = "$SECURE_BINARIES_ANALYZERS =~ /\\b#{dast_api_latest_image_name}\\b/" + expect(only_variables).to include(filter_expr) + end + end + + context 'when compared to API-Fuzzing template' do + let(:api_fuzzing_template) { Gitlab::Template::GitlabCiYmlTemplate.find('API-Fuzzing') } + let(:api_fuzzing) { YAML.safe_load(api_fuzzing_template.content) } + let(:api_fuzzing_image_prefix) { api_fuzzing["variables"]["SECURE_ANALYZERS_PREFIX"] } + let(:api_fuzzing_image_version) { api_fuzzing["variables"]["FUZZAPI_VERSION"] } + let(:api_fuzzing_image_name) { api_fuzzing["variables"]["FUZZAPI_IMAGE"] } + + it 'includes the same API Fuzzing image prefix' do + expect(secure_analyzers_prefix).to eq(api_fuzzing_image_prefix) + end + + it 'includes the API Fuzzing image name in secure binary analyzers' do + expect(secure_binaries_analyzers).to include(api_fuzzing_image_name) + end + + it 'includes a job named after the API Fuzzing image name' do + expect(secure_binaries.has_key?(api_fuzzing_image_name)).to be true + end + + it 'includes the same API Fuzzing image version' do + version = secure_binaries[api_fuzzing_image_name]["variables"]["SECURE_BINARIES_ANALYZER_VERSION"] + expect(version).to eq(api_fuzzing_image_version) + end + + it 'filters the secure binary analyzers by the API Fuzzing image name' do + only_variables = secure_binaries[api_fuzzing_image_name]["only"]["variables"][0] + filter_expr = "$SECURE_BINARIES_ANALYZERS =~ /\\b#{api_fuzzing_image_name}\\b/" + expect(only_variables).to include(filter_expr) + end + end + + context 'when compared to API-Fuzzing.latest template' do + let(:api_fuzzing_latest_template) { Gitlab::Template::GitlabCiYmlTemplate.find('API-Fuzzing.latest') } + let(:api_fuzzing_latest) { YAML.safe_load(api_fuzzing_latest_template.content) } + let(:api_fuzzing_latest_image_prefix) { api_fuzzing_latest["variables"]["SECURE_ANALYZERS_PREFIX"] } + let(:api_fuzzing_latest_image_version) { api_fuzzing_latest["variables"]["FUZZAPI_VERSION"] } + let(:api_fuzzing_latest_image_name) { api_fuzzing_latest["variables"]["FUZZAPI_IMAGE"] } + + it 'includes the same API Fuzzing image prefix' do + expect(secure_analyzers_prefix).to eq(api_fuzzing_latest_image_prefix) + end + + it 'includes the API Fuzzing image name in secure binary analyzers' do + expect(secure_binaries_analyzers).to include(api_fuzzing_latest_image_name) + end + + it 'includes a job named after the API Fuzzing image name' do + expect(secure_binaries.has_key?(api_fuzzing_latest_image_name)).to be true + end + + it 'includes the same API Fuzzing image version' do + version = secure_binaries[api_fuzzing_latest_image_name]["variables"]["SECURE_BINARIES_ANALYZER_VERSION"] + expect(version).to eq(api_fuzzing_latest_image_version) + end + + it 'filters the secure binary analyzers by the API Fuzzing image name' do + only_variables = secure_binaries[api_fuzzing_latest_image_name]["only"]["variables"][0] + filter_expr = "$SECURE_BINARIES_ANALYZERS =~ /\\b#{api_fuzzing_latest_image_name}\\b/" + expect(only_variables).to include(filter_expr) + end + end + end + describe 'the created pipeline' do let_it_be(:project) { create(:project, :custom_repo, files: { 'README.txt' => '' }) } @@ -60,5 +190,19 @@ end end end + + describe 'api-security' do + let_it_be(:build_name) { 'api-security' } + let_it_be(:version) { 2 } + + it_behaves_like 'an offline image download job' do + it 'sets SECURE_BINARIES_ANALYZER_VERSION explicitly' do + api_security_analyzer_version = "2" + + expect(build.variables.to_hash).to include( + 'SECURE_BINARIES_ANALYZER_VERSION' => api_security_analyzer_version) + end + end + end end end diff --git a/lib/gitlab/ci/templates/Security/Secure-Binaries.gitlab-ci.yml b/lib/gitlab/ci/templates/Security/Secure-Binaries.gitlab-ci.yml index b34bfe2a53c41b0363c3c71c7de19e6cd24f6f4e..c414e70bfa3f4d4a2cb9a02f2172bae5745a419d 100644 --- a/lib/gitlab/ci/templates/Security/Secure-Binaries.gitlab-ci.yml +++ b/lib/gitlab/ci/templates/Security/Secure-Binaries.gitlab-ci.yml @@ -20,7 +20,7 @@ variables: SECURE_BINARIES_ANALYZERS: >- bandit, brakeman, gosec, spotbugs, flawfinder, phpcs-security-audit, security-code-scan, nodejs-scan, eslint, secrets, sobelow, pmd-apex, kics, kubesec, semgrep, gemnasium, gemnasium-maven, gemnasium-python, license-finder, - dast, dast-runner-validation, api-fuzzing + dast, dast-runner-validation, api-security SECURE_BINARIES_DOWNLOAD_IMAGES: "true" SECURE_BINARIES_PUSH_IMAGES: "true" @@ -252,11 +252,11 @@ dast-runner-validation: - $SECURE_BINARIES_DOWNLOAD_IMAGES == "true" && $SECURE_BINARIES_ANALYZERS =~ /\bdast-runner-validation\b/ -api-fuzzing: +api-security: extends: .download_images variables: - SECURE_BINARIES_ANALYZER_VERSION: "1" + SECURE_BINARIES_ANALYZER_VERSION: "2" only: variables: - $SECURE_BINARIES_DOWNLOAD_IMAGES == "true" && - $SECURE_BINARIES_ANALYZERS =~ /\bapi-fuzzing\b/ + $SECURE_BINARIES_ANALYZERS =~ /\bapi-security\b/