# the first run with it takes very long time, it seems a local database with signatures to check against is build up. further runs are much faster. how does this work out in CI builds e.g. in github actions? do we need to apply special caching rules to not delay every CI build by a long time?
# even when excluding provided and runtime scope we get lots of vulnerability reports about outdated sling, commons etc. dependencies we compile against (because we are compatible down to AEM 6.4), but which are never used at runtime with a properly set up AEM instance. do we have to exclude those all manually (it’s a [long list|https://wcm.io/tooling/maven/aem-dependencies.html]), do you have a recommendation?
> Introduce OWASP Dependency Check using dependency-check-maven plugin
the point is, we have always some compile dependencies for 3rdparty bundles that ship with AEM that are not part of the uber JAR/aem-sdk JAR. defined those with compile scope this is not required for OSGi, but important for unit testing. if we would set those dependencies only to “provided” users that use those bundles in their projects would need to add the dependencies themselves with test scope for unit test involving those bundles. maybe the actual project listed above has some dependencies we can get rid off after raising the min. AEM version to 6.4, but still i assume there will be some leftovers we need to suppress manually as we only compile against them, but not actually ship them.
Konrad Windszus (JIRA)
unread,
May 13, 2021, 8:01:45 AM5/13/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
Konrad Windszus commented on WTOOL-74:
--------------------------------------
Transitive dependencies are indeed an issue with unit testing when using “provided” scope. I don’t have a better solution, though. I think none of the other dependency elements ([https://maven.apache.org/pom.html#Dependencies|https://maven.apache.org/pom.html#Dependencies|smart-link] ) can be leveraged to distinguish between dependencies which are embedded/internalized vs. dependencies which are referenced externally.
> Introduce OWASP Dependency Check using dependency-check-maven plugin
> --------------------------------------------------------------------
>
> Key: WTOOL-74
> URL: https://wcm-io.atlassian.net/browse/WTOOL-74 > Project: wcm.io Tooling
> Issue Type: Task
> Components: Maven
> Reporter: Stefan Seifert
> Priority: Minor
>
> as proposed by [~accountid:557058:f5965e95-7a1a-4775-9001-be94a80bef00] we should introduce the [dependency-check-maven|https://jeremylong.github.io/DependencyCheck/dependency-check-maven/] plugin into our builds, ideally for all wcm.io modules.
> it scans poth Maven and NPM dependencies and reports known vulnerabilities.
--
This message was sent by Atlassian Jira
(v1001.0.0-SNAPSHOT#100160)
Konrad Windszus (JIRA)
unread,
May 13, 2021, 8:04:15 AM5/13/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
Konrad Windszus edited comment on WTOOL-74 at 5/13/21 12:04 PM:
----------------------------------------------------------------
Transitive dependencies are indeed an issue with unit testing when using “provided” scope. I don’t have a better solution, though. I think none of the other dependency elements ([https://maven.apache.org/pom.html#Dependencies|https://maven.apache.org/pom.html#Dependencies|smart-link] ) can be leveraged to distinguish between dependencies which are embedded/internalized vs. dependencies which are referenced externally.
Transitive dependencies are indeed an issue with unit testing when using “provided” scope. I don’t have a better solution, though. I think none of the other dependency elements ([https://maven.apache.org/pom.html#Dependencies|https://maven.apache.org/pom.html#Dependencies|smart-link] ) can be leveraged to distinguish between dependencies which are embedded/internalized vs. dependencies which are referenced externally.
with this it’s easy to activate it for further modules later.
> Introduce OWASP Dependency Check using dependency-check-maven plugin
> --------------------------------------------------------------------
>
> Key: WTOOL-74
> URL: https://wcm-io.atlassian.net/browse/WTOOL-74 > Project: wcm.io Tooling
> Issue Type: Task
> Components: Maven
> Reporter: Stefan Seifert
> Priority: Minor
>
> as proposed by [~accountid:557058:f5965e95-7a1a-4775-9001-be94a80bef00] we should introduce the [dependency-check-maven|https://jeremylong.github.io/DependencyCheck/dependency-check-maven/] plugin into our builds, ideally for all wcm.io modules.
> it scans poth Maven and NPM dependencies and reports known vulnerabilities.
--
This message was sent by Atlassian Jira
(v1001.0.0-SNAPSHOT#100165)
Stefan Seifert (JIRA)
unread,
Jun 1, 2021, 3:38:17 PM6/1/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message