Skip to content

Commit 09a4fe1

Browse files
Docker Integration Update (#63)
Adds Docker integration to main pipeline, and adds documentation about new images on Docker Hub. Additionally, adds Docker build times for various projects. --------- Co-authored-by: Derin Gezgin <100523166+deringezgin@users.noreply.github.com> Co-authored-by: Derin Gezgin <dgezgin@conncoll.edu>
1 parent 67061ae commit 09a4fe1

196 files changed

Lines changed: 9071 additions & 27 deletions

File tree

  • data
    • Dockerfiles
      • DSpace_CVE-2025-53621_dspace-7.6.3/134
      • DSpace_CVE-2025-53622_dspace-7.6.3/133
      • DSpace__DSpace_CVE-2022-31192_5.10/88
      • DSpace__DSpace_CVE-2022-31194_5.10/37
      • DSpace__DSpace_CVE-2022-31195_5.10/35
      • ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1/23
      • ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1/82
      • Graylog2__graylog2-server_CVE-2023-41044_5.1.2/47
      • OWASP__json-sanitizer_CVE-2020-13973_1.2.0/78
      • OpenDJ_CVE-2025-27497_4.9.2/199
      • SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE/100
      • activemq-artemis_CVE-2025-27427_2.39.0/185
      • alibaba__nacos_CVE-2021-44667_2.0.3/80
      • alibaba__one-java-agent_CVE-2022-25842_0.0.1/26
      • allure2_CVE-2025-52888_2.34.0/144
      • apache__activemq_CVE-2014-3576_5.10.2/63
      • apache__activemq_CVE-2019-0222_5.15.8/101
      • apache__activemq_CVE-2020-11998_5.15.12/104
      • apache__axis-axis1-java_CVE-2023-51441_1.3.0/124
      • apache__dolphinscheduler_CVE-2022-26884_2.0.5/39
      • apache__dolphinscheduler_CVE-2022-34662_2.0.9/40
      • apache__dolphinscheduler_CVE-2023-49109_3.2.0/120
      • apache__dolphinscheduler_CVE-2023-51770_3.2.0/119
      • apache__dubbo_CVE-2021-30180_2.7.9/107
      • apache__incubator-dubbo_CVE-2021-30181_2.6.8/108
      • apache__jspwiki_CVE-2019-0225_2.11.0.M2/10
      • apache__jspwiki_CVE-2019-10076_2.11.0.M3/72
      • apache__jspwiki_CVE-2019-10077_2.11.0.M3/71
      • apache__jspwiki_CVE-2019-10078_2.11.0.M3/73
      • apache__jspwiki_CVE-2019-10089_2.11.0.M4/74
      • apache__jspwiki_CVE-2022-46907_2.11.3/95
      • apache__kafka_CVE-2025-27818_3.9.0/125
      • apache__kylin_CVE-2024-48944_5.0.0/123
      • apache__mina-sshd_CVE-2023-35887_2.9.2/48
      • apache__myfaces_CVE-2011-4367_2.0.11/27
      • apache__nifi_CVE-2022-33140_1.16.2/67
      • apache__rocketmq_CVE-2019-17572_4.6.0/15
      • apache__rocketmq_CVE-2023-33246_5.1.0/118
      • apache__rocketmq_CVE-2023-37582_4.9.6/116
      • apache__shiro_CVE-2023-34478_1.11.0/49
      • apache__shiro_CVE-2023-46749_1.12.0/54
      • apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0/55
      • apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8/87
      • apache__struts_CVE-2020-17530_2.5.25/103
      • apache__tika_CVE-2018-11762_1.18/8
      • apache__uima-uimaj_CVE-2022-32287_3.3.0/42
      • asf__commons-io_CVE-2021-29425_2.6/19
      • asf__commons-text_CVE-2022-42889_1.9/111
      • asf__cxf_CVE-2016-6812_3.0.11/86
      • asf__cxf_CVE-2019-17573_3.2.11/76
      • asf__james-project_CVE-2022-22931_3.6.0/21
      • asf__karaf_CVE-2022-22932_4.3.5/20
      • asf__nifi_CVE-2023-34468_1.21.0/115
      • asf__nifi_CVE-2023-36542_1.22.0/117
      • asf__tapestry-5_CVE-2019-0207_5.4.4/12
      • aws__aws-sdk-java_CVE-2022-31159_1.12.260/33
      • camel_CVE-2025-30177_camel-4.10.2/184
      • cassandra-lucene-index_CVE-2025-26511_cassandra-4.0.16-1.0.0/201
      • codecentric__spring-boot-admin_CVE-2022-46166_2.6.9/113
      • codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5/30
      • codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1/50
      • codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15/64
      • codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23/51
      • commons-beanutils_CVE-2025-48734_commons-beanutils-1.10.1-RC1/162
      • commons-fileupload_CVE-2025-48976_commons-fileupload-1.5-RC1/153
      • conductor_CVE-2025-26074_v3.21.12/141
      • console_CVE-2025-2901_v3.7.10/173
      • crate__crate_5.5.1_CVE-2023-51982_5.5.1/126
      • cuba_CVE-2025-32959_7.2.22/179
      • cxf_CVE-2025-23184_cxf-3.5.9/212
      • cxf_CVE-2025-48795_cxf-3.5.10/135
      • diffplug__goomph_CVE-2022-26049_3.37.1/38
      • djl_CVE-2025-0851_v0.30.0/208
      • dromara__hutool_CVE-2018-17297_4.1.11/7
      • eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5/44
      • eclipse__hawkbit_CVE-2020-27219_0.3.0M6/79
      • emissary_CVE-2025-27508_8.23.0/198
      • fabric8io__kubernetes-client_CVE-2021-4178_5.0.2/110
      • ff4j__ff4j_CVE-2022-44262_1.8.13/112
      • folio-org__spring-module-core_CVE-2022-4963_2.0.0/122
      • geoserver_CVE-2025-27505_2.26.2/157
      • geoserver_CVE-2025-30145_2.26.2/156
      • graylog2-server_CVE-2025-53106_6.2.3/140
      • hapifhir__org.hl7.fhir.core_CVE-2023-24057_5.6.91/45
      • hapifhir__org.hl7.fhir.core_CVE-2023-28465_5.6.105/46
      • hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final/75
      • incubator-seata_CVE-2025-32897_v2.2.0/143
      • inlong_CVE-2025-27522_2.1.0-RC0/166
      • inlong_CVE-2025-27526_2.1.0-RC0/164
      • inlong_CVE-2025-27528_2.1.0-RC0/165
      • inlong_CVE-2025-27531_2.0.0-RC0/159
      • iotdb_CVE-2025-26795_v1.3.3/170
      • iotdb_CVE-2025-26864_v1.3.3/171
      • jackrabbit_CVE-2025-53689_jackrabbit-2.23.1-beta/136
      • jeecgboot__jeecgboot_CVE-2022-45206_3.4.3/121
      • jena_CVE-2025-49656_jena-5.4.0/131
      • jenkins_CVE-2025-31720_prototype-1.7
      • jenkins_CVE-2025-31721_prototype-1.7
      • jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17/59
      • jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4/65
      • jenkinsci__perfecto-plugin_CVE-2020-2261_1.17/66
      • jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25/68
      • jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d/61
      • jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1/60
      • jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013/62
      • jeremylong__DependencyCheck_CVE-2018-12036_3.1.2/29
      • jetty.project_CVE-2025-1948_jetty-12.0.16/172
      • jlangch__venice_CVE-2022-36007_1.10.16/34
      • jmrozanec__cron-utils_CVE-2021-41269_9.1.5/102
      • joniles__mpxj_CVE-2020-35460_8.3.4/16
      • jpawebapi_CVE-2025-32961_v1.1.0/177
      • jstachio__jstachio_CVE-2023-33962_1.0.0/98
      • jte_CVE-2025-23026_3.1.15/213
      • junit-framework_CVE-2025-53103_r5.13.1/139
      • keycloak_CVE-2025-0604_26.1.2/195
      • keycloak_CVE-2025-1391_26.1.2/194
      • keycloak_CVE-2025-3501_26.2.1/175
      • keycloak_CVE-2025-3910_26.2.1/174
      • keycloak_CVE-2025-7365_26.0.12/129
      • keycloak_CVE-2025-7784_26.2.5/128
      • keycloak__keycloak_CVE-2014-3656_1.0.5.Final/85
      • keycloak__keycloak_CVE-2022-1274_20.0.4/90
      • keycloak__keycloak_CVE-2022-3782_20.0.1/43
      • keycloak__keycloak_CVE-2022-4137_20.0.4/89
      • keycloak__keycloak_CVE-2022-4361_21.1.1/96
      • kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1/18
      • kylin_CVE-2025-30067_kylin-5.0.1/187
      • local-s3_CVE-2025-27136_1.20/197
      • nahsra__antisamy_CVE-2016-10006_1.5.3/69
      • nahsra__antisamy_CVE-2017-14735_1.5.6/70
      • nahsra__antisamy_CVE-2022-28367_1.6.5/81
      • nahsra__antisamy_CVE-2022-29577_1.6.6.1/83
      • oic-auth-plugin_CVE-2025-24399_4.452.v2849b_d3945fa_/211
      • opencast_CVE-2025-54380_17.5/130
      • para_CVE-2025-48955_v1.50.7/161
      • para_CVE-2025-49009_v1.50.7/158
      • payara__Payara_CVE-2022-37422_5.2022.2/36
      • perwendel__spark_CVE-2016-9177_2.5.1/3
      • perwendel__spark_CVE-2018-9159_2.7.1/2
      • powsybl-core_CVE-2025-47293_v6.7.1/150
      • powsybl-core_CVE-2025-47771_v6.7.1/149
      • powsybl-core_CVE-2025-48058_v6.7.1/148
      • powsybl-core_CVE-2025-48059_v6.2.4/147
      • quarkus_CVE-2025-49574_3.23.4/145
      • restapi_CVE-2025-32960_v7.2.6/178
      • rhuss__jolokia_CVE-2018-1000129_1.4.0/84
      • simple-queue-plugin_CVE-2025-31723_simple-queue-1.4.6/183
      • smallrye-fault-tolerance_CVE-2025-2240_6.4.1/193
      • snowflake-jdbc_CVE-2025-24789_v3.21.1/210
      • snowflake-jdbc_CVE-2025-24790_v3.21.1/209
      • snowflake-jdbc_CVE-2025-27496_v3.23.0/192
      • solon_CVE-2025-1584_v3.0.8/200
      • solon_CVE-2025-46096_v3.1.2/154
      • spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE/14
      • spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE/13
      • spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6/106
      • spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE/105
      • spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE/109
      • spring-security_CVE-2025-22223_6.4.3/188
      • spring-security_CVE-2025-22228_6.3.7/190
      • square__retrofit_CVE-2018-1000850_2.4.0/9
      • srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2/25
      • syntax-markdown_CVE-2025-46558_syntax-markdown-8.8/176
      • templating-engine-plugin_CVE-2025-31722_2.5.3/180
      • undertow-io__undertow_CVE-2014-7816_1.0.16.Final/28
      • valtimo-backend-libraries_CVE-2025-48881_12.12.0.RELEASE/163
      • vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1/5
      • vert-x3__vertx-web_CVE-2019-17640_3.9.3/22
      • webdrivermanager_CVE-2025-4641_webdrivermanager-6.0.1/169
      • whitesource__curekit_CVE-2022-23082_1.1.3/32
      • wildfly-core_CVE-2025-23367_27.0.0.Beta7/207
      • wildfly__wildfly_CVE-2018-1047_11.0.0.Final/4
      • x-stream__xstream_CVE-2013-7285_1.4.6/56
      • x-stream__xstream_CVE-2020-26217_1.4.14-java7/57
      • x-stream__xstream_CVE-2021-21345_1.4.15/58
      • xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1/114
      • xuxueli__xxl-job_CVE-2020-29204_2.2.0/77
      • xwiki__xwiki-commons_CVE-2022-24897_12.6.6/24
      • xwiki__xwiki-commons_CVE-2023-29201_14.6/91
      • xwiki__xwiki-commons_CVE-2023-29528_14.9-rc-1/92
      • xwiki__xwiki-commons_CVE-2023-31126_14.10.3/94
      • xwiki__xwiki-commons_CVE-2023-36471_14.10.5/97
      • xwiki__xwiki-rendering_CVE-2023-32070_14.6/93
      • xwiki__xwiki-rendering_CVE-2023-37908_14.10.3/99
      • yamcs__yamcs_CVE-2023-45277_5.8.6/53
      • yamcs__yamcs_CVE-2023-45278_5.8.6/52
      • zeroturnaround__zt-zip_CVE-2018-1002201_1.12/31
      • zohoqengine-plugin_CVE-2025-30197_1.0.29.vfa_cc23396502/191
  • docs/architecture
  • scripts

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

Dockerfile

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ RUN apt-get update && apt-get install -y \
2020
apt-transport-https \
2121
ca-certificates \
2222
lsb-release \
23+
docker.io \
2324
&& rm -rf /var/lib/apt/lists/*
2425

2526
# Add OpenJDK repository and install OpenJDK versions

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
⚠️ Code and data for the [ICLR 2025 Paper](https://arxiv.org/pdf/2405.17238) can be found in the v1 branch, license and citation below.
1111

1212
## 📰 News
13+
* **[Sep. 24, 2025]**: Added Docker integration for the main IRIS pipeline, released images for 189 CWE-Bench-Java CVEs on the [IRIS Docker Hub](https://hub.docker.com/r/irissast/cwe-bench-java-containers).
1314
* **[Aug. 30, 2025]**: Updated CWE-Bench-Java with 93 new CVEs and 38 CWEs.
1415
* **[Jul. 10, 2025]**: IRIS v2 released, added support for 7 new CWEs.
1516

@@ -138,6 +139,7 @@ python src/iris.py --query cwe-022wLLM --run-id test --llm qwen2.5-coder-7b perw
138139
```
139140

140141
This will build the project, generate the CodeQL database, and analyze it for CWE-022 vulnerabilities using the specified LLM (qwen2.5-coder-7b). The output of these three steps will be stored under `data/build-info/`, `data/codeql-dbs/`, and `output/` respectively.
142+
Additionally, you can download an image from CWE-Bench-Java from our [Docker Hub](https://hub.docker.com/r/irissast/cwe-bench-java-containers), and use the ```--use-container" flag to run IRIS from a Docker container. You can use this flag with other Docker images as well.
141143

142144
## 💫 Contributions
143145
We welcome any contributions, pull requests, or issues!
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
FROM eclipse-temurin:17-jdk AS builder
2+
LABEL org.opencontainers.image.source="https://github.com/DSpace/DSpace"
3+
LABEL org.opencontainers.image.description="Build environment for DSpace_CVE-2025-53621_dspace-7.6.3 (134)"
4+
LABEL org.opencontainers.image.title="DSpace_CVE-2025-53621_dspace-7.6.3:134"
5+
LABEL com.dataset.cve_id="CVE-2025-53621"
6+
LABEL com.dataset.cwe_id="CWE-611"
7+
LABEL com.dataset.cwe_name="CWE-611: Improper Restriction of XML External Entity Reference"
8+
LABEL com.dataset.advisory_id="GHSA-jjwr-5cfh-7xwh"
9+
LABEL com.dataset.project_slug="DSpace_CVE-2025-53621_dspace-7.6.3"
10+
LABEL com.dataset.status="success"
11+
WORKDIR /workspace
12+
RUN set -eux; \
13+
if ! command -v git >/dev/null 2>&1; then \
14+
apt-get update && apt-get install -y --no-install-recommends git ca-certificates && rm -rf /var/lib/apt/lists/*; \
15+
fi
16+
17+
# Install Maven 3.8.1
18+
RUN set -eux; \
19+
apt-get update && apt-get install -y --no-install-recommends wget && \
20+
wget -O /tmp/maven.tar.gz https://archive.apache.org/dist/maven/maven-3/3.8.1/binaries/apache-maven-3.8.1-bin.tar.gz && \
21+
tar -xzf /tmp/maven.tar.gz -C /opt && \
22+
ln -s /opt/apache-maven-* /opt/maven && \
23+
rm /tmp/maven.tar.gz && \
24+
apt-get remove -y wget && \
25+
apt-get autoremove -y && \
26+
rm -rf /var/lib/apt/lists/*
27+
ENV PATH=/opt/maven/bin:$PATH
28+
29+
# Clone and checkout the desired revision
30+
ARG GIT_URL=https://github.com/DSpace/DSpace
31+
ARG GIT_URL
32+
ARG GIT_TAG=dspace-7.6.3
33+
ARG GIT_COMMIT=24357bdd9cf3bd05e4336d0c2d8a0cc7a2932417
34+
RUN set -eux; \
35+
git clone "$GIT_URL" repo; \
36+
cd repo; \
37+
if [ -n "$GIT_COMMIT" ]; then git checkout "$GIT_COMMIT"; elif [ -n "$GIT_TAG" ]; then git checkout "$GIT_TAG"; fi
38+
39+
# Prepare Maven local repository to avoid corrupted artifacts
40+
RUN set -eux; rm -rf /root/.m2/repository || true
41+
# Use Maven with debug logging and increased memory
42+
RUN set -eux; cd /workspace/repo; \
43+
export MAVEN_OPTS='-Xmx2g -XX:+UseG1GC'; \
44+
mvn -B -e -X -U -DskipTests package || \
45+
(echo 'First build failed, retrying with clean...' && mvn clean && mvn -B -e -X -U -DskipTests package)
46+
47+
# Use the builder stage as final image (contains sources and built artifacts)
48+
FROM scratch AS artifact
49+
COPY --from=builder /workspace/repo /repo
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
FROM eclipse-temurin:17-jdk AS builder
2+
LABEL org.opencontainers.image.source="https://github.com/DSpace/DSpace"
3+
LABEL org.opencontainers.image.description="Build environment for DSpace_CVE-2025-53622_dspace-7.6.3 (133)"
4+
LABEL org.opencontainers.image.title="DSpace_CVE-2025-53622_dspace-7.6.3:133"
5+
LABEL com.dataset.cve_id="CVE-2025-53622"
6+
LABEL com.dataset.cwe_id="CWE-22"
7+
LABEL com.dataset.cwe_name="CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
8+
LABEL com.dataset.advisory_id="GHSA-vhvx-8xgc-99wf"
9+
LABEL com.dataset.project_slug="DSpace_CVE-2025-53622_dspace-7.6.3"
10+
LABEL com.dataset.status="success"
11+
WORKDIR /workspace
12+
RUN set -eux; \
13+
if ! command -v git >/dev/null 2>&1; then \
14+
apt-get update && apt-get install -y --no-install-recommends git ca-certificates && rm -rf /var/lib/apt/lists/*; \
15+
fi
16+
17+
# Install Maven 3.8.7
18+
RUN set -eux; \
19+
apt-get update && apt-get install -y --no-install-recommends wget && \
20+
wget -O /tmp/maven.tar.gz https://archive.apache.org/dist/maven/maven-3/3.8.7/binaries/apache-maven-3.8.7-bin.tar.gz && \
21+
tar -xzf /tmp/maven.tar.gz -C /opt && \
22+
ln -s /opt/apache-maven-* /opt/maven && \
23+
rm /tmp/maven.tar.gz && \
24+
apt-get remove -y wget && \
25+
apt-get autoremove -y && \
26+
rm -rf /var/lib/apt/lists/*
27+
ENV PATH=/opt/maven/bin:$PATH
28+
29+
# Clone and checkout the desired revision
30+
ARG GIT_URL=https://github.com/DSpace/DSpace
31+
ARG GIT_URL
32+
ARG GIT_TAG=dspace-7.6.3
33+
ARG GIT_COMMIT=4da8ed69f44786dc33a3dd9a62ee719a51a4830e
34+
RUN set -eux; \
35+
git clone "$GIT_URL" repo; \
36+
cd repo; \
37+
if [ -n "$GIT_COMMIT" ]; then git checkout "$GIT_COMMIT"; elif [ -n "$GIT_TAG" ]; then git checkout "$GIT_TAG"; fi
38+
39+
# Prepare Maven local repository to avoid corrupted artifacts
40+
RUN set -eux; rm -rf /root/.m2/repository || true
41+
# Use Maven with debug logging and increased memory
42+
RUN set -eux; cd /workspace/repo; \
43+
export MAVEN_OPTS='-Xmx2g -XX:+UseG1GC'; \
44+
mvn -B -e -X -U -DskipTests package || \
45+
(echo 'First build failed, retrying with clean...' && mvn clean && mvn -B -e -X -U -DskipTests package)
46+
47+
# Use the builder stage as final image (contains sources and built artifacts)
48+
FROM scratch AS artifact
49+
COPY --from=builder /workspace/repo /repo
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
FROM eclipse-temurin:8-jdk AS builder
2+
LABEL org.opencontainers.image.source="https://github.com/DSpace/DSpace"
3+
LABEL org.opencontainers.image.description="Build environment for DSpace__DSpace_CVE-2022-31192_5.10 (88)"
4+
LABEL org.opencontainers.image.title="DSpace__DSpace_CVE-2022-31192_5.10:88"
5+
LABEL com.dataset.cve_id="CVE-2022-31192"
6+
LABEL com.dataset.cwe_id="CWE-079"
7+
LABEL com.dataset.cwe_name="Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
8+
LABEL com.dataset.advisory_id="GHSA-4wm8-c2vv-xrpq"
9+
LABEL com.dataset.project_slug="DSpace__DSpace_CVE-2022-31192_5.10"
10+
LABEL com.dataset.status="success"
11+
WORKDIR /workspace
12+
RUN set -eux; \
13+
if ! command -v git >/dev/null 2>&1; then \
14+
apt-get update && apt-get install -y --no-install-recommends git ca-certificates && rm -rf /var/lib/apt/lists/*; \
15+
fi
16+
17+
# Install Maven 3.5.0
18+
RUN set -eux; \
19+
apt-get update && apt-get install -y --no-install-recommends wget && \
20+
wget -O /tmp/maven.tar.gz https://archive.apache.org/dist/maven/maven-3/3.5.0/binaries/apache-maven-3.5.0-bin.tar.gz && \
21+
tar -xzf /tmp/maven.tar.gz -C /opt && \
22+
ln -s /opt/apache-maven-* /opt/maven && \
23+
rm /tmp/maven.tar.gz && \
24+
apt-get remove -y wget && \
25+
apt-get autoremove -y && \
26+
rm -rf /var/lib/apt/lists/*
27+
ENV PATH=/opt/maven/bin:$PATH
28+
29+
# Clone and checkout the desired revision
30+
ARG GIT_URL=https://github.com/DSpace/DSpace
31+
ARG GIT_URL
32+
ARG GIT_TAG=5.10
33+
ARG GIT_COMMIT=eca7968be7d6b9f8f5f302c9fc09f8186ed4809e
34+
RUN set -eux; \
35+
git clone "$GIT_URL" repo; \
36+
cd repo; \
37+
if [ -n "$GIT_COMMIT" ]; then git checkout "$GIT_COMMIT"; elif [ -n "$GIT_TAG" ]; then git checkout "$GIT_TAG"; fi
38+
39+
# Prepare Maven local repository to avoid corrupted artifacts
40+
RUN set -eux; rm -rf /root/.m2/repository || true
41+
# Use Maven
42+
RUN set -eux; cd /workspace/repo; mvn -B -e -U -DskipTests package
43+
44+
# Use the builder stage as final image (contains sources and built artifacts)
45+
FROM scratch AS artifact
46+
COPY --from=builder /workspace/repo /repo
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
FROM eclipse-temurin:8-jdk AS builder
2+
LABEL org.opencontainers.image.source="https://github.com/DSpace/DSpace"
3+
LABEL org.opencontainers.image.description="Build environment for DSpace__DSpace_CVE-2022-31194_5.10 (37)"
4+
LABEL org.opencontainers.image.title="DSpace__DSpace_CVE-2022-31194_5.10:37"
5+
LABEL com.dataset.cve_id="CVE-2022-31194"
6+
LABEL com.dataset.cwe_id="CWE-022"
7+
LABEL com.dataset.cwe_name="Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
8+
LABEL com.dataset.advisory_id="GHSA-qp5m-c3m9-8q2p"
9+
LABEL com.dataset.project_slug="DSpace__DSpace_CVE-2022-31194_5.10"
10+
LABEL com.dataset.status="success"
11+
WORKDIR /workspace
12+
RUN set -eux; \
13+
if ! command -v git >/dev/null 2>&1; then \
14+
apt-get update && apt-get install -y --no-install-recommends git ca-certificates && rm -rf /var/lib/apt/lists/*; \
15+
fi
16+
17+
# Install Maven 3.5.0
18+
RUN set -eux; \
19+
apt-get update && apt-get install -y --no-install-recommends wget && \
20+
wget -O /tmp/maven.tar.gz https://archive.apache.org/dist/maven/maven-3/3.5.0/binaries/apache-maven-3.5.0-bin.tar.gz && \
21+
tar -xzf /tmp/maven.tar.gz -C /opt && \
22+
ln -s /opt/apache-maven-* /opt/maven && \
23+
rm /tmp/maven.tar.gz && \
24+
apt-get remove -y wget && \
25+
apt-get autoremove -y && \
26+
rm -rf /var/lib/apt/lists/*
27+
ENV PATH=/opt/maven/bin:$PATH
28+
29+
# Clone and checkout the desired revision
30+
ARG GIT_URL=https://github.com/DSpace/DSpace
31+
ARG GIT_URL
32+
ARG GIT_TAG=5.10
33+
ARG GIT_COMMIT=eca7968be7d6b9f8f5f302c9fc09f8186ed4809e
34+
RUN set -eux; \
35+
git clone "$GIT_URL" repo; \
36+
cd repo; \
37+
if [ -n "$GIT_COMMIT" ]; then git checkout "$GIT_COMMIT"; elif [ -n "$GIT_TAG" ]; then git checkout "$GIT_TAG"; fi
38+
39+
# Prepare Maven local repository to avoid corrupted artifacts
40+
RUN set -eux; rm -rf /root/.m2/repository || true
41+
# Use Maven
42+
RUN set -eux; cd /workspace/repo; mvn -B -e -U -DskipTests package
43+
44+
# Use the builder stage as final image (contains sources and built artifacts)
45+
FROM scratch AS artifact
46+
COPY --from=builder /workspace/repo /repo
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
FROM eclipse-temurin:8-jdk AS builder
2+
LABEL org.opencontainers.image.source="https://github.com/DSpace/DSpace"
3+
LABEL org.opencontainers.image.description="Build environment for DSpace__DSpace_CVE-2022-31195_5.10 (35)"
4+
LABEL org.opencontainers.image.title="DSpace__DSpace_CVE-2022-31195_5.10:35"
5+
LABEL com.dataset.cve_id="CVE-2022-31195"
6+
LABEL com.dataset.cwe_id="CWE-022"
7+
LABEL com.dataset.cwe_name="Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
8+
LABEL com.dataset.advisory_id="GHSA-8rmh-55h4-93h5"
9+
LABEL com.dataset.project_slug="DSpace__DSpace_CVE-2022-31195_5.10"
10+
LABEL com.dataset.status="success"
11+
WORKDIR /workspace
12+
RUN set -eux; \
13+
if ! command -v git >/dev/null 2>&1; then \
14+
apt-get update && apt-get install -y --no-install-recommends git ca-certificates && rm -rf /var/lib/apt/lists/*; \
15+
fi
16+
17+
# Install Maven 3.5.0
18+
RUN set -eux; \
19+
apt-get update && apt-get install -y --no-install-recommends wget && \
20+
wget -O /tmp/maven.tar.gz https://archive.apache.org/dist/maven/maven-3/3.5.0/binaries/apache-maven-3.5.0-bin.tar.gz && \
21+
tar -xzf /tmp/maven.tar.gz -C /opt && \
22+
ln -s /opt/apache-maven-* /opt/maven && \
23+
rm /tmp/maven.tar.gz && \
24+
apt-get remove -y wget && \
25+
apt-get autoremove -y && \
26+
rm -rf /var/lib/apt/lists/*
27+
ENV PATH=/opt/maven/bin:$PATH
28+
29+
# Clone and checkout the desired revision
30+
ARG GIT_URL=https://github.com/DSpace/DSpace
31+
ARG GIT_URL
32+
ARG GIT_TAG=5.10
33+
ARG GIT_COMMIT=eca7968be7d6b9f8f5f302c9fc09f8186ed4809e
34+
RUN set -eux; \
35+
git clone "$GIT_URL" repo; \
36+
cd repo; \
37+
if [ -n "$GIT_COMMIT" ]; then git checkout "$GIT_COMMIT"; elif [ -n "$GIT_TAG" ]; then git checkout "$GIT_TAG"; fi
38+
39+
# Prepare Maven local repository to avoid corrupted artifacts
40+
RUN set -eux; rm -rf /root/.m2/repository || true
41+
# Use Maven
42+
RUN set -eux; cd /workspace/repo; mvn -B -e -U -DskipTests package
43+
44+
# Use the builder stage as final image (contains sources and built artifacts)
45+
FROM scratch AS artifact
46+
COPY --from=builder /workspace/repo /repo
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
FROM eclipse-temurin:8-jdk AS builder
2+
LABEL org.opencontainers.image.source="https://github.com/ESAPI/esapi-java-legacy"
3+
LABEL org.opencontainers.image.description="Build environment for ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1 (23)"
4+
LABEL org.opencontainers.image.title="ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1:23"
5+
LABEL com.dataset.cve_id="CVE-2022-23457"
6+
LABEL com.dataset.cwe_id="CWE-022"
7+
LABEL com.dataset.cwe_name="Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
8+
LABEL com.dataset.advisory_id="GHSA-8m5h-hrqm-pxm2"
9+
LABEL com.dataset.project_slug="ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1"
10+
LABEL com.dataset.status="success"
11+
WORKDIR /workspace
12+
RUN set -eux; \
13+
if ! command -v git >/dev/null 2>&1; then \
14+
apt-get update && apt-get install -y --no-install-recommends git ca-certificates && rm -rf /var/lib/apt/lists/*; \
15+
fi
16+
17+
# Install Maven 3.5.0
18+
RUN set -eux; \
19+
apt-get update && apt-get install -y --no-install-recommends wget && \
20+
wget -O /tmp/maven.tar.gz https://archive.apache.org/dist/maven/maven-3/3.5.0/binaries/apache-maven-3.5.0-bin.tar.gz && \
21+
tar -xzf /tmp/maven.tar.gz -C /opt && \
22+
ln -s /opt/apache-maven-* /opt/maven && \
23+
rm /tmp/maven.tar.gz && \
24+
apt-get remove -y wget && \
25+
apt-get autoremove -y && \
26+
rm -rf /var/lib/apt/lists/*
27+
ENV PATH=/opt/maven/bin:$PATH
28+
29+
# Clone and checkout the desired revision
30+
ARG GIT_URL=https://github.com/ESAPI/esapi-java-legacy
31+
ARG GIT_URL
32+
ARG GIT_TAG=2.2.3.1
33+
ARG GIT_COMMIT=2e8694c6beb3bdbb2645b882eba72ce41bc63242
34+
RUN set -eux; \
35+
git clone "$GIT_URL" repo; \
36+
cd repo; \
37+
if [ -n "$GIT_COMMIT" ]; then git checkout "$GIT_COMMIT"; elif [ -n "$GIT_TAG" ]; then git checkout "$GIT_TAG"; fi
38+
39+
# Prepare Maven local repository to avoid corrupted artifacts
40+
RUN set -eux; rm -rf /root/.m2/repository || true
41+
# Use Maven
42+
RUN set -eux; cd /workspace/repo; mvn -B -e -U -DskipTests package
43+
44+
# Use the builder stage as final image (contains sources and built artifacts)
45+
FROM scratch AS artifact
46+
COPY --from=builder /workspace/repo /repo
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
FROM eclipse-temurin:8-jdk AS builder
2+
LABEL org.opencontainers.image.source="https://github.com/ESAPI/esapi-java-legacy"
3+
LABEL org.opencontainers.image.description="Build environment for ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1 (82)"
4+
LABEL org.opencontainers.image.title="ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1:82"
5+
LABEL com.dataset.cve_id="CVE-2022-24891"
6+
LABEL com.dataset.cwe_id="CWE-079"
7+
LABEL com.dataset.cwe_name="Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
8+
LABEL com.dataset.advisory_id="GHSA-q77q-vx4q-xx6q"
9+
LABEL com.dataset.project_slug="ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1"
10+
LABEL com.dataset.status="success"
11+
WORKDIR /workspace
12+
RUN set -eux; \
13+
if ! command -v git >/dev/null 2>&1; then \
14+
apt-get update && apt-get install -y --no-install-recommends git ca-certificates && rm -rf /var/lib/apt/lists/*; \
15+
fi
16+
17+
# Install Maven 3.5.0
18+
RUN set -eux; \
19+
apt-get update && apt-get install -y --no-install-recommends wget && \
20+
wget -O /tmp/maven.tar.gz https://archive.apache.org/dist/maven/maven-3/3.5.0/binaries/apache-maven-3.5.0-bin.tar.gz && \
21+
tar -xzf /tmp/maven.tar.gz -C /opt && \
22+
ln -s /opt/apache-maven-* /opt/maven && \
23+
rm /tmp/maven.tar.gz && \
24+
apt-get remove -y wget && \
25+
apt-get autoremove -y && \
26+
rm -rf /var/lib/apt/lists/*
27+
ENV PATH=/opt/maven/bin:$PATH
28+
29+
# Clone and checkout the desired revision
30+
ARG GIT_URL=https://github.com/ESAPI/esapi-java-legacy
31+
ARG GIT_URL
32+
ARG GIT_TAG=2.2.3.1
33+
ARG GIT_COMMIT=2e8694c6beb3bdbb2645b882eba72ce41bc63242
34+
RUN set -eux; \
35+
git clone "$GIT_URL" repo; \
36+
cd repo; \
37+
if [ -n "$GIT_COMMIT" ]; then git checkout "$GIT_COMMIT"; elif [ -n "$GIT_TAG" ]; then git checkout "$GIT_TAG"; fi
38+
39+
# Prepare Maven local repository to avoid corrupted artifacts
40+
RUN set -eux; rm -rf /root/.m2/repository || true
41+
# Use Maven
42+
RUN set -eux; cd /workspace/repo; mvn -B -e -U -DskipTests package
43+
44+
# Use the builder stage as final image (contains sources and built artifacts)
45+
FROM scratch AS artifact
46+
COPY --from=builder /workspace/repo /repo

0 commit comments

Comments
 (0)