Skip to content

Commit 74aef95

Browse files
committed
Updated according to fortify-ssc-parser-util refactoring
1 parent fadb1d7 commit 74aef95

File tree

3 files changed

+14
-7
lines changed

3 files changed

+14
-7
lines changed

build.gradle

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@ if (!project.hasProperty('release')) {
2323
}
2424

2525
repositories {
26+
mavenLocal()
2627
// repository with fortify artifacts
2728
maven { url "http://dl.bintray.com/fortify/maven-public" }
2829
// repository with fortify-ps releases
2930
maven { url "https://dl.bintray.com/fortify-ps/maven" }
3031
// repository with fortify-ps snapshots
3132
maven { url "https://oss.jfrog.org/artifactory/oss-snapshot-local" }
32-
mavenLocal()
3333
mavenCentral()
3434
}
3535

@@ -38,6 +38,11 @@ configurations {
3838
compile.extendsFrom (compileExport)
3939
}
4040

41+
configurations.all {
42+
// Don't cache modules that may change (i.e. snapshots)
43+
resolutionStrategy.cacheChangingModulesFor 0, 'seconds'
44+
}
45+
4146
test {
4247
useJUnitPlatform()
4348
}
@@ -47,7 +52,7 @@ dependencies {
4752
compile 'com.fortify.plugin:plugin-api:1.0.1'
4853
compile 'org.slf4j:slf4j-api:1.7.21'
4954

50-
compileExport(group: 'com.fortify.ssc.parser.util', name: 'fortify-ssc-parser-util', version:'1.0.1-SNAPSHOT') { transitive = true }
55+
compileExport(group: 'com.fortify.ssc.parser.util', name: 'fortify-ssc-parser-util', version:'1.1.0-SNAPSHOT', changing: true) { transitive = true }
5156

5257
//testImplementation 'org.junit.platform:junit-jupiter-api:5.3.1'
5358

src/main/java/com/fortify/ssc/parser/owasp/dependencycheck/parser/ScanParser.java

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,6 @@
22

33
import java.io.IOException;
44

5-
import static com.fortify.util.json.AbstractStreamingJsonParser.countArrayEntries;
6-
75
import com.fortify.plugin.api.ScanBuilder;
86
import com.fortify.plugin.api.ScanData;
97
import com.fortify.plugin.api.ScanParsingException;
@@ -25,7 +23,7 @@ public final void parse() throws ScanParsingException, IOException {
2523
.handler("/projectInfo/reportDate", jp -> scanBuilder.setScanDate(DateConverter.getInstance().convert(jp.getValueAsString())))
2624
.handler("/projectInfo/name", jp -> scanBuilder.setBuildId(jp.getValueAsString()))
2725
.handler("/projectInfo/version", jp -> scanBuilder.setScanLabel(jp.getValueAsString()))
28-
.handler("/dependencies", jp -> scanBuilder.setNumFiles(countArrayEntries(jp)))
26+
.handler("/dependencies", jp -> scanBuilder.setNumFiles(jp.countArrayEntries()))
2927
.parse(scanData);
3028
scanBuilder.completeScan();
3129
}

src/main/java/com/fortify/ssc/parser/owasp/dependencycheck/parser/VulnerabilitiesParser.java

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
import com.fortify.ssc.parser.owasp.dependencycheck.domain.Dependency;
1919
import com.fortify.ssc.parser.owasp.dependencycheck.domain.Vulnerability;
2020
import com.fortify.ssc.parser.owasp.dependencycheck.parser.util.Constants;
21-
import com.fortify.util.json.handler.JsonArrayMapperHandler;
21+
import com.fortify.util.json.ExtendedJsonParser;
2222
import com.fortify.util.ssc.parser.ScanDataStreamingJsonParser;
2323

2424
public class VulnerabilitiesParser {
@@ -38,10 +38,14 @@ public VulnerabilitiesParser(final ScanData scanData, final VulnerabilityHandler
3838
*/
3939
public final void parse() throws ScanParsingException, IOException {
4040
new ScanDataStreamingJsonParser()
41-
.handler("/dependencies", new JsonArrayMapperHandler<>(dependency->handleDependency(dependency), Dependency.class))
41+
.handler("/dependencies/*", this::handleDependency)
4242
.parse(scanData);
4343
}
4444

45+
private final void handleDependency(ExtendedJsonParser jp) throws IOException {
46+
handleDependency(jp.readValueAs(Dependency.class));
47+
}
48+
4549
private final void handleDependency(Dependency dependency) {
4650
Vulnerability[] vulnerabilities = dependency.getVulnerabilities();
4751
if ( vulnerabilities!=null && vulnerabilities.length>0 ) {

0 commit comments

Comments
 (0)