Our aim is to build a lively community, hence, we welcome any exchange and collaboration with individuals and organizations interested in the use, support and extension of the open-source vulnerability assessment tool.
To contribute, read on to learn about your options:
- Help Others on Stack Overflow
- Report Bugs as GitHub issues
- Analyze Bugs
- Contribute Code (fixes and features)
- Contribute to the Vulnerability Knowledge Base
You can help by helping others who use the open-source vulnerability assessment tool and need support. Find them on Stack Overflow.
If you find a bug - behavior of the open-source vulnerability assessment tool code contradicting its specification - you are welcome to report it. We can only handle well-reported, actual bugs, so please follow the guidelines below and use forums like Stack Overflow for support questions or when in doubt whether the issue is an actual bug.
Once you have familiarized with the guidelines, you can go to the Github issue tracker to report the issue.
Issue report checklist:
- Real, current bug
- No duplicate
- Reproducible
- Good summary
- Well-documented
- Minimal example
- Use the template
These eight requirements are the mandatory base of a good bug report:
- Only real bugs: please do your best to make sure to only report real bugs! Do not report:
- issues caused by application code or any code outside the open-source vulnerability assessment tool.
- something that behaves just different from what you expected. A bug is when something behaves different than specified. When in doubt, ask in a forum.
- something you do not get to work properly. Use a support forum like Stack Overflow to request help.
- feature requests. Well, this is arguable: critical or easy-to-do enhancement suggestions are welcome, but we do not want to use the issue tracker as wishlist.
- No duplicate: you have searched the issue tracker to make sure the bug has not yet been reported
- Good summary: the summary should be specific to the issue
- Current bug: the bug can be reproduced in the most current version (state the tested version!)
- Reproducible bug: there are clear steps to reproduce given. This includes, where possible:
- a URL to access the example
- any required user/password information (do not reveal any credentials that could be mis-used!)
- detailed and complete step-by-step instructions to reproduce the bug
- Precise description:
- precisely state the expected and the actual behavior
- give information about the used browser/device and its version, if possible also the behavior in other browsers/devices
- if the bug is about wrong UI appearance, attach a screenshot and mark what is wrong
- generally give as much additional information as possible. (But find the right balance: do not invest hours for a very obvious and easy to solve issue. When in doubt, give more information.)
- Minimal example: it is highly encouraged to provide a minimal example to reproduce in e.g. jsbin: isolate the application code which triggers the issue and strip it down as much as possible as long as the issue still occurs. If several files are required, you can create a gist. This may not always be possible and sometimes be overkill, but it always helps analyzing a bug.
- Only one bug per report: open different tickets for different issues
You are encouraged to use this template.
Please report bugs in English, so all users can understand them.
If the bug appears to be a regression introduced in a new version of the open-source vulnerability assessment tool, try to find the closest versions between which it was introduced.
When an issue is reported, a committer will look at it and either confirm it as a real issue (by giving the "approved" label), close it if it is not an issue, or ask for more details. Approved issues are then either assigned to a committer in GitHub, reported in our internal issue handling system, or left open as "contribution welcome" for easy or not urgent fixes.
An issue that is about a real bug is closed as soon as the fix is committed. The closing comment explains which patch version(s) will contain the fix.
Github offers labels to categorize issues. We defined the following labels so far:
Labels for issue categories:
- bug: this issue is a bug in the code
- documentation: this issue is about wrong documentation
- enhancement: this is not a bug report, but an enhancement request
Status of open issues:
- unconfirmed: this report needs confirmation whether it is really a bug (no label; this is the default status)
- approved: this issue is confirmed to be a bug
- author action: the author is required to provide information
- contribution welcome: this fix/enhancement is approved and you are invited to contribute it
Status/resolution of closed issues:
- fixed: a fix for the issue was provided
- duplicate: the issue is also reported in a different ticket and is handled there
- invalid: for some reason or another this issue report will not be handled further (maybe lack of information or issue does not apply anymore)
- works: not reproducible or working as expected
- wontfix: while acknowledged to be an issue, a fix cannot or will not be provided
The labels can only be set and modified by committers.
We want to improve the quality of the open-source vulnerability assessment tool and good bug reports are welcome! But our capacity is limited, so we cannot handle questions or consultation requests and we cannot afford to ask for required details. So we reserve the right to close or to not process insufficient bug reports in favor of those which are very cleanly documented and easy to reproduce. Even though we would like to solve each well-documented issue, there is always the chance that it won't happen - remember: The open-source vulnerability assessment tool is Open Source and comes without warranty.
Analyzing issue reports can be a lot of effort. Any help is welcome! Go to the Github issue tracker and find an open issue which needs additional work or a bugfix.
Additional work may be further information, or a minimized jsbin example or gist, or it might be a hint that helps understanding the issue. Maybe you can even find and contribute a bugfix?
You are welcome to contribute code in order to fix bugs or to implement new features.
There are three important things to know:
- You must be aware of the Apache License (which describes contributions) and agree to the Contributors License Agreement. This is common practice in all major Open Source projects. To make this process as simple as possible, we are using CLA assistant for individual contributions. CLA assistant is an open source tool that integrates with GitHub very well and enables a one-click-experience for accepting the CLA. For company contributers special rules apply. See the respective section below for details.
- There are several requirements regarding code style, quality, and product standards which need to be met (we also have to follow them). The respective section below gives more details on the coding guidelines.
- Not all proposed contributions can be accepted. Some features may e.g. just fit a third-party add-on better. The code must fit the overall direction of the open-source vulnerability assessment tool and really improve it, so there should be some "bang for the byte". For most bug fixes this is a given, but major feature implementation first need to be discussed with one of the open-source vulnerability assessment tool committers , possibly one who touched the related code recently. The more effort you invest, the better you should clarify in advance whether the contribution fits: the best way would be to just open an enhancement ticket in the issue tracker to discuss the feature you plan to implement (make it clear you intend to contribute). We will then forward the proposal to the respective code owner, this avoids disappointment.
When you contribute (code, documentation, or anything else), you have to be aware that your contribution is covered by the same Apache 2.0 License that is applied to the open-source vulnerability assessment tool itself. In particular you need to agree to the Individual Contributor License Agreement, which can be found here.
(This applies to all contributors, including those contributing on behalf of a company). If you agree to its content, you simply have to click on the link posted by the CLA assistant as a comment to the pull request. Click it to check the CLA, then accept it on the following screen if you agree to it. CLA assistant will save this decision for upcoming contributions and will notify you if there is any change to the CLA in the meantime.
If employees of a company contribute code, in addition to the individual agreement above, there needs to be one company agreement submitted. This is mainly for the protection of the contributing employees.
A company representative authorized to do so needs to download, fill, and print the Corporate Contributor License Agreement form. Then either:
- Scan it and e-mail it to opensource@sap.com and henrik.plate@sap.com
- Fax it to: +49 6227 78-45813
- Send it by traditional letter to: Industry Standards & Open Source Team, Dietmar-Hopp-Allee 16, 69190 Walldorf, Germany
The form contains a list of employees who are authorized to contribute on behalf of your company. When this list changes, please let us know.
Contributed content can be accepted if it:
- is useful to improve the open-source vulnerability assessment tool (explained above)
- follows the applicable guidelines and standards
The second requirement could be described in entire books and would still lack a 100%-clear definition, so you will get a committer's feedback if something is not right. Extensive conventions and guidelines documentation is available here.
These are some of the most important rules to give you an initial impression:
- Apply a clean coding style adapted to the surrounding code, even though we are aware the existing code is not fully clean
- Use tabs for indentation (except if the modified file consistently uses spaces)
- Use variable naming conventions like in the other files you are seeing (e.g. hungarian notation)
- No System.out.println
- Only access public APIs of other entities (there are exceptions, but this is the rule)
- Comment your code where it gets non-trivial
- Keep an eye on performance and memory consumption
- Write a unit test
- Do not do any incompatible changes, especially do not modify the name or behavior of public API methods or properties
- Always consider the developer who USES your control/code!
- Think about what code and how much code he/she will need to write to use your feature
- Think about what she/he expects your control/feature to do
If this list sounds lengthy and hard to achieve - well, that's what WE have to comply with as well, and it's by far not complete…
-
Make sure the change would be welcome (e.g. a bugfix or a useful feature); best do so by proposing it in a GitHub issue
-
Create a branch forking the the open-source vulnerability assessment tool repository and do your change
-
Commit and push your changes on that branch
- When you have several commits, squash them into one (see this explanation) - this also needs to be done when additional changes are required after the code review
-
In the commit message follow the commit message guidelines
-
If your change fixes an issue reported at GitHub, add the following line to the commit message:
Fixes https://github.com/SAP/open-source-vulnerability-mgmt/issues/(issueNumber)
- Do NOT add a colon after "Fixes" - this prevents automatic closing.
- When your pull request number is known (e.g. because you enhance a pull request after a code review), you can also add the line
Closes https://github.com/SAP/open-source-vulnerability-mgmt/pull/(pullRequestNumber)
-
Create a Pull Request to github.com/SAP/open-source-vulnerability-mgmt
-
Follow the link posted by the CLA assistant to your pull request and accept it, as described in detail above.
-
Wait for our code review and approval, possibly enhancing your change on request
- Note that the open-source vulnerability assessment tool developers also have their regular duties, so depending on the required effort for reviewing, testing and clarification this may take a while
-
Once the change has been approved we will inform you in a comment
-
Your pull request cannot be merged directly into the branch (internal SAP processes), but will be merged internally and immediately appear in the public repository as well. Pull requests for non-code branches (like "gh-pages" for the website) can be directly merged.
-
We will close the pull request, feel free to delete the now obsolete branch
The open-source vulnerability assessment tool relies on a database with detailled information about vulnerable code (methods, functions, etc.) in open-source software libraries. This information is built by analyzing the source code changes (commits) done by open-source developers to fix a given vulnerability. In order to reflect new vulnerability disclosures, one has to analyze those so-called fix commits and add corresponding entries to the local database.
This analysis is done using the PatchAnalyzer
, which takes several arguments as input, e.g., the source code repository of the respective component, the commit identifier(s), and a vulnerability identifier.
In order to prevent that each and every tool user has to collect this information by himself, we aim at creating a shared knowledge base that can be maintained and used by multiple parties. This knowledge base will be a dedicated GitHub repository, where people can upload new input information for the PatchAnalyzer
.
This section will be updated once this repository is available and the PatchAnalyzer
has been updated to read/write to this GitHub repo.