diff --git a/gradle-jdks-setup/src/test/java/com/palantir/gradle/jdks/setup/GradleJdksVulnerabilityChecks.java b/gradle-jdks-setup/src/test/java/com/palantir/gradle/jdks/setup/GradleJdksVulnerabilityChecks.java new file mode 100644 index 00000000..aafb3c53 --- /dev/null +++ b/gradle-jdks-setup/src/test/java/com/palantir/gradle/jdks/setup/GradleJdksVulnerabilityChecks.java @@ -0,0 +1,39 @@ +/* + * (c) Copyright 2024 Palantir Technologies Inc. All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.palantir.gradle.jdks.setup; + +import java.io.IOException; +import java.nio.file.Files; +import java.nio.file.Path; +import java.util.regex.Pattern; +import org.junit.jupiter.api.Test; + +public class GradleJdksVulnerabilityChecks { + private static final Pattern CURL_INSECURE_PATTERN = Pattern.compile("curl\\s.*(-k|--insecure)"); + private static final Pattern WGET_INSECURE_PATTERN = Pattern.compile("wget\\s.*--no-check-certificate"); + + @Test + public void calls_do_not_use_insecure_connections() throws IOException { + String content = Files.readString(Path.of("src/main/resources/gradle-jdks-functions.sh")); + if (CURL_INSECURE_PATTERN.matcher(content).find()) { + throw new RuntimeException("Insecure curl command found!"); + } + if (WGET_INSECURE_PATTERN.matcher(content).find()) { + throw new RuntimeException("Insecure wget command found!"); + } + } +}