Skip to content

Commit 2c01b45

Browse files
authored
Merge pull request #151 from annkots/master
TCR-659: Break els-for-languages README into several pages
2 parents 0f81f6d + 09a9eb0 commit 2c01b45

File tree

10 files changed

+2718
-2711
lines changed

10 files changed

+2718
-2711
lines changed

docs/.vuepress/config-client/sidebar.ts

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,13 @@ export default {
3838
collapsable: false,
3939
children: [
4040
"/els-for-languages/",
41+
"/els-for-languages/php/",
42+
"/els-for-languages/python/",
43+
"/els-for-languages/spring-framework-and-spring-boot/",
44+
"/els-for-languages/dotnet/",
45+
"/els-for-languages/angular/",
46+
"/els-for-languages/angularjs/",
47+
"/els-for-languages/apache-tomcat/",
4148
]
4249
},
4350
],

docs/.vuepress/routes.json

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,18 @@
77
"/endless-lifecycle-support-for-languages": "/els-for-languages",
88
"/endless-lifecycle-support": "/els-for-os",
99
"/endless-lifecycle-support/": "/els-for-os/",
10-
"/els-for-languages/#installation-instructions-of-yum-repositories": "/els-for-languages/#installation-instructions-for-linux",
11-
"/els-for-languages/#rhel-based-systems": "/els-for-languages/#rpm-based-systems",
12-
"/els-for-languages/#ubuntu": "/els-for-languages/#deb-based-systems",
10+
"/els-for-languages/#installation-instructions-of-yum-repositories": "/els-for-languages/python/#installation-instructions-for-linux",
11+
"/els-for-languages/#rhel-based-systems": "/els-for-languages/php/#rpm-based-systems",
12+
"/els-for-languages/#ubuntu": "/els-for-languages/php/#deb-based-systems",
1313
"/els-for-languages/#supported-os": "/els-for-languages/#supported-os-and-php-versions",
1414
"/els-for-languages/#supported-versions": "/els-for-languages/#supported-os-and-php-versions",
15-
"/els-for-languages/#step-2-create-an-account-on-npmjs-com": "/els-for-languages/#step-2-set-up-els-for-angular",
16-
"/els-for-languages/#step-2-set-up-els-for-angular-16": "/els-for-languages/#step-2-set-up-els-for-angular"
15+
"/els-for-languages/#step-2-create-an-account-on-npmjs-com": "/els-for-languages/angular/#step-2-set-up-els-for-angular",
16+
"/els-for-languages/#step-2-set-up-els-for-angular-16": "/els-for-languages/angular/#step-2-set-up-els-for-angular",
17+
"/els-for-languages/#els-for-php": "/els-for-languages/php",
18+
"/els-for-languages/#els-for-python": "/els-for-languages/python",
19+
"/els-for-languages/#els-for-spring-framework-and-spring-boot": "/els-for-languages/spring-framework-and-spring-boot",
20+
"/els-for-languages/#endless-lifecycle-support-for-apache-tomcat": "/els-for-languages/apache-tomcat",
21+
"/els-for-languages/#endless-lifecycle-support-for-net-6": "/els-for-languages/dotnet",
22+
"/els-for-languages/#endless-lifecycle-support-for-angular": "/els-for-languages/angular",
23+
"/els-for-languages/#endless-lifecycle-support-for-angularjs": "/els-for-languages/angularjs"
1724
}

docs/els-for-languages/README.md

Lines changed: 7 additions & 2706 deletions
Large diffs are not rendered by default.

docs/els-for-languages/angular/README.md

Lines changed: 402 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 147 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,147 @@
1+
# AngularJS
2+
3+
Endless Lifecycle Support (ELS) for AngularJS from TuxCare provides security fixes for AngularJS that have reached its end of life. This allows you to continue running AngularJS applications without vulnerability concerns, even after official support has ended.
4+
5+
:::warning
6+
ELS for AngularJS is currently in active development. If you are interested in updates, adoption, or have specific requirements or feature requests, please contact [[email protected]](mailto:[email protected])
7+
:::
8+
9+
## Supported AngularJS Versions
10+
11+
* AngularJS 1.5, 1.6, 1.7, 1.8
12+
13+
## Vulnerability Coverage and Target Response Times
14+
15+
TuxCare employs the Common Vulnerability Scoring System (CVSS v3.1) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we prioritize the NVD score.
16+
17+
Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.
18+
19+
TuxCare will make commercially reasonable efforts to adhere to the following guidelines when addressing vulnerabilities:
20+
21+
* **High and Critical CVEs (CVSS 7+):** Patches provided within 14 days
22+
* **Medium-severity CVEs (CVSS 4.0 to 6.9):** Patches provided within 60 days
23+
* **Low-severity CVEs:** Patches provided within 90 days
24+
* TuxCare may offer a mitigation strategy as an alternative to a direct code fix.
25+
26+
## Incident Reporting and Response Timeframe
27+
28+
Customers can report vulnerabilities by submitting a ticket through the TuxCare Support Portal <https://tuxcare.com/support-portal/>. TuxCare commits to providing an initial response to any reported issue within 3 days.
29+
30+
Requests for customer-directed security patches for CVEs that are outside of the ELS for AngularJS scope will be reviewed within 3 working days. If the request is accepted, we will provide the patch within the next 60 days.
31+
32+
Handling Multiple Vulnerabilities: In cases where several CVEs are reported simultaneously for fixing, TuxCare will discuss and agree upon resolution timelines separately with the customer.
33+
34+
## Enhanced Transparency & Visibility
35+
36+
TuxCare's commitment to transparency and visibility is foundational to our ELS for AngularJS offering. We provide comprehensive details about how each package is built, verified, and distributed, ensuring complete trust in the software supply chain.
37+
38+
* **SLSA Compliance**: All packages are built and signed to ensure verifiable Supply-chain Levels for Software Artifacts (SLSA) compliance. They are securely constructed from vetted sources, include attestations for all dependencies, and undergo continuous testing to maintain integrity and security.
39+
* **Software Bill of Materials (SBOM)**: We provide complete visibility into the software supply chain with a comprehensive inventory of every package in the codebase, ensuring transparency and accountability in your software ecosystem.
40+
41+
:::warning
42+
Note: This feature is under consideration for future development and may be available at a later date. If you are interested, please contact [[email protected]](mailto:[email protected])
43+
:::
44+
45+
* **Enhanced Metadata in Standard Formats:** Each SBOM is provided in universally recognized formats such as SPDX and VEX. These include enhanced metadata like artifact analysis, package health, and vulnerability impact data, ensuring that you have the most detailed and actionable information at your fingertips.
46+
* **Verifiable Integrity and Provenance**: Our packages and metadata provide comprehensive end-to-end provenance, detailing how each package was constructed and tested, ensuring that all components in your software stack are trustworthy.
47+
48+
:::warning
49+
Note: This feature is under consideration for future development and may be available at a later date. If you are interested, please contact [[email protected]](mailto:[email protected])
50+
:::
51+
52+
* **Secure Distribution**: Signed versions of the packages and their metadata are distributed from a registry managed, secured, and protected by TuxCare, guaranteeing that your software updates are authentic and untampered.
53+
54+
## Technical Support
55+
56+
TuxCare provides technical support according to the [support policy](https://tuxcare.com/TuxCare-support-policy.pdf?_gl=1*9hjdum*_up*MQ..*_ga*MTQ0MTM0NTI4OC4xNjk5Mzk2ODYy*_ga_Z539WTSZ80*MTY5OTM5Njg2MC4xLjAuMTY5OTM5Njg2MC4wLjAuMA..*_ga_1790YFKF4F*MTY5OTM5Njg2MC4xLjAuMTY5OTM5Njg2MC4wLjAuMA..*_ga_64QBSWJJGS*MTY5OTM5Njg2MC4xLjAuMTY5OTM5Njg2MC4wLjAuMA..) . It delivers 24/7/365 access to the TuxCare’s support team through the TuxCare Support Portal <https://tuxcare.com/support-portal/> and to the TuxCare’s online knowledge base.
57+
58+
## Connection to ELS for AngularJS Repository
59+
60+
This guide outlines the steps needed to integrate the TuxCare ELS for AngularJS repository.
61+
62+
## Step 1: Get user credentials
63+
64+
You need a username, password, and token in order to use TuxCare ELS AngularJS repository. Anonymous access is disabled. To receive the credentials, please contact [[email protected]](mailto:[email protected]).
65+
66+
## Step 2: Set Up ELS for AngularJS
67+
68+
TuxCare provides ELS for AngularJS as an NPM package, hosted on a secure internal registry. Follow the steps below to add it to your project and get started.
69+
70+
* Navigate to the root directory of your AngularJS project.
71+
* Create a `.npmrc` file or update it if it already exists.
72+
73+
**Example:**
74+
75+
```text
76+
my-angularjs-project/
77+
├── node_modules/
78+
├── package.json
79+
├── .npmrc ⚠️ ← Create it here
80+
└── package-lock.json
81+
```
82+
83+
* Use an editor of your choice (e.g., VS Code) to add the following registry address line:
84+
85+
```text
86+
registry=https://registry.npmjs.org/
87+
@els-angularjs:registry=https://nexus.repo.tuxcare.com/repository/els_angularjs/
88+
//nexus.repo.tuxcare.com/repository/els_angularjs/:_auth=${TOKEN}
89+
```
90+
91+
:::warning
92+
Replace ${TOKEN} with the token you received from [[email protected]](mailto:[email protected]).
93+
:::
94+
95+
* Update your `package.json` file to replace your AngularJS dependencies with the TuxCare packages:
96+
97+
**AngularJS 1.5**
98+
99+
```text
100+
"dependencies": {
101+
"@els-angularjs/angular-1.5": "^0.0.1",
102+
"angular": "./node_modules/@els-angular/angularjs-1.5/deps/angular"
103+
}
104+
```
105+
106+
**AngularJS 1.6**
107+
108+
```text
109+
"dependencies": {
110+
"@els-angularjs/angular-1.6": "^0.0.1",
111+
"angular": "./node_modules/@els-angular/angularjs-1.6/deps/angular"
112+
}
113+
```
114+
115+
**AngularJS 1.7**
116+
117+
```text
118+
"dependencies": {
119+
"@els-angularjs/angular-1.7": "^0.0.1",
120+
"angular": "./node_modules/@els-angular/angularjs-1.7/deps/angular"
121+
}
122+
```
123+
124+
**AngularJS 1.8**
125+
126+
```text
127+
"dependencies": {
128+
"@els-angularjs/angular-1.8": "^0.0.1",
129+
"angular": "./node_modules/@els-angular/angularjs-1.8/deps/angular"
130+
}
131+
```
132+
133+
* In your terminal, run the following command to install ELS for AngularJS dependencies:
134+
135+
```text
136+
npm install --userconfig .npmrc
137+
```
138+
139+
You will see an output like:
140+
141+
```text
142+
changed 1 package, and audited 5 packages in 892ms
143+
144+
2 vulnerabilities (1 moderate, 1 high)
145+
```
146+
147+
* You've successfully integrated the TuxCare ELS for AngularJS repository into your project.
Lines changed: 144 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,144 @@
1+
# Apache Tomcat
2+
3+
TuxCare's Endless Lifecycle Support (ELS) for Apache Tomcat provides security patches, and selected bug fixes, that are integral to the stable operation of applications running on these versions of Apache Tomcat core components such as Coyote, Catalina, Jasper etc.. These components have either reached their end of standard support from vendors or have reached End of Life (EOL).
4+
Our ELS for Apache Tomcat service is designed to provide solutions for organizations that are not yet ready to migrate to newer versions and that are seeking long-term stability for their legacy Apache Tomcat applications.
5+
6+
## Vulnerability Coverage and Target Response Times
7+
8+
TuxCare employs the Common Vulnerability Scoring System (CVSS v3.1) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we prioritize the NVD score.
9+
10+
Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.
11+
12+
TuxCare will make commercially reasonable efforts to adhere to the following guidelines when addressing vulnerabilities:
13+
14+
* **High and Critical CVEs (CVSS 7+):** Patches provided within 14 days
15+
* **Medium-severity CVEs (CVSS 4.0 to 6.9):** Patches provided within 60 days
16+
* **Low-severity CVEs:** Patches provided within 90 days
17+
* TuxCare may offer a mitigation strategy as an alternative to a direct code fix.
18+
19+
## Incident Reporting and Response Timeframe
20+
21+
Customers can report vulnerabilities by submitting a ticket through the TuxCare Support Portal <https://tuxcare.com/support-portal/>. TuxCare commits to providing an initial response to any reported issue within 3 days.
22+
23+
Requests for customer-directed security patches for CVEs that are outside of the ELS for Apache Tomcat scope will be reviewed within 3 working days. If the request is accepted, we will provide the patch within the next 60 days.
24+
25+
Handling Multiple Vulnerabilities: In cases where several CVEs are reported simultaneously for fixing, TuxCare will discuss and agree upon resolution timelines separately with the customer.
26+
27+
## Enhanced Transparency & Visibility
28+
29+
TuxCare's commitment to transparency and visibility is foundational to our ELS for Apache Tomcat offering. We provide comprehensive details about how each package is built, verified, and distributed, ensuring complete trust in the software supply chain.
30+
31+
* **SLSA Compliance**: All packages are built and signed to ensure verifiable Supply-chain Levels for Software Artifacts (SLSA) compliance. They are securely constructed from vetted sources, include attestations for all dependencies, and undergo continuous testing to maintain integrity and security.
32+
* **Software Bill of Materials (SBOM)**: We provide complete visibility into the software supply chain with a comprehensive inventory of every package in the codebase, ensuring transparency and accountability in your software ecosystem.
33+
34+
:::warning
35+
Note: This feature is under consideration for future development and may be available at a later date. If you are interested, please contact [[email protected]](mailto:[email protected])
36+
:::
37+
38+
* **Enhanced Metadata in Standard Formats:** Each SBOM is provided in universally recognized formats such as SPDX and VEX. These include enhanced metadata like artifact analysis, package health, and vulnerability impact data, ensuring that you have the most detailed and actionable information at your fingertips.
39+
* **Verifiable Integrity and Provenance**: Our packages and metadata provide comprehensive end-to-end provenance, detailing how each package was constructed and tested, ensuring that all components in your software stack are trustworthy.
40+
41+
:::warning
42+
Note: This feature is under consideration for future development and may be available at a later date. If you are interested, please contact [[email protected]](mailto:[email protected])
43+
:::
44+
45+
* **Secure Distribution**: Signed versions of the packages and their metadata are distributed from a registry managed, secured, and protected by TuxCare, guaranteeing that your software updates are authentic and untampered.
46+
47+
## Technical Support
48+
49+
TuxCare provides technical support according to the [support policy](https://tuxcare.com/TuxCare-support-policy.pdf?_gl=1*9hjdum*_up*MQ..*_ga*MTQ0MTM0NTI4OC4xNjk5Mzk2ODYy*_ga_Z539WTSZ80*MTY5OTM5Njg2MC4xLjAuMTY5OTM5Njg2MC4wLjAuMA..*_ga_1790YFKF4F*MTY5OTM5Njg2MC4xLjAuMTY5OTM5Njg2MC4wLjAuMA..*_ga_64QBSWJJGS*MTY5OTM5Njg2MC4xLjAuMTY5OTM5Njg2MC4wLjAuMA..) . It delivers 24/7/365 access to the TuxCare’s support team through the TuxCare Support Portal <https://tuxcare.com/support-portal/> and to the TuxCare’s online knowledge base.
50+
51+
## Connection to ELS for Apache Tomcat Repository
52+
53+
## Overview
54+
55+
This guide outlines the steps needed to integrate the TuxCare ELS for Apache Tomcat repository into your Java application. The repository provides trusted Java libraries that can be easily integrated into your Maven as well as Gradle project.
56+
57+
## Steps
58+
59+
## Step 1: Get user credentials
60+
61+
You need username and password in order to use TuxCare ELS Apache Tomcat repository. Anonymous access is disabled. To receive username and password please contact [[email protected]](mailto:[email protected]).
62+
63+
## Step 2: Create or Modify Your Build Tool Settings
64+
65+
**Maven**
66+
67+
* If you are using Maven as your build automation tool, you will need to make changes in your `${MAVEN_HOME}/settings.xml` file. If the file does not already exist in your Maven home directory (`${MAVEN_HOME}`), you should create one. Open the `settings.xml` file with a text editor and include the following configuration:
68+
69+
```text
70+
<?xml version="1.0" encoding="UTF-8"?>
71+
<settings xmlns="http://maven.apache.org/SETTINGS/1.1.0">
72+
<servers>
73+
<server>
74+
<id>repository-id</id>
75+
<username>${env.USERNAME}</username>
76+
<password>${env.PASSWORD}</password>
77+
</server>
78+
</servers>
79+
</settings>
80+
```
81+
82+
* Set your credentials via the following environment variables:
83+
84+
```text
85+
export USERNAME=your-username
86+
export PASSWORD=your-password
87+
```
88+
89+
Here `your-username` and `your-password` are your credentials mentioned in the [Step 1](#step-1-get-user-credentials-1).
90+
91+
* You may choose an arbitrary allowed value instead of `repository-id` and use the same value in the following snippet from your `pom.xml` file:
92+
93+
```text
94+
<repositories>
95+
<repository>
96+
<id>repository-id</id>
97+
<url>https://nexus.repo.tuxcare.com/repository/els_tomcat/</url>
98+
</repository>
99+
</repositories>
100+
```
101+
102+
* An example of maven project you can find [here](https://github.com/cloudlinux/securechain-java/blob/main/examples/maven). Do not forget to set the environment variables.
103+
104+
**Gradle**
105+
106+
* If you are using Gradle as your build automation tool, make sure to include the following configuration in your project setup:
107+
108+
```text
109+
repositories {
110+
maven {
111+
url = uri("https://nexus.repo.tuxcare.com/repository/els_tomcat/")
112+
credentials {
113+
username = findProperty('USERNAME')
114+
password = findProperty('PASSWORD')
115+
}
116+
}
117+
}
118+
```
119+
120+
* Set your credentials via the following environment variables:
121+
122+
```text
123+
export ORG_GRADLE_PROJECT_USERNAME=your-username
124+
export ORG_GRADLE_PROJECT_PASSWORD=your-password
125+
```
126+
127+
Here `your-username` and `your-password` are your credentials mentioned in the [Step 1](#step-1-get-user-credentials-1).
128+
129+
* An example of gradle project you can find [here](https://github.com/cloudlinux/securechain-java/blob/main/examples/gradle). Do not forget to set the environment variables.
130+
131+
## Verification
132+
133+
To confirm that the repository has been correctly established, include any library from the repository into your project and then run a build. The build tool you're using should be able to identify and resolve dependencies from the TuxCare ELS for Apache Tomcat repository.
134+
135+
## Conclusion
136+
137+
You've successfully integrated the TuxCare ELS for Apache Tomcat repository into your project. You can now benefit from the secure and vetted Apache Tomcat libraries it provides.
138+
139+
## Resolved CVEs in ELS for Apache Tomcat
140+
141+
| CVE Name | Severity | Group | Name | Version | Fixed Version |
142+
| ---------------- | -------- | ------------------------------- | ------------------------------------------- | ------------- | --------------------- |
143+
| | | | | | |
144+
| | | | | | |

0 commit comments

Comments
 (0)