-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DTS-34986 Central AuthNAuth Spring Boot upgrade #1012
base: develop
Are you sure you want to change the base?
Conversation
...thapi/src/main/java/com/publicissapient/kpidashboard/apis/controller/APITokenController.java
Outdated
Show resolved
Hide resolved
...i/src/main/java/com/publicissapient/kpidashboard/apis/service/SAMLAuthenticationService.java
Show resolved
Hide resolved
...src/main/java/com/publicissapient/kpidashboard/apis/service/dto/ResetPasswordRequestDTO.java
Show resolved
Hide resolved
…y and save saml details only the first time user logs in
…hecking the documentation
…y and save saml details only the first time user logs in
}else{ | ||
if(redirectUri.indexOf('?') === -1){ | ||
window.location.href = `${redirectUri}?authToken=${authToken}`; | ||
window.location.href = `${redirectUri}`; |
Check failure
Code scanning / CodeQL
Client-side cross-site scripting High
user-provided value
}else{ | ||
window.location.href = `${redirectUri}&authToken=${authToken}`; | ||
window.location.href = `${redirectUri}`; |
Check failure
Code scanning / CodeQL
Client-side cross-site scripting High
user-provided value
}else{ | ||
if(redirectUri.indexOf('?') === -1){ | ||
window.location.href = `${redirectUri}?authToken=${authToken}`; | ||
window.location.href = `${redirectUri}`; |
Check warning
Code scanning / CodeQL
Client-side URL redirect Medium
user-provided value
Untrusted URL redirection depends on a
user-provided value
Untrusted URL redirection depends on a
user-provided value
}else{ | ||
window.location.href = `${redirectUri}&authToken=${authToken}`; | ||
window.location.href = `${redirectUri}`; |
Check warning
Code scanning / CodeQL
Client-side URL redirect Medium
user-provided value
Untrusted URL redirection depends on a
user-provided value
Untrusted URL redirection depends on a
user-provided value
* @throws ParseException | ||
*/ | ||
private void apiCallToGetBranches(List<BambooBranchesResponseDTO> responseDTOList, String url, HttpEntity<?> httpEntity) throws ParseException { | ||
ResponseEntity<String> response = restTemplate.exchange(url, HttpMethod.GET, httpEntity, String.class); |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
user-provided value
String statusCode = response.getStatusCode().toString(); | ||
log.error("Error while fetching BambooBranchesNameAndKeys from {}. with status {}", url, | ||
statusCode); | ||
log.error("Invalid jobNameKey: {}", jobNameKey); |
Check failure
Code scanning / CodeQL
Log Injection High
user-provided value
parseBranchesResponse(responseDTOList, response); | ||
} else { | ||
String statusCode = response.getStatusCode().toString(); | ||
log.error("Error while fetching BambooBranchesNameAndKeys from {}. with status {}", url, |
Check failure
Code scanning / CodeQL
Log Injection High
user-provided value
try { | ||
calculateAllKPIAggregatedMetrics(kpiRequest, responseList, kpiElement, treeAggregatorDetail); | ||
} catch (Exception e) { | ||
log.error("Error while KPI calculation for data {}", kpiRequest.getKpiList(), e); |
Check failure
Code scanning / CodeQL
Log Injection High
user-provided value
This log entry depends on a
user-provided value
This log entry depends on a
user-provided value
.disable(); | ||
@Bean | ||
protected SecurityFilterChain filterChain(HttpSecurity http) throws Exception { | ||
http.csrf(csrf -> csrf.disable()); |
Check failure
Code scanning / CodeQL
Disabled Spring CSRF protection High
...va/com/publicissapient/kpidashboard/apis/service/impl/StandardAuthenticationServiceImpl.java
Fixed
Show fixed
Hide fixed
...va/com/publicissapient/kpidashboard/apis/service/impl/StandardAuthenticationServiceImpl.java
Fixed
Show fixed
Hide fixed
...va/com/publicissapient/kpidashboard/apis/service/impl/StandardAuthenticationServiceImpl.java
Fixed
Show fixed
Hide fixed
...uthapi/src/main/java/com/publicissapient/kpidashboard/apis/service/impl/UserServiceImpl.java
Fixed
Show fixed
Hide fixed
...uthapi/src/main/java/com/publicissapient/kpidashboard/apis/service/impl/UserServiceImpl.java
Fixed
Show fixed
Hide fixed
…hecking the documentation
…y and save saml details only the first time user logs in
…y and save saml details only the first time user logs in
Develop to QA
Develop -> QA-Master
New UI bug fixes
Develop to QA (Master sync)
Develop to QA
Qa master to Master - 10.0.0 Release
# Conflicts: # central-auth-service/central-login-ui-react/src/pages/login/index.jsx
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Upgrading the Central AuthNAuth Spring Boot version to 3.2 and Java version to 17.
For full documentation of the upgrade, you can check the confluence page:
https://publicissapient.atlassian.net/wiki/spaces/SPDS/pages/307789878/Java+17+Upgrade