diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml
new file mode 100644
index 000000000..be53d99d1
--- /dev/null
+++ b/.pre-commit-config.yaml
@@ -0,0 +1,5 @@
+repos:
+- repo: git://github.com/antonbabenko/pre-commit-terraform
+ rev: v1.18.0
+ hooks:
+ - id: terraform_fmt
\ No newline at end of file
diff --git a/build.gradle b/build.gradle
index 361ba7cea..494b770a8 100644
--- a/build.gradle
+++ b/build.gradle
@@ -4,9 +4,9 @@ plugins {
id 'java'
id 'jacoco'
id 'io.spring.dependency-management' version '1.0.9.RELEASE' apply false
- id 'org.owasp.dependencycheck' version '5.1.1'
+ id 'org.owasp.dependencycheck' version '5.3.2.1'
id 'org.sonarqube' version '2.6.2'
- id 'org.springframework.boot' version '2.2.8.RELEASE' apply false
+ id 'org.springframework.boot' version '2.2.10.RELEASE' apply false
id 'com.gorylenko.gradle-git-properties' version '1.4.21'
id "info.solidsoft.pitest" version "1.4.6"
id 'pmd'
@@ -35,6 +35,7 @@ allprojects {
//TODO: Remove once spring boot have updated versions to match
ext['tomcat.version'] = '9.0.37'
ext['log4j2.version'] = '2.13.3'
+ ext['spring.boot.version'] = '2.2.10.RELEASE'
dependencyManagement {
imports {
@@ -59,6 +60,10 @@ allprojects {
analyzers {
// Disable scanning of .NET related binaries
assemblyEnabled = false
+ nodeEnabled = false
+ nodeAudit {
+ enabled = false
+ }
}
}
@@ -74,12 +79,12 @@ allprojects {
implementation group: 'org.springframework.boot', name: 'spring-boot-starter-oauth2-client'
implementation group: 'org.springframework.boot', name: 'spring-boot-starter-oauth2-resource-server'
implementation group: 'org.springframework.boot', name: 'spring-boot-starter-data-redis-reactive'
- implementation group: 'org.springframework.session', name: 'spring-session-data-redis', version: '2.2.3.RELEASE'
+ implementation group: 'org.springframework.session', name: 'spring-session-data-redis', version: '2.2.4.RELEASE'
implementation group: 'io.github.openfeign', name: 'feign-jackson', version: '10.11'
implementation group: 'io.github.openfeign', name: 'feign-okhttp', version: '10.11'
- implementation group: 'org.springframework.cloud', name: 'spring-cloud-starter-openfeign', version: '2.2.3.RELEASE'
- implementation(group: 'org.springframework.cloud', name: 'spring-cloud-starter-netflix-zuul', version: '2.2.3.RELEASE') {
+ implementation group: 'org.springframework.cloud', name: 'spring-cloud-starter-openfeign', version: '2.2.5.RELEASE'
+ implementation(group: 'org.springframework.cloud', name: 'spring-cloud-starter-netflix-zuul', version: '2.2.5.RELEASE') {
exclude(module: 'rxnetty-contexts')
exclude(module: 'rxnetty-servo')
exclude(module: 'rxnetty')
diff --git a/dependency-check-suppressions.xml b/dependency-check-suppressions.xml
index 958c22806..cf57f11f5 100644
--- a/dependency-check-suppressions.xml
+++ b/dependency-check-suppressions.xml
@@ -193,7 +193,7 @@
CVE-2014-0119
CVE-2016-5388
-
+
-
+
https://www.cvedetails.com/cve/CVE-2019-12384/
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
@@ -280,6 +280,60 @@
CVE-2019-16370
+
+
+ TODO: fix these: suppress some netflix CVEs to deploy a hotfix
+
+ ^com\.netflix\.servo:servo-core:0\.10\.1$
+ CVE-2014-0047
+ CVE-2014-0048
+ CVE-2014-5277
+ CVE-2014-5278
+ CVE-2014-5282
+ CVE-2014-6407
+ CVE-2014-8178
+ CVE-2014-8179
+ CVE-2014-9356
+ CVE-2014-9358
+ CVE-2015-3627
+ CVE-2015-3630
+ CVE-2015-3631
+ CVE-2016-3697
+ CVE-2017-14992
+ CVE-2019-13139
+ CVE-2019-13509
+ CVE-2019-15752
+ CVE-2019-16884
+ CVE-2019-5736
+
+
+
+
+ TODO: fix these: suppress some netflix CVEs to deploy a hotfix
+
+ ^com\.netflix\.servo:servo-internal:0\.10\.1$
+ CVE-2014-0047
+ CVE-2014-0048
+ CVE-2014-5277
+ CVE-2014-5278
+ CVE-2014-5282
+ CVE-2014-6407
+ CVE-2014-8178
+ CVE-2014-8179
+ CVE-2014-9356
+ CVE-2014-9358
+ CVE-2015-3627
+ CVE-2015-3630
+ CVE-2015-3631
+ CVE-2016-3697
+ CVE-2017-14992
+ CVE-2019-13139
+ CVE-2019-13509
+ CVE-2019-15752
+ CVE-2019-16884
+ CVE-2019-5736
+
+