diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml new file mode 100644 index 000000000..be53d99d1 --- /dev/null +++ b/.pre-commit-config.yaml @@ -0,0 +1,5 @@ +repos: +- repo: git://github.com/antonbabenko/pre-commit-terraform + rev: v1.18.0 + hooks: + - id: terraform_fmt \ No newline at end of file diff --git a/build.gradle b/build.gradle index 361ba7cea..494b770a8 100644 --- a/build.gradle +++ b/build.gradle @@ -4,9 +4,9 @@ plugins { id 'java' id 'jacoco' id 'io.spring.dependency-management' version '1.0.9.RELEASE' apply false - id 'org.owasp.dependencycheck' version '5.1.1' + id 'org.owasp.dependencycheck' version '5.3.2.1' id 'org.sonarqube' version '2.6.2' - id 'org.springframework.boot' version '2.2.8.RELEASE' apply false + id 'org.springframework.boot' version '2.2.10.RELEASE' apply false id 'com.gorylenko.gradle-git-properties' version '1.4.21' id "info.solidsoft.pitest" version "1.4.6" id 'pmd' @@ -35,6 +35,7 @@ allprojects { //TODO: Remove once spring boot have updated versions to match ext['tomcat.version'] = '9.0.37' ext['log4j2.version'] = '2.13.3' + ext['spring.boot.version'] = '2.2.10.RELEASE' dependencyManagement { imports { @@ -59,6 +60,10 @@ allprojects { analyzers { // Disable scanning of .NET related binaries assemblyEnabled = false + nodeEnabled = false + nodeAudit { + enabled = false + } } } @@ -74,12 +79,12 @@ allprojects { implementation group: 'org.springframework.boot', name: 'spring-boot-starter-oauth2-client' implementation group: 'org.springframework.boot', name: 'spring-boot-starter-oauth2-resource-server' implementation group: 'org.springframework.boot', name: 'spring-boot-starter-data-redis-reactive' - implementation group: 'org.springframework.session', name: 'spring-session-data-redis', version: '2.2.3.RELEASE' + implementation group: 'org.springframework.session', name: 'spring-session-data-redis', version: '2.2.4.RELEASE' implementation group: 'io.github.openfeign', name: 'feign-jackson', version: '10.11' implementation group: 'io.github.openfeign', name: 'feign-okhttp', version: '10.11' - implementation group: 'org.springframework.cloud', name: 'spring-cloud-starter-openfeign', version: '2.2.3.RELEASE' - implementation(group: 'org.springframework.cloud', name: 'spring-cloud-starter-netflix-zuul', version: '2.2.3.RELEASE') { + implementation group: 'org.springframework.cloud', name: 'spring-cloud-starter-openfeign', version: '2.2.5.RELEASE' + implementation(group: 'org.springframework.cloud', name: 'spring-cloud-starter-netflix-zuul', version: '2.2.5.RELEASE') { exclude(module: 'rxnetty-contexts') exclude(module: 'rxnetty-servo') exclude(module: 'rxnetty') diff --git a/dependency-check-suppressions.xml b/dependency-check-suppressions.xml index 958c22806..cf57f11f5 100644 --- a/dependency-check-suppressions.xml +++ b/dependency-check-suppressions.xml @@ -193,7 +193,7 @@ CVE-2014-0119 CVE-2016-5388 - + - + https://www.cvedetails.com/cve/CVE-2019-12384/ FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible. @@ -280,6 +280,60 @@ CVE-2019-16370 + + + TODO: fix these: suppress some netflix CVEs to deploy a hotfix + + ^com\.netflix\.servo:servo-core:0\.10\.1$ + CVE-2014-0047 + CVE-2014-0048 + CVE-2014-5277 + CVE-2014-5278 + CVE-2014-5282 + CVE-2014-6407 + CVE-2014-8178 + CVE-2014-8179 + CVE-2014-9356 + CVE-2014-9358 + CVE-2015-3627 + CVE-2015-3630 + CVE-2015-3631 + CVE-2016-3697 + CVE-2017-14992 + CVE-2019-13139 + CVE-2019-13509 + CVE-2019-15752 + CVE-2019-16884 + CVE-2019-5736 + + + + + TODO: fix these: suppress some netflix CVEs to deploy a hotfix + + ^com\.netflix\.servo:servo-internal:0\.10\.1$ + CVE-2014-0047 + CVE-2014-0048 + CVE-2014-5277 + CVE-2014-5278 + CVE-2014-5282 + CVE-2014-6407 + CVE-2014-8178 + CVE-2014-8179 + CVE-2014-9356 + CVE-2014-9358 + CVE-2015-3627 + CVE-2015-3630 + CVE-2015-3631 + CVE-2016-3697 + CVE-2017-14992 + CVE-2019-13139 + CVE-2019-13509 + CVE-2019-15752 + CVE-2019-16884 + CVE-2019-5736 + +