Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
35 commits
Select commit Hold shift + click to select a range
5df8e24
Update pipeline-config.yaml (#440)
bkaiserinfosec Dec 30, 2023
c3fb035
Update tox.ini (#441)
bkaiserinfosec Dec 30, 2023
57a681a
Feature/fix toxi (#443)
bkaiserinfosec Dec 30, 2023
b3d741c
Feature/fix toxi (#445)
bkaiserinfosec Dec 30, 2023
f62e0d1
Feature/fix toxi (#447)
bkaiserinfosec Dec 31, 2023
5c40b88
Feature/fix toxi (#449)
bkaiserinfosec Jan 1, 2024
b8d2775
Update Jenkinsfile (#452)
bkaiserinfosec Jan 4, 2024
9e4030d
Feature/jenkinsfile updates (#453)
bkaiserinfosec Jan 8, 2024
fb5d50f
Feature/jenkinsfile updates (#455)
bkaiserinfosec Jan 8, 2024
deaed40
Merge branch 'main' into release/0.2.0-beta/Test-1
bkaiserinfosec Jan 8, 2024
22fc757
Feature/jenkinsfile updates (#457)
bkaiserinfosec Jan 8, 2024
48869b8
Feature/jenkinsfile updates (#459)
bkaiserinfosec Jan 8, 2024
b88f33e
Feature/jenkinsfile updates (#461)
bkaiserinfosec Jan 8, 2024
3058cc8
Feature/jenkinsfile updates (#463)
bkaiserinfosec Jan 8, 2024
eae9cfd
Feature/jenkinsfile updates (#465)
bkaiserinfosec Jan 8, 2024
b1d3586
Feature/jenkinsfile updates (#467)
bkaiserinfosec Jan 10, 2024
a688f72
Feature/jenkinsfile updates (#469)
bkaiserinfosec Jan 10, 2024
d0edd8f
Update Jenkinsfile
bkaiserinfosec Jan 13, 2024
6bc2607
Update pipeline-config.yaml
bkaiserinfosec Jan 13, 2024
4e2bc4a
Update values.yaml
bkaiserinfosec Jan 13, 2024
fba2f2b
Update values.yaml
bkaiserinfosec Jan 13, 2024
1a298c0
Update Jenkinsfile
bkaiserinfosec Jan 15, 2024
ef00ba5
Update values.yaml
bkaiserinfosec Jan 15, 2024
f497be3
Update pipeline-config.yaml
bkaiserinfosec Jan 17, 2024
ee6d9dd
Feature/jenkinsfile updates (#473)
bkaiserinfosec Jan 17, 2024
22a872b
Feature/jenkinsfile updates (#474)
bkaiserinfosec Feb 27, 2024
64ed436
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Feb 27, 2024
1169457
Feature/jenkinsfile updates (#476)
bkaiserinfosec Feb 27, 2024
4b6af0b
Feature/jenkinsfile updates (#478)
bkaiserinfosec Feb 28, 2024
cebffc6
Update pipeline-config.yaml
bkaiserinfosec Feb 28, 2024
38282ba
Feature/jenkinsfile updates (#481)
bkaiserinfosec Feb 28, 2024
86da6a0
Feature/jenkinsfile updates (#483)
bkaiserinfosec Feb 28, 2024
e019ade
Feature/jenkinsfile updates (#485)
bkaiserinfosec Mar 9, 2024
33e0b20
Feature/jenkinsfile updates (#487)
bkaiserinfosec Mar 9, 2024
509a6f1
Update pipeline-config.yaml
bkaiserinfosec Mar 9, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
27 changes: 18 additions & 9 deletions Jenkinsfile
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ pipeline {
stage('Unit Testing') {
agent {
docker {
image 'securityuniversal/jenkins:latest'
image 'securityuniversal/jenkins-python-agent:latest'
}
}
when {
Expand All @@ -75,7 +75,7 @@ pipeline {
stage('Secret Scanning') {
agent {
docker {
image 'securityuniversal/jenkins-secret-agent:latest'
image 'securityuniversal/jenkins-sectesting-agent:latest'
}
}
when {
Expand All @@ -99,7 +99,7 @@ pipeline {
stage('Software Composition Analysis') {
agent {
docker {
image 'securityuniversal/jenkins:latest'
image 'securityuniversal/jenkins-sectesting-agent:latest'
}
}
when {
Expand Down Expand Up @@ -127,7 +127,7 @@ pipeline {
stage('Static Application Security Testing') {
agent {
docker {
image 'securityuniversal/jenkins:latest'
image 'securityuniversal/jenkins-sectesting-agent:latest'
}
}
when {
Expand Down Expand Up @@ -155,7 +155,7 @@ pipeline {
stage('Infrastructure-as-Code Security Testing') {
agent {
docker {
image 'securityuniversal/jenkins-iac-agent:latest'
image 'securityuniversal/jenkins-sectesting-agent:latest'
args '--group-add 999'
}
}
Expand Down Expand Up @@ -199,7 +199,8 @@ pipeline {
jslStageWrapper('Build Docker Service') {
script {
jslBuildDocker([
'serviceName': env.appName
'serviceName': env.appName,
'dockerReg': 'secunicontainerregistry.azurecr.io'
])
}
}
Expand All @@ -209,7 +210,7 @@ pipeline {
stage('Docker Container Scanning') {
agent {
docker {
image 'securityuniversal/jenkins-iac-agent:latest'
image 'securityuniversal/jenkins-sectesting-agent:latest'
args '--group-add 999'
}
}
Expand All @@ -230,7 +231,7 @@ pipeline {
def stageConfig = jslReadYamlConfig('containerScan')
def containerName = stageConfig?.containerName
def containerTag = stageConfig?.containerTag
jslContainerSecurityScanning(containerName, containerTag)
jslContainerSecurityScanning(containerName, containerTag, 'secunicontainerregistry.azurecr.io')
}
}
}
Expand Down Expand Up @@ -293,6 +294,12 @@ pipeline {

////////// Quality Gate //////////
stage("Quality Gate - Security") {
agent {
docker {
image 'securityuniversal/jenkins-sectesting-agent:latest'
args '--group-add 999'
}
}
when {
expression {
def config = jslReadYamlConfig('securityQualityGate')
Expand Down Expand Up @@ -326,7 +333,7 @@ pipeline {
// Condition for a Test-* branch
expression {
// Split the branch name by '/' and check if the last segment starts with 'Test-'
env.BRANCH_NAME.split('/').last().startsWith('staging')
env.BRANCH_NAME.split('/').last().startsWith('staging') || env.BRANCH_NAME.split('/').last().startsWith('Prod')
}
}
}
Expand All @@ -342,6 +349,8 @@ pipeline {
'secretsSetStrings': stageConfig?.secretsSetStrings,
'serviceCredentials': stageConfig?.serviceCredentials,
'serviceSetStrings': stageConfig?.serviceSetStrings,
'dockerReg': 'secunicontainerregistry.azurecr.io',
'imgPullSecret': 'acrCreds'
])

}
Expand Down
2 changes: 1 addition & 1 deletion ci_cd/helm/secusphere/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ volumes:
claimName: su-webapp-pv-claim

ingress:
enabled: true
enabled: false

serviceAccount:
# Specifies whether a service account should be created
Expand Down
12 changes: 6 additions & 6 deletions pipeline-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ stages:
enabled: false
branches: []
secretScanning:
enabled: true
enabled: false
branches:
- release
sca:
Expand All @@ -29,7 +29,7 @@ stages:
codeLanguages:
- Python
iac:
enabled: true
enabled: false
branches:
- release
buildDocker:
Expand Down Expand Up @@ -75,14 +75,14 @@ stages:
azure.azTenantId: 'azTenantId'
serviceCredentials: {}
serviceSetStrings:
app.env: test
app.extUrl: "192.168.0.150"
app.env: prod
app.extUrl: "secusphere.securityuniversal.com"
app.db.prodDbUriRef: "PROD-DB-URI"
app.smtp.host: "smtp.sendgrid.net:587"
app.smtp.user: apikey
app.smtp.adminEmail: "admin@securityuniversal.com"
app.smtp.passwordRef: "SENDGRID-SMTP-PW"
app.az.keyVaultName: "BkDevSecOpsKeyVault"
app.smtp.passwordRef: "SMTP-PW"
app.az.keyVaultName: "ss-keyvault"
post:
enabled: true
branches:
Expand Down
5 changes: 3 additions & 2 deletions src/vr/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
import requests
from config_engine import ENV, PROD_DB_URI, AUTH_TYPE, APP_EXT_URL, LDAP_HOST, LDAP_PORT, LDAP_BASE_DN, \
LDAP_USER_DN, LDAP_GROUP_DN, LDAP_USER_RDN_ATTR, LDAP_USER_LOGIN_ATTR, LDAP_BIND_USER_DN, LDAP_BIND_USER_PASSWORD, \
AZAD_CLIENT_ID, AZAD_CLIENT_SECRET, AZAD_AUTHORITY, JENKINS_USER
AZAD_CLIENT_ID, AZAD_CLIENT_SECRET, AZAD_AUTHORITY, JENKINS_USER, JENKINS_ENABLED
from flask import Flask
from flask_bootstrap import Bootstrap
from flask_login import LoginManager
Expand Down Expand Up @@ -448,4 +448,5 @@ def get_jenkins_data():

# Call the Jobs Here #
train_model_every_six_hours()
get_jenkins_data_every_hour()
if JENKINS_ENABLED == 'yes':
get_jenkins_data_every_hour()
2 changes: 1 addition & 1 deletion src/vr/api/vulns/vulnerabilities.py
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ def update_vulnerabilities_status(app_cmdb_id, scan_id, req_raw):
def add_vulns_background_process(req_raw):
now = datetime.datetime.utcnow().strftime("%Y-%m-%d %H:%M:%S")
app_name = req_raw['appName']
git_url = req_raw['giturl']
git_url = req_raw['gitUrl']
git_branch = req_raw['branch']
findings = req_raw['findings']
scan_type = req_raw['scanType']
Expand Down