Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
111 commits
Select commit Hold shift + click to select a range
5df8e24
Update pipeline-config.yaml (#440)
bkaiserinfosec Dec 30, 2023
c3fb035
Update tox.ini (#441)
bkaiserinfosec Dec 30, 2023
57a681a
Feature/fix toxi (#443)
bkaiserinfosec Dec 30, 2023
b3d741c
Feature/fix toxi (#445)
bkaiserinfosec Dec 30, 2023
f62e0d1
Feature/fix toxi (#447)
bkaiserinfosec Dec 31, 2023
5c40b88
Feature/fix toxi (#449)
bkaiserinfosec Jan 1, 2024
b8d2775
Update Jenkinsfile (#452)
bkaiserinfosec Jan 4, 2024
9e4030d
Feature/jenkinsfile updates (#453)
bkaiserinfosec Jan 8, 2024
fb5d50f
Feature/jenkinsfile updates (#455)
bkaiserinfosec Jan 8, 2024
deaed40
Merge branch 'main' into release/0.2.0-beta/Test-1
bkaiserinfosec Jan 8, 2024
22fc757
Feature/jenkinsfile updates (#457)
bkaiserinfosec Jan 8, 2024
48869b8
Feature/jenkinsfile updates (#459)
bkaiserinfosec Jan 8, 2024
b88f33e
Feature/jenkinsfile updates (#461)
bkaiserinfosec Jan 8, 2024
3058cc8
Feature/jenkinsfile updates (#463)
bkaiserinfosec Jan 8, 2024
eae9cfd
Feature/jenkinsfile updates (#465)
bkaiserinfosec Jan 8, 2024
b1d3586
Feature/jenkinsfile updates (#467)
bkaiserinfosec Jan 10, 2024
a688f72
Feature/jenkinsfile updates (#469)
bkaiserinfosec Jan 10, 2024
d0edd8f
Update Jenkinsfile
bkaiserinfosec Jan 13, 2024
6bc2607
Update pipeline-config.yaml
bkaiserinfosec Jan 13, 2024
4e2bc4a
Update values.yaml
bkaiserinfosec Jan 13, 2024
fba2f2b
Update values.yaml
bkaiserinfosec Jan 13, 2024
1a298c0
Update Jenkinsfile
bkaiserinfosec Jan 15, 2024
ef00ba5
Update values.yaml
bkaiserinfosec Jan 15, 2024
f497be3
Update pipeline-config.yaml
bkaiserinfosec Jan 17, 2024
ee6d9dd
Feature/jenkinsfile updates (#473)
bkaiserinfosec Jan 17, 2024
22a872b
Feature/jenkinsfile updates (#474)
bkaiserinfosec Feb 27, 2024
64ed436
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Feb 27, 2024
1169457
Feature/jenkinsfile updates (#476)
bkaiserinfosec Feb 27, 2024
4b6af0b
Feature/jenkinsfile updates (#478)
bkaiserinfosec Feb 28, 2024
cebffc6
Update pipeline-config.yaml
bkaiserinfosec Feb 28, 2024
38282ba
Feature/jenkinsfile updates (#481)
bkaiserinfosec Feb 28, 2024
86da6a0
Feature/jenkinsfile updates (#483)
bkaiserinfosec Feb 28, 2024
e019ade
Feature/jenkinsfile updates (#485)
bkaiserinfosec Mar 9, 2024
33e0b20
Feature/jenkinsfile updates (#487)
bkaiserinfosec Mar 9, 2024
509a6f1
Update pipeline-config.yaml
bkaiserinfosec Mar 9, 2024
a52196c
Feature/jenkinsfile updates (#490)
bkaiserinfosec Mar 9, 2024
716c878
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 9, 2024
0f39204
Update pipeline-config.yaml
bkaiserinfosec Mar 9, 2024
ce79251
Update Jenkinsfile (#493)
bkaiserinfosec Mar 10, 2024
686ae51
Update security_quality_gate.py (#495)
bkaiserinfosec Mar 13, 2024
b4c8b1d
Feature/update jenkins config (#497)
bkaiserinfosec Mar 13, 2024
0cc02a4
Feature/update security gate config (#499)
bkaiserinfosec Mar 13, 2024
1b2577e
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 13, 2024
0cab74c
Feature/update settings function (#501)
bkaiserinfosec Mar 18, 2024
a598136
Feature/update release based db settings (#503)
bkaiserinfosec Mar 18, 2024
bc17dcc
Feature/update release based db settings (#505)
bkaiserinfosec Mar 18, 2024
14e819d
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 18, 2024
334bc68
Feature/fix db syntax (#507)
bkaiserinfosec Mar 18, 2024
24a95b3
Feature/fix db syntax (#509)
bkaiserinfosec Mar 18, 2024
74b26f7
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 18, 2024
0b07ab0
Feature/fix syntax error (#511)
bkaiserinfosec Mar 18, 2024
e246ba0
Feature/fix syntax error (#513)
bkaiserinfosec Mar 18, 2024
4cf2ebf
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 18, 2024
f98f329
Feature/fix syntax error (#515)
bkaiserinfosec Mar 20, 2024
e50317f
Feature/fix syntax error (#517)
bkaiserinfosec Mar 22, 2024
6eb3118
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 22, 2024
9edb485
Feature/jenkins updates (#519)
bkaiserinfosec Mar 22, 2024
76926b3
Feature/jenkins updates (#521)
bkaiserinfosec Mar 22, 2024
5399fad
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 22, 2024
7dd90fa
Feature/jenkins updates (#523)
bkaiserinfosec Mar 22, 2024
8428000
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 22, 2024
3422a4f
Feature/jenkins updates (#525)
bkaiserinfosec Mar 22, 2024
07cb6a7
Feature/jenkins updates (#527)
bkaiserinfosec Mar 22, 2024
4a11094
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 22, 2024
7319eb2
Feature/jenkins updates (#529)
bkaiserinfosec Mar 22, 2024
2319495
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 22, 2024
e5e42ed
Feature/jenkins updates (#531)
bkaiserinfosec Mar 22, 2024
6f14d86
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 22, 2024
feebb21
Feature/jenkins updates (#533)
bkaiserinfosec Mar 22, 2024
137ec5a
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 22, 2024
3a610b5
Feature/add app profile update function (#535)
bkaiserinfosec Mar 23, 2024
204fd90
Feature/add app profile update function (#537)
bkaiserinfosec Mar 24, 2024
dbd1830
Feature/add app profile update function (#539)
bkaiserinfosec Mar 25, 2024
7b10a4e
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 25, 2024
93ca8b0
Feature/add app profile update function (#541)
bkaiserinfosec Mar 26, 2024
97b706c
Feature/add app profile update function (#543)
bkaiserinfosec Mar 27, 2024
8ef7434
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 27, 2024
287d6fc
Feature/add app profile update function (#545)
bkaiserinfosec Mar 30, 2024
cddb6d7
Feature/add app profile update function (#547)
bkaiserinfosec Mar 30, 2024
38bb2ec
Feature/add app profile update function (#549)
bkaiserinfosec Mar 30, 2024
1fab02e
Feature/add app profile update function (#551)
bkaiserinfosec Mar 30, 2024
8f3f2bb
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Mar 30, 2024
8b1bb1c
Feature/add app profile update function (#553)
bkaiserinfosec Mar 30, 2024
14f7d82
Feature/add app profile update function (#555)
bkaiserinfosec Mar 31, 2024
f8a4bee
Feature/add app profile update function (#557)
bkaiserinfosec Mar 31, 2024
001e68b
Feature/add app profile update function (#559)
bkaiserinfosec Mar 31, 2024
552fabf
Feature/add app profile update function (#561)
bkaiserinfosec Mar 31, 2024
96091dd
Feature/add app profile update function (#563)
bkaiserinfosec Mar 31, 2024
b812cfb
Feature/add app profile update function (#565)
bkaiserinfosec Mar 31, 2024
8e07c0c
Feature/add app profile update function (#567)
bkaiserinfosec Mar 31, 2024
a9c80db
Feature/add app profile update function (#569)
bkaiserinfosec Mar 31, 2024
10e9c2e
Feature/add app profile update function (#571)
bkaiserinfosec Mar 31, 2024
f40cc94
Update pipeline-config.yaml
bkaiserinfosec Mar 31, 2024
eb5ab9d
Update pipeline-config.yaml
bkaiserinfosec Mar 31, 2024
3fd90f0
Update pipeline-config.yaml
bkaiserinfosec Apr 1, 2024
64249d9
Feature/add app profile update function (#577)
bkaiserinfosec Apr 1, 2024
3df183a
Feature/update jenkins webhook (#579)
bkaiserinfosec Apr 1, 2024
0de06cc
Feature/update jenkins webhook (#581)
bkaiserinfosec Apr 1, 2024
3de1796
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Apr 1, 2024
84113dc
Feature/update jenkins webhook (#583)
bkaiserinfosec Apr 1, 2024
eed00b7
Feature/update jenkins webhook (#585)
bkaiserinfosec Apr 1, 2024
0f0bfd1
Feature/update jenkins webhook (#587)
bkaiserinfosec Apr 1, 2024
797acd7
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Apr 1, 2024
7c3ec82
Feature/update jenkins webhook (#589)
bkaiserinfosec Apr 2, 2024
432a4ea
Feature/update jenkins webhook (#591)
bkaiserinfosec Apr 2, 2024
822f694
Merge branch 'main' into release/0.1.0-beta/Prod-azure
bkaiserinfosec Apr 2, 2024
d44f647
Feature/add opensource testing (#593)
bkaiserinfosec Apr 3, 2024
c3749f8
Feature/add opensource testing (#595)
bkaiserinfosec Apr 3, 2024
f68f33b
Feature/add opensource testing (#597)
bkaiserinfosec Apr 4, 2024
d8c473b
Feature/add opensource testing (#599)
bkaiserinfosec Apr 4, 2024
fc4d99f
Update pipeline-config.yaml
bkaiserinfosec Apr 4, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions pipeline-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,21 +9,21 @@ stages:
branches:
- release
unitTesting:
enabled: false
enabled: true
branches: []
secretScanning:
enabled: false
enabled: true
branches:
- release
sca:
enabled: false
enabled: true
branches:
- release
codeLanguages:
- Python
- Javascript
sast:
enabled: false
enabled: true
branches:
- release
codeLanguages:
Expand All @@ -49,14 +49,14 @@ stages:
serviceName: secusphere
containerTag: latest
testRelease:
enabled: false
enabled: true
branches:
- release
targetUrl: 'https://secusphere.securityuniversal.com'
dastTestType: full
apiTargetUrl: 'https://secusphere.securityuniversal.com/api/openapi.yaml'
securityQualityGate:
enabled: false
enabled: true
branches:
- release
deploy:
Expand Down
18 changes: 9 additions & 9 deletions src/vr/api/vulns/jenkins_webhook.py
Original file line number Diff line number Diff line change
Expand Up @@ -263,23 +263,23 @@ def _determine_stages_for_app(app_name):
stage_str = ""
app_str = app_name.split('--')[0]
component_str = app_name.split('--')[1]
app_obj = BusinessApplications.query.filter(text(f"BusinessApplications.ApplicationName='{app_str}' AND BusinessApplications.ApplicationAcronym='{component_str.lower()}'")).first()
app_obj = BusinessApplications.query.filter(text(f"BusinessApplications.ApplicationName='{app_str.upper()}' AND BusinessApplications.ApplicationAcronym='{component_str.lower()}'")).first()
profile = ApplicationProfiles.query.filter_by(AppID=app_obj.ID).first()
if profile.SecretScanReq == 1:
if str(profile.SecretScanReq) == "1":
stage_str += "SECRET,"
if profile.SCAReq == 1:
if str(profile.SCAReq) == "1":
stage_str += "SCA,"
if profile.SASTReq == 1:
if str(profile.SASTReq) == "1":
stage_str += "SAST,"
if profile.IACReq == 1:
if str(profile.IACReq) == "1":
stage_str += "IAC,"
if profile.ContainerReq == 1:
if str(profile.ContainerReq) == "1":
stage_str += "DOCKER,"
if profile.InfrastructureScanReq == 1:
if str(profile.InfrastructureScanReq) == "1":
stage_str += "INFRA,"
if profile.DASTReq == 1:
if str(profile.DASTReq) == "1":
stage_str += "DAST,"
if profile.DASTApiReq == 1:
if str(profile.DASTApiReq) == "1":
stage_str += "DAPIST,"
if stage_str.endswith(","):
stage_str = stage_str[:-1]
Expand Down
1 change: 1 addition & 0 deletions src/vr/templates/base_auth.html
Original file line number Diff line number Diff line change
Expand Up @@ -237,6 +237,7 @@
<a href="{{ url_for('vulns.global_KPIs') }}" class="menu_child_btn reg">Application KPIs</a>
{% if user.is_admin %}
<a href="{{ url_for('assets.add_application') }}" class="menu_child_btn reg">Add Application</a>
<a href="{{ url_for('vulns.opensource_testing') }}" class="menu_child_btn reg">Add Open Source</a>
{% endif %}
<a href="{{ url_for('sourcecode.cheatsheets', sheet_name='Index') }}" class="menu_child_btn reg">Cheat Sheets</a>
</div>
Expand Down
57 changes: 57 additions & 0 deletions src/vr/templates/testing/opensource_testing.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
{% extends 'base_auth.html' %}

{% block app_content %}
<style>
.container { max-width: 600px; margin: auto; padding: 20px; border: 1px solid #ccc; border-radius: 5px; }
h2 { text-align: center; color: white; }
form { display: flex; flex-direction: column; }
.form-group { margin-bottom: 15px; }
.form-group label { margin-bottom: 5px; color: white; }
.form-group input { padding: 10px; font-size: 16px; border-radius: 5px; border: 1px solid #ccc; }
button { background-color: #007bff; color: white; padding: 10px 20px; font-size: 16px; border: none; border-radius: 5px; cursor: pointer; }
button:hover { background-color: #0056b3; }
</style>

<div class="container-fluid">
<!-- start of tabs -->


<div class="row hidden-xs">


<div class="container">
<h2>Open Source Libraries Security Testing</h2>
<form action="/start_opensource_testing" method="post">
<input type="hidden" name="csrf_token" value="{{ csrf_token() }}"/>
<div class="form-group">
<label for="gitUrl">Git URL:</label>
<input type="text" id="gitUrl" name="gitUrl" required>
</div>
<div class="form-group">
<label for="gitBranch">Git Branch:</label>
<input type="text" id="gitBranch" name="gitBranch" required>
</div>
<div class="form-group">
<label for="app_name">Application Name:</label>
<input type="text" id="app_name" name="app_name" required>
</div>
<button type="submit">Submit for Testing</button>
</form>
</div>

</div>


<!-- end of tabs -->
<div class="row">
<div class="col-lg-12">

</div>
<!-- /.col-lg-12 -->
</div>
<!-- /.row -->

</div>


{% endblock %}
55 changes: 54 additions & 1 deletion src/vr/vulns/web/testing.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@


NAV = {
'CAT': { "name": "Vulnerabilities", "url": "sourcecode.dashboard"}
'CAT': { "name": "Testing", "url": "sourcecode.dashboard"}
}

@vulns.route("/vulnerability_scans/<id>", methods=['GET', 'POST'])
Expand Down Expand Up @@ -126,6 +126,59 @@ def on_demand_testing():

return redirect(request.referrer)

@vulns.route("/opensource_testing")
@login_required
def opensource_testing():
try:
NAV['curpage'] = {"name": "Open Source Testing"}
user, status, user_roles = _auth_user(session, 'No Role')
if status == 401:
return redirect(url_for('admin.login'))
elif status == 403:
return render_template('403.html', user=user, NAV=NAV)

return render_template('testing/opensource_testing.html', user=user, NAV=NAV)
except RuntimeError:
return render_template('500.html'), 500



@vulns.route("/start_opensource_testing", methods=['POST'])
@login_required
def start_opensource_testing():
NAV['curpage'] = {"name": "Vulnerability Scans"}
admin_role = 'Application Admin'
role_req = ['Application Admin', 'Application Viewer']
perm_entity = 'Application'
user, status, user_roles = _auth_user(session, NAV['CAT']['name'], role_requirements=role_req,
permissions_entity=perm_entity)
status = _entity_page_permissions_filter(id, user_roles, session, admin_role)

if status == 401:
return redirect(url_for('admin.login'))
elif status == 403:
return render_template('403.html', user=user, NAV=NAV)

git_url = request.form.get('gitUrl')
git_branch = request.form.get('gitBranch')
app_name = request.form.get('app_name')

headers = {
"Accept": "application/json",
"Content-Type": "application/x-www-form-urlencoded"
}
data = {
'token': app.config['JENKINS_TOKEN'],
'GIT_URL': git_url,
'GIT_BRANCH': git_branch,
'APP_NAME': app_name,
'PROFILE_APPLICATION': 'Y'
}
url = f"{app.config['JENKINS_HOST']}/job/{app.config['JENKINS_PROJECT']}/buildWithParameters"
resp = requests.post(url, headers=headers, data=data, auth=HTTPBasicAuth(app.config['JENKINS_USER'], app.config['JENKINS_KEY']))

return redirect(url_for('assets.all_applications'))


@vulns.route("/update_application_profile", methods=['POST'])
@login_required
Expand Down