Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dependabot configuration and security fixes #169

Merged
merged 10 commits into from
Aug 31, 2022

Conversation

kiivihal
Copy link
Member

This pull-request updates the configuration of how pull-requests are scanned for vulnerabilities.

Until nats is replaces we will have to force merging requests, because we can't upgrade the current NATS versions without a refactor. This seems a waste of time, since we are going to replace it anyway.

@kiivihal kiivihal force-pushed the feature/v0.3/security-fixes-dependencies branch from e560b6a to d875e4f Compare August 30, 2022 10:01
@codecov
Copy link

codecov bot commented Aug 30, 2022

Codecov Report

Merging #169 (968202c) into main (df701a0) will decrease coverage by 0.03%.
The diff coverage is 42.85%.

❗ Current head 968202c differs from pull request most recent head cf4b918. Consider uploading reports for the commit cf4b918 to get more accurate results

@@            Coverage Diff             @@
##             main     #169      +/-   ##
==========================================
- Coverage   29.13%   29.10%   -0.04%     
==========================================
  Files         203      203              
  Lines       18151    18163      +12     
==========================================
- Hits         5289     5287       -2     
- Misses      12476    12489      +13     
- Partials      386      387       +1     
Flag Coverage Δ
unittests 29.10% <42.85%> (-0.04%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
config/config.go 65.73% <ø> (ø)
hub3/ead/description_index.go 0.00% <0.00%> (ø)
hub3/models/sparql.go 2.27% <0.00%> (ø)
hub3/server/http/handlers/search.go 0.00% <0.00%> (ø)
ikuzo/driver/elasticsearch/proxy.go 0.00% <0.00%> (ø)
hub3/fragments/api.go 22.34% <7.14%> (-0.76%) ⬇️
ikuzo/service/x/revision/repo.go 21.55% <42.30%> (+2.32%) ⬆️
ikuzo/service/x/revision/service.go 67.74% <66.66%> (+1.07%) ⬆️
config/namespace.go 85.45% <100.00%> (ø)
hub3/ead/mets.go 49.35% <100.00%> (ø)
... and 2 more

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

@@ -208,7 +208,7 @@
case strings.Contains(r.URL.EscapedPath(), "v2") || strings.Contains(r.URL.EscapedPath(), "v1"):
// direct access on get is allowed via the proxy on v2 indices
case !strings.HasPrefix(r.URL.EscapedPath(), "/_cat"):
http.Error(w, fmt.Sprintf("path %s is not allowed on esProxy", r.URL.EscapedPath()), http.StatusBadRequest)
http.Error(w, fmt.Sprintf("path %q is not allowed on esProxy", r.URL.EscapedPath()), http.StatusBadRequest)

Check warning

Code scanning / CodeQL

Reflected cross-site scripting

Cross-site scripting vulnerability due to [user-provided value](1). Cross-site scripting vulnerability due to [user-provided value](2). Cross-site scripting vulnerability due to [user-provided value](3). Cross-site scripting vulnerability due to [user-provided value](4).
kiivihal and others added 6 commits August 30, 2022 12:08
* WIP: misc fixes to support harvesting from WikiBase sparql endpoint.

* update .gitignore

* Cleanup the test and added wikibase test data.
* HUB-450: added sublogger functionality

* HUB-226: added source to DaoConfig

* defaultimagepath

* no-return

* no-return-2

* HUB-470: http response code 200 instead of 500 for deleting mets endpoint

* file gets deleted even when not in elasticsearch

* delete mets with source path

* delete mets on sourcepath +

* return error in case of file not found

* HUB-486 start cannot be greater than end

* end = 0 om het einde op te vragen

* review comments

Co-authored-by: bbimmerman <bram.bimmerman@nationaalarchief.nl>
Co-authored-by: Sjoerd Siebinga <sjoerd.siebinga@gmail.com>
@sonarcloud
Copy link

sonarcloud bot commented Aug 31, 2022

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 2 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@kiivihal kiivihal merged commit a3337aa into main Aug 31, 2022
@kiivihal kiivihal deleted the feature/v0.3/security-fixes-dependencies branch August 31, 2022 08:43
kiivihal added a commit that referenced this pull request Aug 31, 2022
* fixes: for dependabot codescanning issues.

* added github workflow configurations for codeql and dependency-review

* fixes: update namespace tests and configuration.

* update go mod

* update go dependecies.

* update go dependecies.

* fixed upgrade issues with gitea library.

* misc fixes to support harvesting from WikiBase sparql endpoint. (#168)

* WIP: misc fixes to support harvesting from WikiBase sparql endpoint.

* update .gitignore

* Cleanup the test and added wikibase test data.

* Feature/mets logging (#164)

* HUB-450: added sublogger functionality

* HUB-226: added source to DaoConfig

* defaultimagepath

* no-return

* no-return-2

* HUB-470: http response code 200 instead of 500 for deleting mets endpoint

* file gets deleted even when not in elasticsearch

* delete mets with source path

* delete mets on sourcepath +

* return error in case of file not found

* HUB-486 start cannot be greater than end

* end = 0 om het einde op te vragen

* review comments

Co-authored-by: bbimmerman <bram.bimmerman@nationaalarchief.nl>
Co-authored-by: Sjoerd Siebinga <sjoerd.siebinga@gmail.com>

Co-authored-by: Wouter Pluut <wouter.pluut@pluut.nl>
Co-authored-by: bbimmerman <bram.bimmerman@nationaalarchief.nl>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants