Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
49 changes: 24 additions & 25 deletions .github/workflows/jit-security.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-trivy-alpine:latest

enrich:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'enrich' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-enrichment-code'
runs-on: ubuntu-22.04
Expand All @@ -31,7 +31,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-enrichment-slim:latest

iac-misconfig-detection-kubernetes:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'iac-misconfig-detection-kubernetes' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-kubernetes-iac-misconfiguration-detection'
runs-on: ubuntu-22.04
Expand All @@ -42,7 +42,7 @@ jobs:
with:
security_control: registry.jit.io/control-kubescape-slim:latest
security_control_output_file: /code/results.json

remediation-pr:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'remediation-pr' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-remediation-pr'
runs-on: ubuntu-22.04
Expand All @@ -53,7 +53,7 @@ jobs:
with:
security_control: registry.jit.io/open-remediation-pr-alpine:latest
security_control_output_file: /opt/code/jit-report/results.json

secret-detection:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'secret-detection' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-secret-detection'
runs-on: ubuntu-22.04
Expand All @@ -64,7 +64,7 @@ jobs:
with:
security_control: registry.jit.io/control-gitleaks-alpine:latest
security_control_output_file: /tmp/report.json

software-bill-of-materials:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-bill-of-materials' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sbom'
runs-on: ubuntu-22.04
Expand All @@ -75,7 +75,7 @@ jobs:
with:
security_control: registry.jit.io/control-syft-alpine:latest
fail_if_cannot_checkout: false

software-component-analysis-go:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-go' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-22.04
Expand All @@ -85,7 +85,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-nancy-alpine:latest

software-component-analysis-java:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-java' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-22.04
Expand All @@ -95,7 +95,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-osv-scanner-alpine:latest

software-component-analysis-js:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-js' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-22.04
Expand All @@ -106,7 +106,7 @@ jobs:
with:
security_control: registry.jit.io/control-npm-audit-slim:latest
security_control_output_file: /code/jit-report/enriched-audit-results.json

software-component-analysis-php:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-php' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-22.04
Expand All @@ -116,7 +116,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-osv-scanner-alpine:latest

software-component-analysis-poetry:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-poetry' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-22.04
Expand All @@ -126,7 +126,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-osv-scanner-alpine:latest

software-component-analysis-python:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-python' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-22.04
Expand All @@ -136,7 +136,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-osv-scanner-alpine:latest

software-component-analysis-trivy-csharp:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-trivy-csharp' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-22.04
Expand All @@ -146,7 +146,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-trivy-dotnet-slim:latest

static-code-analysis-c-cpp:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-c-cpp' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -156,7 +156,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-csharp:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-csharp' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -166,7 +166,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-go:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-go' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -176,7 +176,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-gosec-alpine:latest

static-code-analysis-java:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-java' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -186,7 +186,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-js:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-js' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -196,7 +196,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-kotlin:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-kotlin' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -206,7 +206,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-php:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-php' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -216,7 +216,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-python-semgrep:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-python-semgrep' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -226,7 +226,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-ruby:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-ruby' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -236,7 +236,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-rust:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-rust' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -246,7 +246,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

static-code-analysis-scala:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-scala' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -256,7 +256,7 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks like there are lots of formatting changes, you can remove this from this PR

static-code-analysis-swift:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-swift' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-22.04
Expand All @@ -266,4 +266,3 @@ jobs:
uses: jitsecurity-controls/jit-github-action@v4.2.2
with:
security_control: registry.jit.io/control-semgrep-alpine:latest

1 change: 1 addition & 0 deletions .jit/jit-integration.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is this empty file?

1 change: 1 addition & 0 deletions build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -172,6 +172,7 @@ dependencies {
testImplementation 'org.apache.commons:commons-csv:1.5'
testImplementation 'org.awaitility:awaitility:4.2.0'
implementation 'commons-validator:commons-validator:1.7'
testImplementation 'com.icegreen:greenmail-junit5:1.6.1'
}

tasks.named('test') {
Expand Down
19 changes: 19 additions & 0 deletions src/main/resources/application.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -271,3 +271,22 @@ fspconfig:
payerfsp2: "gorilla"

totalvouchers: 30


messageGateway:
contactpoint: "https://messagegateway.sandbox.fynarfin.io"
endpoint:
email: "/emails"

spring:
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you can ignore this level: spring. we don't need unless we cant avoid it

mail:
host: ${EMAIL_URL:localhost}
port: 3025
username: greenmail
password: greenmail
properties:
mail:
smtp:
auth: false
starttls:
enable: false
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

google smtp requies TLS. can we test this with TLS for more compatibility?

Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
package org.mifos.integrationtest.common.dto;

import java.util.List;
import lombok.Getter;
import lombok.Setter;

@Getter
@Setter
public class EmailRequestDTO {

private List<String> to;
private String subject;
private String body;

public EmailRequestDTO(List<String> to, String subject, String body) {
this.to = to;
this.subject = subject;
this.body = body;
}
}
Loading