-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(config-api): validation and check enabled for default authentication method #8706
Conversation
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
…thentication issue#8384 Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
…d service validation Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Signed-off-by: pujavs <[email protected]>
Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.
Note 🟢 Risk threshold not exceeded. Change Summary (click to expand)The following is a summary of changes in this pull request made by me, your security buddy 🤖. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. Summary: The code changes in this pull request focus on improving the security and robustness of the Jans Config API application. The changes span multiple files and components, including the Key security-related changes include:
Overall, the changes in this pull request appear to be focused on improving the security and reliability of the Jans Config API application. While the specific security implications may depend on the broader context and architecture of the application, the changes introduced in this pull request are generally positive from an application security perspective. Files Changed:
Powered by DryRun Security |
Please retry analysis of this Pull-Request directly on SonarCloud |
|
…ion method (#8706) * fix(config-api): user attribute validation error handling Signed-off-by: pujavs <[email protected]> * fix(config-api): user attribute validation error handling Signed-off-by: pujavs <[email protected]> * fix(config-api): user attribute validation error handling Signed-off-by: pujavs <[email protected]> * fix: added new IDP attributes Signed-off-by: pujavs <[email protected]> * fix: added new IDP attributes Signed-off-by: pujavs <[email protected]> * fix(config-api): idp default values set Signed-off-by: pujavs <[email protected]> * fix(config-api): idp metadata default values issue#8384 Signed-off-by: pujavs <[email protected]> * feat: idp metadata default value and removing filepath in document-store Signed-off-by: pujavs <[email protected]> * feat: idp metadata default value and removing filepath in document-store Signed-off-by: pujavs <[email protected]> * fix: assetmgt and idp changes Signed-off-by: pujavs <[email protected]> * fix: assetmgt and idp changes Signed-off-by: pujavs <[email protected]> * fix(config-api): validation for imp fields of asset mgt Signed-off-by: pujavs <[email protected]> * feat(config-api): pagination for get asset by name, asset filename and service validation Signed-off-by: pujavs <[email protected]> * fix(config-api): added asset validation, removed redundant fields for TR Signed-off-by: pujavs <[email protected]> * fix(config-api): agama swagger spec changes Signed-off-by: pujavs <[email protected]> * fix(config-api): agama swagger spec changes Signed-off-by: pujavs <[email protected]> * fix(config-api): added asset validation, removed redundant fields for TR Signed-off-by: pujavs <[email protected]> * fix(config-api): added asset validation, removed redundant fields for TR Signed-off-by: pujavs <[email protected]> * fix(config-api): added asset validation, removed redundant fields for TR Signed-off-by: pujavs <[email protected]> * feat(config-api): user mgt error handling Signed-off-by: pujavs <[email protected]> * feat(config-api): user mgt error handling Signed-off-by: pujavs <[email protected]> * feat(config-api): user mgt error handling Signed-off-by: pujavs <[email protected]> * feat(config-api): asset mgt service module changes Signed-off-by: pujavs <[email protected]> * docs(config-api): configuration description changes for swagger spec Signed-off-by: pujavs <[email protected]> * fix(core): removed redundant field from jans attribute issue#8665 Signed-off-by: pujavs <[email protected]> * fix(config-api) acr validaion for active custom script issue#8683 Signed-off-by: pujavs <[email protected]> * fix(config-api): default acr and custom script Signed-off-by: pujavs <[email protected]> * fix(config-api): default acr and custom script Signed-off-by: pujavs <[email protected]> --------- Signed-off-by: pujavs <[email protected]> Former-commit-id: 7eb36ec
Prepare
Description
Target issue
closes #8683
Implementation Details
Only an enabled custom script can be set as Default authentication method
If the default authentication method script is disabled using config-api
/jans-config-api/api/v1/config/scripts
endpoint then default authentication value is removed.Test and Document the changes