Thanks to visit codestin.com
Credit goes to github.com

Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
455 commits
Select commit Hold shift + click to select a range
270d057
Check for invalid whitespace in bearer token
micahlee Dec 12, 2023
02e04e3
Verify k8s service account token
micahlee Dec 6, 2023
77785d3
Merge pull request #88 from Conjur-Enterprise/cnjr-3063-k8s-status-ac…
micahlee Dec 15, 2023
32e5ac0
Validate the k8s access token has API discovery permissions
micahlee Dec 14, 2023
b4d8a98
Merge pull request #90 from Conjur-Enterprise/cnjr-3064-k8s-status-ap…
micahlee Dec 15, 2023
9eaed80
Update dev/ci scripts to inject keycloak cert via policy for OIDC
gl-johnson Nov 30, 2023
3bc942e
Merge pull request #70 from Conjur-Enterprise/add-keycloak-cert-via-p…
gl-johnson Dec 18, 2023
fe59ed3
Skip flaky test in http proxy
codihuston Dec 19, 2023
78e9706
CNJR-1428 Merge pull request #92 from Conjur-Enterprise/skip-flaky-te…
codihuston Dec 20, 2023
8345cc3
Handle record not found foreign key constraint violations
doodlesbykumbi Oct 18, 2023
d7c35de
Add policy replace test case
gl-johnson Dec 20, 2023
de43c13
Merge pull request #93 from Conjur-Enterprise/CNJR-3459-not-found-for…
gl-johnson Dec 21, 2023
0d477fd
Add OIDC integration tests through a proxy
gl-johnson Dec 19, 2023
756fcb2
Merge pull request #87 from Conjur-Enterprise/oidc-test-proxy
gl-johnson Dec 22, 2023
734a35e
Refresh self-signed certs used in AuthnJWT Cucumber tests
john-odonnell Jan 10, 2024
22fb5df
Merge pull request #118 from Conjur-Enterprise/authn-jwt-cert-refresh
john-odonnell Jan 10, 2024
ffc57a5
Adds conjurctl command to reset a Conjur user password
micahlee Nov 6, 2023
d0198a8
Adds rake task to reset a Conjur user password
micahlee Nov 6, 2023
6b86c21
Set password directly on Role object
micahlee Dec 21, 2023
62b5049
Completes and rebases the reset-password rake command and its rspec test
bsfarnsworth Dec 21, 2023
1f5c655
Merge pull request #76 from Conjur-Enterprise/CNJR-2751-user-password…
bsfarnsworth Jan 10, 2024
a4b3a38
Update CODEOWNERS
tarnowsc Jan 11, 2024
246096f
Merge pull request #119 from Conjur-Enterprise/update_codeowners
tarnowsc Jan 11, 2024
c00b0ff
Add ARM64 packages build
marek-jakubowski Nov 9, 2023
57b7ab3
Merge pull request #109 from Conjur-Enterprise/prepare-packages-for-a…
marek-jakubowski Jan 11, 2024
c990aec
Fix bill of materials for multi-arch images
apruszynski Jan 12, 2024
8ad847b
Merge pull request #123 from Conjur-Enterprise/fix-bill-of-materials-…
apruszynski Jan 12, 2024
f8fd779
Update conjur-cli to v.8
kmacinnis Dec 26, 2023
a532230
Merge pull request #99 from Conjur-Enterprise/2702-cli
kmacinnis Jan 12, 2024
85578c4
add support for arm64 - use portable method to get the thread id
tarnowsc Jan 15, 2024
695920f
Merge pull request #126 from Conjur-Enterprise/arm64_syscall
tarnowsc Jan 15, 2024
42322d4
CNJR-3427: Include pulling ARM64 images in promote step
marek-jakubowski Jan 17, 2024
5e5e21e
Merge pull request #129 from Conjur-Enterprise/fix-arm64-images-in-pr…
marek-jakubowski Jan 17, 2024
a54896b
Update authn_k8s test server fixture file names
doodlesbykumbi Jan 11, 2024
c9505ba
CNJR-0000: Merge pull request #121 from Conjur-Enterprise/authn-k8s-u…
doodlesbykumbi Jan 18, 2024
792759f
Add runas user for Appliance
codihuston Jan 4, 2024
2e2ade7
Merge pull request #130 from Conjur-Enterprise/sel-rep-read-only-foll…
mFelgate Jan 18, 2024
58643c2
Initial groundwork
jvanderhoof Nov 28, 2023
52bade4
Refactor Authn-OIDC
jvanderhoof Nov 28, 2023
8e170e1
Refactor API key authentication
jvanderhoof Nov 28, 2023
1cac005
Updates existing JWT authenticator
jvanderhoof Nov 28, 2023
964bb79
Merge pull request #72 from Conjur-Enterprise/CNJR-3264-authenticator…
jvanderhoof Jan 23, 2024
c2cc526
Adds debug-level logging
jvanderhoof Jan 29, 2024
02a3a13
Merge pull request #141 from Conjur-Enterprise/CNJR-3790-fix-ip-origi…
telday Jan 29, 2024
a3f0fe8
Adds group access authn-local socket
mFelgate Jan 29, 2024
7405f83
Merge pull request #144 from Conjur-Enterprise/Change-socket-permissions
mFelgate Jan 31, 2024
b24e99b
Change DEFAULT_RUNAS_USER to RUNAS_USER
mFelgate Feb 1, 2024
d7768b3
Merge pull request #150 from Conjur-Enterprise/update-possum-conf
mFelgate Feb 2, 2024
5d1ae99
use 5.0-stable in development and add local M1/M2 architecture
tarnowsc Jan 22, 2024
c86d61f
CNJR-391 prevent from whitespaces in the service account token
tarnowsc Jan 22, 2024
d9512fe
update tests to address warnings from rspec
tarnowsc Jan 24, 2024
0a1bb37
Merge pull request #151 from Conjur-Enterprise/whitespaces_authn_k8s
hdabrowski Feb 7, 2024
f83a01b
Catch 500 permissions issue and return 405
mFelgate Feb 13, 2024
19c516f
Merge pull request #155 from Conjur-Enterprise/follower-permissions-e…
mFelgate Feb 13, 2024
2d5965d
Forces order to prevent flapping test failures
jvanderhoof Feb 13, 2024
9e4a6f0
Merge pull request #164 from Conjur-Enterprise/CNJR-4078-force-order-…
jvanderhoof Feb 14, 2024
961c181
Upgrade puma to 6.4.2
kmacinnis Feb 20, 2024
1e173b9
Merge pull request #168 from Conjur-Enterprise/CONJSE-1831
kmacinnis Feb 20, 2024
7b59711
CNJR-3517: prevent 500 (NoMethodError 'each') when no authenticators …
tarnowsc Feb 24, 2024
52cf808
Merge pull request #173 from Conjur-Enterprise/CNJR-3517
tarnowsc Feb 26, 2024
78be48b
Pin debase ruby core source to fix the package script
tarnowsc Feb 26, 2024
ecf2501
Merge pull request #176 from Conjur-Enterprise/CNJR-3517
tarnowsc Feb 26, 2024
9bc21d4
Update Trusted Proxies to support IPv6
doodlesbykumbi Feb 12, 2024
f40c7f1
Merge pull request #159 from Conjur-Enterprise/ipv6-trusted-proxies
imheresamir Feb 26, 2024
6bac769
Update Policy Parser to support IPv6
doodlesbykumbi Feb 12, 2024
a1592ba
Merge pull request #160 from Conjur-Enterprise/ipv6-policy-parser
imheresamir Feb 26, 2024
86ea8f1
CNJR-2607 Fix for nested resources removal not audited when replacing…
Feb 26, 2024
8e129cb
Merge pull request #177 from Conjur-Enterprise/CNJR-2607-nested-resou…
Mar 6, 2024
2f1be69
CNJR-2382 Replace policy fix - policy update/patch allow to use newly…
Dec 15, 2023
0071f0c
Merge pull request #161 from Conjur-Enterprise/wip_replace_policy_fix
Mar 6, 2024
d99bcc5
Bump debase-ruby_core_source to 3.2.2
marek-jakubowski Mar 6, 2024
66d1075
Merge pull request #190 from Conjur-Enterprise/bump-debase
marek-jakubowski Mar 7, 2024
831ad12
fix 'No CONJUR_DATA_KEY' error in CI
tarnowsc Mar 8, 2024
7788313
Merge pull request #195 from Conjur-Enterprise/rails_env
tarnowsc Mar 8, 2024
20035dc
Use the same timestamp basis for token claims
micahlee Mar 8, 2024
4228345
Merge pull request #197 from Conjur-Enterprise/cnjr-4371-consistent-t…
micahlee Mar 8, 2024
2dde9e4
Use internal keycloak image
micahlee Mar 12, 2024
271bc8a
CNJR-4374: improve policy_log trigger performance
tarnowsc Mar 13, 2024
c315005
Merge pull request #205 from Conjur-Enterprise/policy_log_trigger_per…
tarnowsc Mar 13, 2024
1c8f376
Preparation Work
jvanderhoof Mar 7, 2024
5ca28a0
Removes embedded Factories
jvanderhoof Mar 7, 2024
0371f45
Resolves CNJR-4058 - support for defining Factory location
jvanderhoof Mar 7, 2024
426ceb9
Resolves CNJR-3863 - Factory created resource can be retrieved
jvanderhoof Mar 7, 2024
711f4fb
Resolves CNJR-4205 - bulk Factory resource retrieval
jvanderhoof Mar 7, 2024
77363f2
Adds support for "circuit-breaker" behavior
jvanderhoof Mar 7, 2024
80ee038
Adds Changelog entry & Update documentation
jvanderhoof Mar 8, 2024
d1812a9
Merge pull request #198 from Conjur-Enterprise/CNJR-3859-Policy-Facto…
jvanderhoof Mar 13, 2024
bf32586
Upgrade rack to 2.2.8.1
kmacinnis Mar 13, 2024
fa75d0f
CONJSE-1843 Merge pull request #206 from Conjur-Enterprise/upgrade-ra…
codihuston Mar 13, 2024
d69a249
Add url scanning to pipeline
gl-johnson Mar 11, 2024
7827e23
Remove internal links
gl-johnson Mar 13, 2024
eff40f4
Merge pull request #200 from Conjur-Enterprise/CNJR-4105-internal-url…
gl-johnson Mar 14, 2024
a960f65
Replace usage of kubectl cp when used with CLI containers
imheresamir Mar 15, 2024
53c4a5b
Merge pull request #209 from Conjur-Enterprise/dont-use-kubectl-cp-wi…
micahlee Mar 15, 2024
4160b0a
Update the credentials controller to log 401 error message
mFelgate Mar 19, 2024
dfbbb9c
Merge pull request #212 from Conjur-Enterprise/pass-change-error-logging
mFelgate Mar 19, 2024
64399c5
CNJR-4420: improve 'is_role_allowed_to' performance on large datasets
tarnowsc Mar 7, 2024
fa888d6
Merge pull request #196 from Conjur-Enterprise/is_role_allowed_to
tarnowsc Mar 29, 2024
4837125
Adds IPv6 test suite with OIDC happy path
gl-johnson Mar 27, 2024
c187889
Merge pull request #215 from Conjur-Enterprise/CNJR-3850-oidc-ipv6-tests
gl-johnson Apr 2, 2024
313ed25
Add authn-jwt happy path tests for IPv6
gl-johnson Mar 27, 2024
de11dca
Merge pull request #220 from Conjur-Enterprise/CNJR-3849-authn-jwt-ip…
gl-johnson Apr 3, 2024
1861057
Add boilerplate for policy validation
codihuston Apr 1, 2024
ef655bf
CNJR-4489: Merge pull request #228 from Conjur-Enterprise/CNJR-4489
codihuston Apr 3, 2024
5d99f30
Update authn-k8s tests with IPv6 scenario
gl-johnson Apr 3, 2024
3966f14
Prefer URI.hostname for better IPv6 support
gl-johnson Apr 3, 2024
471362e
Merge pull request #224 from Conjur-Enterprise/CNJR-3848-authn-k8s-ip…
gl-johnson Apr 4, 2024
de60054
Switch to statement level triggers for data loaded into policy_log
marek-jakubowski Mar 25, 2024
628c8da
Merge pull request #233 from Conjur-Enterprise/policy-log-statement-t…
marek-jakubowski Apr 10, 2024
a781688
Upgrade ruby in container for authn-k8s tests
codihuston Apr 15, 2024
9cd9d2e
CONJSE-1716: Merge pull request #249 from Conjur-Enterprise/CONJSE-1716
codihuston Apr 15, 2024
047b035
CNJR-4394: fix user identifier handling
tarnowsc Apr 17, 2024
c0f7b52
Merge pull request #253 from Conjur-Enterprise/user_addressing
tarnowsc Apr 25, 2024
18a4680
Add basic error explainer function
kmacinnis Apr 25, 2024
e6ce4bc
Merge pull request #272 from Conjur-Enterprise/CNJR-4528-explain-error
kmacinnis Apr 25, 2024
49d7580
CNJR-4576: explicitly generate coverage report instead of using an ex…
tarnowsc Apr 29, 2024
4b087fc
Merge pull request #274 from Conjur-Enterprise/authnk8s_gke_coverage
micahlee May 1, 2024
d21806f
Decouples the parser from the versioning, moving the parser to Policy…
bsfarnsworth Apr 4, 2024
a59b8eb
Merge pull request #268 from Conjur-Enterprise/CNJR-4525-PVA
bsfarnsworth May 1, 2024
d1753e8
Cleanup: Remove deprecated docker compose file version
micahlee May 7, 2024
fbfb5eb
Cleanup: Remove double negative from CLI help
micahlee May 7, 2024
7f5fb9f
Cleanup: Fix whitespace linting
micahlee May 7, 2024
6a336df
Add options to disable the authn-local and rotation processes
micahlee May 7, 2024
7b1ed77
Merge pull request #286 from Conjur-Enterprise/cnjr-3503-no-rotation
micahlee May 8, 2024
819eb1d
Create framework for returning enhanced error messages
kmacinnis May 16, 2024
608f30c
Merge pull request #301 from Conjur-Enterprise/explain-error
kmacinnis May 24, 2024
46b0022
Order permissions and annotations
kmacinnis May 29, 2024
9a6cc5a
Merge pull request #325 from Conjur-Enterprise/CNJR-5060
kmacinnis May 30, 2024
2468be7
CNJR-0000: Remove post build trigger
szh May 23, 2024
62e0713
Merge pull request #314 from Conjur-Enterprise/fix-nightly
szh Jun 3, 2024
4f6b4e5
CONJSE-1875: Recursively delete policy objects
szh May 29, 2024
9770235
Add rake tasks to clean up orphaned roles
szh Jun 3, 2024
72f1e4e
Disable copying to Github until security fix is ready for release
szh Jun 6, 2024
fe2f1b8
Merge pull request #329 from Conjur-Enterprise/CONJSE-1875
szh Jun 7, 2024
7c8782a
Adds support for prefix a user's role_id with "user/"
jvanderhoof Jun 6, 2024
41ac900
Merge pull request #331 from Conjur-Enterprise/CNJR-5214-support-user…
jvanderhoof Jun 11, 2024
6b3d198
Update Rails to 6.1.7.8
micahlee Jun 12, 2024
0bd514f
Merge pull request #335 from Conjur-Enterprise/conjse-1876-update-rails
micahlee Jun 14, 2024
3021bdf
CONJSE-1875: Recursive cleanup of orphaned roles and resources
szh Jun 18, 2024
754160b
Merge pull request #342 from Conjur-Enterprise/fix-orphaned-cleanup
szh Jul 1, 2024
36d6c63
Update the policy parsing and error messages
kmacinnis Jul 3, 2024
0c96d4f
Merge pull request #365 from Conjur-Enterprise/CNJR-5500
kmacinnis Jul 9, 2024
57fbe49
CNJR-5501 Policy Load flow subtask of Policy Sytax Validator
bsfarnsworth Apr 5, 2024
ea665af
Merge pull request #375 from Conjur-Enterprise/CNJR-5501
bsfarnsworth Jul 10, 2024
f2eda0b
CNJR-5502 Policy Syntax Validator
bsfarnsworth Jul 9, 2024
2703aba
Merge pull request #379 from Conjur-Enterprise/CNJR-5502
kmacinnis Jul 12, 2024
1beda1e
Use Cobertura for HTML coverage report in Jenkins
imheresamir Jul 15, 2024
40054f0
Merge pull request #382 from Conjur-Enterprise/improve-code-coverage
imheresamir Jul 15, 2024
c902214
Rename the API parameter from 'validate' to 'dryRun'
kmacinnis Jul 12, 2024
8424582
Merge pull request #381 from Conjur-Enterprise/CNJR-5201
kmacinnis Jul 15, 2024
7135736
Effective policy
Jun 11, 2024
616611e
Merge pull request #337 from Conjur-Enterprise/effective_policy
tarnowsc Jul 16, 2024
4a469ee
CNJR-2040: add support for variable with slash in identifier
tarnowsc Jul 16, 2024
c16d141
Merge pull request #385 from Conjur-Enterprise/effective_policy_synch…
tarnowsc Jul 16, 2024
e60e2b1
CNJR-2040 Effective policy handling admin owner in root
tarnowsc Jul 16, 2024
ed6ef16
Merge pull request #387 from Conjur-Enterprise/effective-policy-admin
tarnowsc Jul 17, 2024
c2d90be
Add PoliciesController request integration tests
kmacinnis Jun 26, 2024
3675499
Merge pull request #351 from Conjur-Enterprise/CNJR-5212
kmacinnis Jul 17, 2024
08bf7e2
Convert PROMOTE block to use infrapool node
andytinkham Jul 18, 2024
bd7ebf5
Add PROMOTE mode security scans
andytinkham Jul 18, 2024
d0f925d
Replace scanAndReport with runSecurityScans in normal builds
andytinkham Jul 18, 2024
140b399
Merge pull request #394 from Conjur-Enterprise/convertRunSecurityScans
andytinkham Jul 19, 2024
6f68d4c
CNJR-232: Add logging for 401/403 status
Jul 11, 2024
bfe45f2
Merge pull request #380 from Conjur-Enterprise/CNJR-232
Jul 23, 2024
fe12611
CNJR-5644: Add subcommand to dev/cli to run cli as admin
Jul 29, 2024
f7e327c
Merge pull request #404 from Conjur-Enterprise/CNJR-5644-admin-cli
Aug 5, 2024
f7e9081
Restore copy to public GH during promote
jtuttle Aug 21, 2024
0b94711
Merge pull request #434 from Conjur-Enterprise/add-gh-copy-to-promote
ismarc Aug 21, 2024
46f0c15
Update conjur-ubi paths in promotion step
jtuttle Aug 22, 2024
1449f09
Merge pull request #436 from Conjur-Enterprise/fix-promotion-ubi-imag…
ismarc Aug 22, 2024
e568d4b
Add missing 'arch' param in Jenkinsfile and fix typo
jtuttle Aug 22, 2024
bad2e57
Merge pull request #437 from Conjur-Enterprise/fix-jenkinsfile-archit…
ismarc Aug 22, 2024
a80ecb6
Update promote step to source registry images
jtuttle Aug 22, 2024
dc20712
Merge pull request #438 from Conjur-Enterprise/fix-promote-source-image
ismarc Aug 23, 2024
13cff14
Use local tag during promote
jtuttle Aug 23, 2024
ab7b8c1
Merge pull request #439 from Conjur-Enterprise/use-local-tag-during-p…
ismarc Aug 23, 2024
5cdaff5
Migrate dry run to use transactions
codihuston Jul 22, 2024
645e58d
Add poc scripts
codihuston Jul 25, 2024
16f62e7
Add diff stage
codihuston Jul 25, 2024
eeb4677
CNJR-5833 Policy Dry Run Slice 1A - transaction rollback
codihuston Jul 25, 2024
cf2c7eb
Merge pull request #412 from Conjur-Enterprise/CNJR-5833
bsfarnsworth Aug 28, 2024
4d4cfce
Add bash prints for promotion debugging
jtuttle Aug 29, 2024
783fb8d
Merge pull request #460 from Conjur-Enterprise/add-bash-prints
ismarc Aug 29, 2024
93d0211
CNJR-5848 Policy Dry Run Slice 1B - REST API
bsfarnsworth Aug 29, 2024
7614ad5
Merge pull request #458 from Conjur-Enterprise/CNJR-5848
bsfarnsworth Sep 3, 2024
801314f
Remove unnecessary rescue statements
kmacinnis Aug 29, 2024
264f8d6
Merge pull request #461 from Conjur-Enterprise/CNJR-5607
kmacinnis Sep 3, 2024
d9bd8a8
Address bug that caused writable follower http error code change
codihuston Sep 4, 2024
67baec4
CNJR-6408: Merge pull request #479 from Conjur-Enterprise/CNJR-6408
codihuston Sep 4, 2024
4a5df2a
Fixes a bug where the defined scope is not passed to the OIDC provider
jvanderhoof Sep 5, 2024
780c009
Merge pull request #477 from Conjur-Enterprise/CNJR-6393-oidc-scope
jvanderhoof Sep 6, 2024
526bc75
Add policy dry run e2e tests
codihuston Sep 3, 2024
7d7c216
CNJR-5849: Merge pull request #462 from Conjur-Enterprise/CNJR-5849
codihuston Sep 6, 2024
14ca0c0
Address bug that caused writable follower http error code change duri…
codihuston Sep 5, 2024
f56d5cd
CNJR-6408: Merge pull request #481 from Conjur-Enterprise/CNJR-6408-p…
codihuston Sep 6, 2024
c52d0cd
Updates authentication response to ensure only an error code is retur…
jvanderhoof Sep 3, 2024
c759459
Merge pull request #476 from Conjur-Enterprise/ONYX-60466-remove-auth…
jvanderhoof Sep 10, 2024
7a51302
CNJR-5954: Fix promotion not pushing version without id
szh Sep 11, 2024
ce1a403
Use Gen1 Gcloud function env
szh Sep 12, 2024
179580b
Merge pull request #483 from Conjur-Enterprise/fix-promote
jtuttle Sep 12, 2024
14a1372
CNJR-5954: Push unified manifest to DockerHub
szh Sep 13, 2024
a8a2cd8
CNJR-5954: Fix Jenkins post promote command
szh Sep 16, 2024
c15bc1a
CNJR-5954: Don't push internal releases to Docker Hub edge tag
szh Sep 17, 2024
76372a1
Merge pull request #484 from Conjur-Enterprise/fix-promote
szh Sep 18, 2024
2e1a787
Enable user/host token TTL to be set
jvanderhoof May 30, 2024
6579224
Merge pull request #457 from Conjur-Enterprise/authenticator-refactor…
jvanderhoof Sep 19, 2024
3dd779e
Push edge tag along with latest
szh Sep 23, 2024
ff2acb6
Merge pull request #503 from Conjur-Enterprise/push-edge
szh Sep 26, 2024
a76ad91
Bump webrick to 1.8.2
codihuston Sep 26, 2024
d46801c
Merge pull request #510 from Conjur-Enterprise/CONJSE-1907
micahlee Sep 30, 2024
d2ff647
CNJR-6904: Add notice of PSV to CHANGELOG
bsfarnsworth Oct 2, 2024
506608b
Create data_transfer_obj_factory
kmacinnis Sep 26, 2024
81b2ce9
Merge pull request #511 from Conjur-Enterprise/CNJR-5839
kmacinnis Oct 2, 2024
b3c1959
Replaces the original templating engine with Mustache
jvanderhoof Sep 27, 2024
ed7fe23
Merge pull request #512 from Conjur-Enterprise/CNJR-6700-replace-erb-…
jvanderhoof Oct 21, 2024
e694b5f
CNJR-6424: Clean up Pylint issues
hdabrowski Oct 23, 2024
8b632e6
Merge pull request #558 from Conjur-Enterprise/clean-pylint
hdabrowski Oct 23, 2024
34c8615
CNJR-6425: Ignore irrelevant Snyk issues
hdabrowski Oct 23, 2024
1a5717f
Merge pull request #559 from Conjur-Enterprise/cleanup-snyk
hdabrowski Oct 24, 2024
fd05184
CNJR-5840: Implement Policy Dry Run - Raw Diff
bsfarnsworth Sep 17, 2024
8e5cf26
CNJR-5840: Merge pull request #491 from Conjur-Enterprise/CNJR-5840
codihuston Oct 25, 2024
8967d8a
Update diff to include original attributes of an updated resource
codihuston Oct 8, 2024
8f613e1
Cleanup: move data object files
codihuston Oct 24, 2024
0c75e03
CNJR-6871: Merge pull request #550 from Conjur-Enterprise/CNJR-6871
codihuston Oct 28, 2024
98dd894
Fix warnings
GheaChaw Oct 24, 2024
6b7875a
Merge pull request #570 from Conjur-Enterprise/external-pr-3007
szh Oct 30, 2024
f715054
CNJR-5196 update REXML to mitigate CVE-2024-49761
tarnowsc Oct 30, 2024
29cdca8
Merge pull request #571 from Conjur-Enterprise/CVE-2024-49761
tarnowsc Oct 30, 2024
a3fdb92
Remove all experimental/partially implemented features
jvanderhoof Oct 11, 2024
f9b7cd6
Introduces a context object to hold request details
jvanderhoof Oct 7, 2024
9d412bb
Adds audit events to Policy Factory actions
jvanderhoof Oct 7, 2024
0f3fba3
Merge pull request #565 from Conjur-Enterprise/CNJR-6891-add-base-fac…
jvanderhoof Oct 30, 2024
344c177
CNJR-6107: Implement Raw Diff Mapper
bsfarnsworth Oct 30, 2024
fd3368b
Merge pull request #560 from Conjur-Enterprise/CNJR-6107
bsfarnsworth Oct 31, 2024
beb98e7
CNJR-6999: Policy Dry Run Create
bsfarnsworth Nov 1, 2024
4520854
Merge pull request #576 from Conjur-Enterprise/CNJR-6999
bsfarnsworth Nov 12, 2024
a7b1aba
Remove policy_id as a required field on conjur primitive DTO
codihuston Oct 30, 2024
6ae2625
Update policy diff mapping to only append unique records
codihuston Nov 5, 2024
1225ab2
Add update to policy dryrun REST API response
codihuston Oct 30, 2024
652aca2
CNJR-6109: Merge pull request #578 from Conjur-Enterprise/CNJR-6109
codihuston Nov 15, 2024
e0039ca
Add delete items to policy dryrun REST API response
codihuston Nov 14, 2024
cfde3f4
CNJR-6108: Merge pull request #583 from Conjur-Enterprise/CNJR-6108-codi
codihuston Nov 15, 2024
998b0ca
Temporarily disable security scans
codihuston Nov 19, 2024
229658b
CNJR-7203: Merge pull request #588 from Conjur-Enterprise/CNJR-7203
codihuston Nov 19, 2024
b942141
Revert "Temporarily disable security scans"
codihuston Nov 19, 2024
9db324d
CNJR-7203: Merge pull request #589 from Conjur-Enterprise/revert-588-…
codihuston Nov 19, 2024
eebd369
Update VSCode debugging instructions
szh Nov 19, 2024
d68abbf
Update changelog
szh Nov 20, 2024
4a4fd0e
Merge pull request #590 from Conjur-Enterprise/update-debug-instructions
szh Nov 21, 2024
d83b687
Bump json-jwt from 1.16.3 to 1.16.6
dependabot[bot] Nov 22, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
1 change: 1 addition & 0 deletions .dockerignore
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ cucumber

*.deb
.git
.idea
engines/conjur_audit/spec/dummy/log
coverage
demo
Expand Down
10 changes: 6 additions & 4 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -1,10 +1,12 @@
* @cyberark/conjur-core-team @conjurinc/conjur-core-team @conjurdemos/conjur-core-team
* @cyberark/conjur-core-team @conjurinc/conjur-core-team @conjurdemos/conjur-core-team @conjur-enterprise/conjur-core @conjur-enterprise/community-and-integrations @conjur-enterprise/transition-tech

# Changes to .trivyignore require Security Architect approval
.trivyignore @cyberark/security-architects @conjurinc/security-architects @conjurdemos/security-architects
.trivyignore @cyberark/security-architects @conjurinc/security-architects @conjurdemos/security-architects @conjur-enterprise/conjur-security

# Changes to .codeclimate.yml require Quality Architect approval
.codeclimate.yml @cyberark/quality-architects @conjurinc/quality-architects @conjurdemos/quality-architects
.codeclimate.yml @cyberark/quality-architects @conjurinc/quality-architects @conjurdemos/quality-architects @conjur-enterprise/conjur-quality

*.md @conjur-enterprise/r-d-developers @conjur-enterprise/transition-tech

# Changes to SECURITY.md require Security Architect approval
SECURITY.md @cyberark/security-architects @conjurinc/security-architects @conjurdemos/security-architects
SECURITY.md @cyberark/security-architects @conjurinc/security-architects @conjurdemos/security-architects @conjur-enterprise/conjur-security
4 changes: 3 additions & 1 deletion .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,8 @@ api.html

brakeman-output.*
.idea
.vscode
.vscode/*
!.vscode/launch.json
TEMP_NOTES.txt
awstest

Expand All @@ -74,3 +75,4 @@ conjur_git_commit
dev/policies/authenticators/authn-oidc/identity-users.yml

VERSION
key.txt
27 changes: 27 additions & 0 deletions .simplecov
Original file line number Diff line number Diff line change
@@ -1,3 +1,5 @@
require 'socket'

SimpleCov.start('rails') do
command_name "SimpleCov #{rand(1000000)}"
coverage_dir File.join(ENV['REPORT_ROOT'] || __dir__, 'coverage')
Expand All @@ -7,6 +9,9 @@ SimpleCov.start('rails') do
primary_coverage :branch
end

# Generate coverage report on exit, this is not going to interfere with the socket server approach and is meant for a
# different use case. This will generate the report when the process exits and there is no need to keep process running
# to keep the pod alive until the report can be gathered by the CI.
SimpleCov.at_exit do
puts "Formatting SimpleCov coverage report"
SimpleCov.result.format!
Expand All @@ -15,3 +20,25 @@ SimpleCov.at_exit do
sleep
end
end

# We open a UNIX socket server to listen for requests to generate the report. The coverage data is gathered from the
# service process and integration tests are executed in a separate process. This allows us to generate the report
# after the integration tests are executed in a synchronous way. This will prevent from attempt go gather the report
# before it is fully generated since the socket communication will block the request until the report is generated.
# The socket server will listen for a request to generate the report and will return a message when the report is
# generated. Intentionally this will support only a single request to generate the report, subsequent requests should
# be treated as an error.
server = UNIXServer.new("/tmp/simplecov.sock")

Thread.new do
session = server.accept
request = session.gets

if request&.strip == "generate_report"
SimpleCov.result.format!
session.puts "Report generated"
else
session.puts "Unknown command"
end
session.close
end
93 changes: 0 additions & 93 deletions .trivyignore
Original file line number Diff line number Diff line change
@@ -1,93 +0,0 @@
# OpenSSL CVEs
#
# Because of the way OpenSSL 1.0.2 has moved to premium support and our Ubuntu
# base image, trivy flags a number of OpenSSL issues in Conjur because the fix
# for most Ubuntu users is to move to 1.1.1 instead of having the continued support
# in the 1.0.2 line. Additionally, trivy flages 1.0.2zf as vulnerable to issues that
# only affect 1.1.x. As of the time of this writing, we use 1.0.2zf which either
# has the fix or is unaffected by these issues.
CVE-2022-2097
CVE-2022-2068
CVE-2022-1292
CVE-2022-0778
CVE-2021-23841
CVE-2021-23840
CVE-2021-3712
CVE-2019-1563
CVE-2019-1551
CVE-2019-1549
CVE-2019-1547
CVE-2018-0735
CVE-2018-0734

# NULL pointer deref. OpenSSL 1.0.2 is not impacted
CVE-2021-3449

# We already use a later version than the ones listed as impacted by this
# CVE, so we believe this is just a scanner issue.
CVE-2014-7819

# Rake vulnerability for versions < 12.3.3. The version of Rake used by Conjur
# has been updated to 13.0.1. Some of the Conjur dependencies still declare a
# vulnerable version of Rake in their development dependencies, but do not pose
# a risk to Conjur.
CVE-2020-8130

# Applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake
# may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert"
# TLS extension. this issue was fixed in OpenSSL 1.1.1g
#
# In order to support fips with openssl we are required to downgrading openssl version to 1.0.2 until openssl will
# support fips module in newer versions
# This vulnerability this is not relevant to us as
# 1. The installed version (1.0.2u) does not support 1.3
# 2. Trivy detect the usage of openssl 1.0.2 (can be reproduced with
# docker run -v /var/run/docker.sock:/var/run/docker.sock
# -v $(PWD):/workspace --rm aquasec/trivy -f json -o /workspace/scan_results-conjur-unfixed.json --no-progress
# --ignorefile .trivyignore registry.tld/ruby-fips-base-image-phusion:1.0.0)
#
# Performed by @yahalomk approved by @shaharglazner
CVE-2020-1967

# CVE-2020-1971
# The X.509 GeneralName type is a generic type for representing different types
# of names. One of those name types is known as EDIPartyName. OpenSSL provides a
# function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME
# to see if they are equal or not. This function behaves incorrectly when both
# GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash
# may occur leading to a possible denial of service attack.
# OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes:
#
# 1) Comparing CRL distribution point names between an available CRL and a CRL
# distribution point embedded in an X509 certificate.
#
# 2) When verifying that a timestamp response token signer matches the timestamp
# authority name (exposed via the API functions TS_RESP_verify_response and
# TS_RESP_verify_token) If an attacker can control both items being compared
# then that attacker could trigger a crash.
#
# All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Fixed in OpenSSL
# 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
#
# In order to support FIPS with OpenSSL we are required to use OpenSSL version
# 1.0.2 until OpenSSL supports the FIPS module in newer versions. The latest
# available version to us is 1.0.2u, which does not include this fix.
#
# We've determined that we are not impacted by this vulnerability because:
# - we do not directly perform CRL checks in the Conjur or DAP software
# - we do not enable automatic CRL checks in openssl tools
# - we do not call any of the impacted OpenSSL APIs or any of the APIs that expose
# impacted behavior.
#
# Performed by @micahlee, approved by @andytinkham
CVE-2020-1971

# CVE-2021-3711
# The vulnerability is not affected Conjur's version of OpenSSL 1.0.2u (https://www.openssl.org/news/secadv/20210824.txt)
# Conjur does not use SM2 algorithm (https://www.openssl.org/docs/manmaster/man7/SM2.html)
CVE-2021-3711

# We have the fix for CVE-2023-0286 in openssl 1.0.2zg, but because OpenSSL 1.0.2
# is only available in premium support, trivy thinks we should use something in the 1.1.1
# line. We can't, due to FIPS compliance, so need to continue to ignore this issue.
CVE-2023-0286
15 changes: 15 additions & 0 deletions .vscode/launch.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
{
// See CONTRIBUTING.md for more details on debugging Conjur in VSCode
"version": "0.2.0",
"configurations": [
{
"type": "rdbg",
"request": "attach",
"name": "Attach with rdbg (tcp 12345)",
"debugPort": "127.0.0.1:12345",
"localfsMap": "/src/conjur-server:${workspaceFolder}"
// In the conjur container, run:
// bundle exec rdbg --open --port=12345 --host=0.0.0.0 -c -- rails server -b 0.0.0.0 -u webrick
},
]
}
2 changes: 1 addition & 1 deletion API_VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
5.3.0
5.3.1
Loading
Loading