[ACS-9036] Fix failing tests in acs-packaging FromLegacyAcsUpgradeTest #3534
ci.yml
on: pull_request
Source Clear Scan (SCA)
1m 41s
Pipeline SAST Scan - ACS
13m 11s
PMD Scan
1m 10s
CMIS TAS tests - Open Search (CMIS API)
12m 45s
All AMPs tests
10m 43s
Test Tomcat deployment
10m 22s
Upload docker images needed for pipeline tests: <acs.version>-<PIPELINE_TAG_TEXT_INSERT>-<build>
0s
Matrix: cmis_tas_tests_elasticsearch
Matrix: distribution_zip_content_tests
Matrix: single_pipeline_image_tests
Matrix: tas_test_with_mtls
Matrix: tas_tests
Matrix: tas_tests_search_api
Matrix: tas_tests_with_aims
Matrix: upgrade_tas_tests
Annotations
2 errors
Pipeline SAST Scan - ACS
[25 Nov 2024 13:45:46,0608] PIPELINE-SCAN INFO: Pipeline Scan Tool Version 24.10.0-0.
[25 Nov 2024 13:45:46,0640] PIPELINE-SCAN INFO: Loading policy file Alfresco_Default.json
[25 Nov 2024 13:45:46,0641] PIPELINE-SCAN INFO: Successfully retrieved the policy
[25 Nov 2024 13:45:46,0641] PIPELINE-SCAN INFO: Policy name: Alfresco Default
[25 Nov 2024 13:45:46,0642] PIPELINE-SCAN INFO: CWE filter:
[25 Nov 2024 13:45:46,0642] PIPELINE-SCAN INFO: Severity filter: 3, 4, 5,
[25 Nov 2024 13:45:46,0643] PIPELINE-SCAN INFO: Beginning scanning of 'distribution/target/alfresco.war'.
[25 Nov 2024 13:45:46,0646] PIPELINE-SCAN INFO: Sending 195780306 bytes to the server for analysis.
[25 Nov 2024 13:46:38,0504] PIPELINE-SCAN INFO: Upload complete.
[25 Nov 2024 13:46:38,0504] PIPELINE-SCAN INFO: Scan ID: 489a1e80-4b49-498a-a775-d8e5c47e027d
[25 Nov 2024 13:46:38,0727] PIPELINE-SCAN INFO: Analysis Started.
===========================
Found 2 Scannable modules.
===========================
alfresco.war
JS files within alfresco.war
[25 Nov 2024 13:51:47,0833] PIPELINE-SCAN INFO: Analysis Complete.
[25 Nov 2024 13:51:47,0835] PIPELINE-SCAN INFO: Analysis Results: Received 93032 bytes in 361192ms.
[25 Nov 2024 13:51:47,0845] PIPELINE-SCAN INFO: Writing Raw JSON Results to file '/home/runner/work/acs-packaging/acs-packaging/results.json'.
[25 Nov 2024 13:51:47,0851] PIPELINE-SCAN INFO: Applying custom severity 2 to cwe 117
[25 Nov 2024 13:51:47,0851] PIPELINE-SCAN INFO: Applying custom severity 4 to cwe 80
[25 Nov 2024 13:51:47,0854] PIPELINE-SCAN INFO: Writing Filtered JSON Results to file '/home/runner/work/acs-packaging/acs-packaging/filtered_results.json'.
Scan Summary:
PIPELINE_SCAN_VERSION: 24.10.0-0
DEV-STAGE: DEVELOPMENT
PROJECT-NAME: acs-packaging-acs
SCAN_ID: 489a1e80-4b49-498a-a775-d8e5c47e027d
SCAN_STATUS: SUCCESS
SCAN_MESSAGE: Scan successful. Results size: 92039 bytes
====================
Analysis Successful.
====================
==========================
Found 2 Scannable modules.
==========================
alfresco.war
JS files within alfresco.war
===================
Analyzed 2 modules.
===================
alfresco.war
JS files within alfresco.war
===================
Analyzed 33 issues.
===================
--------------------------------
Found 1 issues of High severity.
--------------------------------
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199
Details: <span>This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. </span> <span>Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/79.html">CWE</a> <a href="https://owasp.org/www-community/attacks/xss/">OWASP</a> <a href="https://docs.veracode.com/r/review_cleansers">S
|
Opensearch Upgrade TAS tests
Process completed with exit code 1.
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
Veracode Pipeline-Scan Results
|
3.55 KB |
|
Veracode Pipeline-Scan Results - ACS (Human Readable)
|
1.83 KB |
|
containers-logs-upgrade_tas_tests-2-20241125140118.tar.gz
|
290 Bytes |
|