Skip to content

[ACS-9036] Fix failing tests in acs-packaging FromLegacyAcsUpgradeTest #3534

[ACS-9036] Fix failing tests in acs-packaging FromLegacyAcsUpgradeTest

[ACS-9036] Fix failing tests in acs-packaging FromLegacyAcsUpgradeTest #3534

Re-run triggered November 25, 2024 13:38
Status Failure
Total duration 23m 0s
Billable time 5h 3m
Artifacts 6

ci.yml

on: pull_request
Source Clear Scan (SCA)
1m 41s
Source Clear Scan (SCA)
Pipeline SAST Scan - ACS
13m 11s
Pipeline SAST Scan - ACS
PMD Scan
1m 10s
PMD Scan
CMIS TAS tests - Open Search (CMIS API)
12m 45s
CMIS TAS tests - Open Search (CMIS API)
All AMPs tests
10m 43s
All AMPs tests
Test Tomcat deployment
10m 22s
Test Tomcat deployment
Upload docker images needed for pipeline tests: <acs.version>-<PIPELINE_TAG_TEXT_INSERT>-<build>
0s
Upload docker images needed for pipeline tests: <acs.version>-<PIPELINE_TAG_TEXT_INSERT>-<build>
Matrix: cmis_tas_tests_elasticsearch
Matrix: distribution_zip_content_tests
Matrix: single_pipeline_image_tests
Matrix: tas_test_with_mtls
Matrix: tas_tests
Matrix: tas_tests_search_api
Matrix: tas_tests_with_aims
Matrix: upgrade_tas_tests
Fit to window
Zoom out
Zoom in

Annotations

2 errors
Pipeline SAST Scan - ACS
[25 Nov 2024 13:45:46,0608] PIPELINE-SCAN INFO: Pipeline Scan Tool Version 24.10.0-0. [25 Nov 2024 13:45:46,0640] PIPELINE-SCAN INFO: Loading policy file Alfresco_Default.json [25 Nov 2024 13:45:46,0641] PIPELINE-SCAN INFO: Successfully retrieved the policy [25 Nov 2024 13:45:46,0641] PIPELINE-SCAN INFO: Policy name: Alfresco Default [25 Nov 2024 13:45:46,0642] PIPELINE-SCAN INFO: CWE filter: [25 Nov 2024 13:45:46,0642] PIPELINE-SCAN INFO: Severity filter: 3, 4, 5, [25 Nov 2024 13:45:46,0643] PIPELINE-SCAN INFO: Beginning scanning of 'distribution/target/alfresco.war'. [25 Nov 2024 13:45:46,0646] PIPELINE-SCAN INFO: Sending 195780306 bytes to the server for analysis. [25 Nov 2024 13:46:38,0504] PIPELINE-SCAN INFO: Upload complete. [25 Nov 2024 13:46:38,0504] PIPELINE-SCAN INFO: Scan ID: 489a1e80-4b49-498a-a775-d8e5c47e027d [25 Nov 2024 13:46:38,0727] PIPELINE-SCAN INFO: Analysis Started. =========================== Found 2 Scannable modules. =========================== alfresco.war JS files within alfresco.war [25 Nov 2024 13:51:47,0833] PIPELINE-SCAN INFO: Analysis Complete. [25 Nov 2024 13:51:47,0835] PIPELINE-SCAN INFO: Analysis Results: Received 93032 bytes in 361192ms. [25 Nov 2024 13:51:47,0845] PIPELINE-SCAN INFO: Writing Raw JSON Results to file '/home/runner/work/acs-packaging/acs-packaging/results.json'. [25 Nov 2024 13:51:47,0851] PIPELINE-SCAN INFO: Applying custom severity 2 to cwe 117 [25 Nov 2024 13:51:47,0851] PIPELINE-SCAN INFO: Applying custom severity 4 to cwe 80 [25 Nov 2024 13:51:47,0854] PIPELINE-SCAN INFO: Writing Filtered JSON Results to file '/home/runner/work/acs-packaging/acs-packaging/filtered_results.json'. Scan Summary: PIPELINE_SCAN_VERSION: 24.10.0-0 DEV-STAGE: DEVELOPMENT PROJECT-NAME: acs-packaging-acs SCAN_ID: 489a1e80-4b49-498a-a775-d8e5c47e027d SCAN_STATUS: SUCCESS SCAN_MESSAGE: Scan successful. Results size: 92039 bytes ==================== Analysis Successful. ==================== ========================== Found 2 Scannable modules. ========================== alfresco.war JS files within alfresco.war =================== Analyzed 2 modules. =================== alfresco.war JS files within alfresco.war =================== Analyzed 33 issues. =================== -------------------------------- Found 1 issues of High severity. -------------------------------- CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS): org/springframework/security/spring-security-webauthn.js:199 Details: <span>This call to href() contains a cross-site scripting (XSS) flaw. The application populates the HTTP response with untrusted input, allowing an attacker to embed malicious content, such as Javascript code, which will be executed in the context of the victim's browser. XSS vulnerabilities are commonly exploited to steal or manipulate cookies, modify presentation of content, and compromise confidential information, with new attack vectors being discovered on a regular basis. </span> <span>Use contextual escaping on all untrusted data before using it to construct any portion of an HTTP response. The escaping method should be chosen based on the specific use case of the untrusted data, otherwise it may not protect fully against the attack. For example, if the data is being written to the body of an HTML page, use HTML entity escaping; if the data is being written to an attribute, use attribute escaping; etc. Both the OWASP Java Encoder library and the Microsoft AntiXSS library provide contextual escaping methods. For more details on contextual escaping, see https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md. In addition, as a best practice, always validate untrusted input to ensure that it conforms to the expected format, using centralized data validation routines when possible.</span> <span>References: <a href="https://cwe.mitre.org/data/definitions/79.html">CWE</a> <a href="https://owasp.org/www-community/attacks/xss/">OWASP</a> <a href="https://docs.veracode.com/r/review_cleansers">S
Opensearch Upgrade TAS tests
Process completed with exit code 1.

Artifacts

Produced during runtime
Name Size
Veracode Pipeline-Scan Results
3.55 KB
Veracode Pipeline-Scan Results - ACS (Human Readable)
1.83 KB
containers-logs-upgrade_tas_tests-2-20241125140118.tar.gz
290 Bytes