-
Notifications
You must be signed in to change notification settings - Fork 1.8k
jira_integration: changes risk acceptance expiration date to a better default #13467
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
… default - Currently the Jira integration sets the expiration time to `None` when configured, resulting on the risk acceptance coming from Jira (via configured resolution) never expire - This commit sets such expiration time to the setting "Risk Acceptance form default days" configured on "System Settings"
🔴 Risk threshold exceeded.This pull request modifies several sensitive codepaths (dojo/jira_link/helper.py, dojo/models.py, and dojo/db_migrations/0245_alter_jira_instance_accepted_mapping_resolution.py), with the scanner flagging these edits as sensitive and advising configuration of sensitive paths and allowed authors in .dryrunsecurity.yaml. The findings are marked at a failing risk threshold but not set to block the merge.
🔴 Configured Codepaths Edit in
|
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/jira_link/helper.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/models.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
🔴 Configured Codepaths Edit in dojo/db_migrations/0245_alter_jira_instance_accepted_mapping_resolution.py
| Vulnerability | Configured Codepaths Edit |
|---|---|
| Description | Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml. |
We've notified @mtesauro.
All finding details can be found in the DryRun Security Dashboard.
- fixes space - adds missing library
- corrects the help text for the UI of the Jira Integration
|
@maxi-bee Thanks for the PR. Could you look at creating a django migration? Unfortunately this is needed for Django, even though you only changed a help text. |
Alright went for a: using: and got this new migration file just commited |
|
Would you be able to rebase against |
So @valentijnscholten do you mean to drop my changes into |
|
@valentijnscholten moved to #13488 |
Nonewhen configured, resulting on the risk acceptance coming from Jira (via configured resolution) never expire