Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

177261 implement updated sap action rules #195

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
56 commits
Select commit Hold shift + click to select a range
c9e70ac
177261-implement sap action rules AB#177261 AB#177486 AB#177487
pravinvarade10801 Sep 17, 2024
75c88fc
177261-exception handling and logging AB#177261 AB#177486
pravinvarade10801 Sep 18, 2024
1d8380d
177261-code uplifting AB#177261
Sep 19, 2024
d8d3f74
177261-null check of unit of sale added in case of change and update …
pravinvarade10801 Sep 20, 2024
70e2324
177261-code uplifted and few warnings resolved AB#177261
Sep 22, 2024
bc0ecd6
177261-code refactoring AB#177261 AB#177490
pravinvarade10801 Sep 23, 2024
bc28ee2
177725-schema changes for enccontentpublished v2.2 event AB#177725
pravinvarade10801 Sep 23, 2024
53cf6ee
177261-added new logs and uplifted few existings logs AB#177261
Sep 24, 2024
26f5f12
177261-exception logs updated AB#177261
Sep 24, 2024
d2a136a
177261-unit test added for enc content sap message builder AB#177261 …
pravinvarade10801 Sep 25, 2024
d252009
177261-resolved and merged unit test conflicts AB#177261 AB#177491
pravinvarade10801 Sep 25, 2024
b34d17f
177261-unit test cases fixed AB#177261 AB#177491
pravinvarade10801 Sep 25, 2024
af3e508
177261-Wiremock changes AB#177261
Sep 25, 2024
c53158b
177261-unit test added for enccontent sap message builder AB#177261 A…
pravinvarade10801 Sep 25, 2024
4ee8881
Merge branch 'Feature/177261-implement-updated-sap-action-rules' of h…
pravinvarade10801 Sep 25, 2024
c21c51b
177261-logging middleware uplifted to resolve app insight exception l…
Sep 25, 2024
7c4da15
177261-conflict resolved AB#177261
Sep 25, 2024
91fc1a5
177261-minor issue fixed AB#177261
Sep 25, 2024
9873439
177261-unit test updated AB#177261 AB#177491
pravinvarade10801 Sep 26, 2024
7cc7290
177261-rule updated for additional coverage action AB#177261
Sep 26, 2024
7e4267c
177261-vulnerabilities fixed AB#177261
pravinvarade10801 Sep 26, 2024
fb5e715
177261 Vulnerabilities fixed #AB177261
Sep 26, 2024
12b3a2c
177261 Vulnerable dependencies fixed #AB177261
Sep 26, 2024
4dd5cd6
177261-unit test updated for enc content sap builder. AB#177261 AB#17…
pravinvarade10801 Sep 27, 2024
071d442
177261 Removed stop command for SAP mock - AB#177261
rushikeshkhopatkar Sep 27, 2024
01cc854
177261 Reverted changes to SAP Mock AB #177261
rushikeshkhopatkar Sep 27, 2024
5cc3c6e
177261-develop branch merged and conflicts resolved AB#177261
Sep 27, 2024
a1365a1
177261 UTs modified to improve code coverage #AB177261
Sep 30, 2024
7574baa
177261-code coverage improvement based on stryker AB#177261
pravinvarade10801 Oct 1, 2024
aa58f12
177261 - Updated existing FTs' as per new rules and new payload schem…
Oct 1, 2024
cebebf6
177261 - Updated appsettings - AB#177261
Oct 1, 2024
5b29ae4
177261 passed key vault url for FTs AB#177261
Oct 1, 2024
5bfb328
177261 - removed permit key section form appsettings AB#177261
Oct 1, 2024
aab2d8e
177261 UTs added to improve code coverage AB#177261
Oct 1, 2024
c5884a9
Merge branch 'Feature/177261-implement-updated-sap-action-rules' of h…
Oct 1, 2024
33ada64
177261-code refactoring AB#177261
pravinvarade10801 Oct 1, 2024
bd0f51e
177261 - merged the conflicts
pravinvarade10801 Oct 1, 2024
95d077c
Removing keyvaulturl variable from YAML AB#177261
Oct 1, 2024
9ea2e95
Merge branch 'Feature/177261-implement-updated-sap-action-rules' of h…
Oct 1, 2024
583fb5f
177261 - changed code for fetching keyvault secrets AB#177261
Oct 1, 2024
3e1c0cd
177261-minor change AB#177261
Oct 1, 2024
1b85dc9
177261-updated mock service proj file AB#177261
Oct 1, 2024
c149cd0
177261-ukhoweeknumber issue fixed AB#177261
Oct 2, 2024
ee68829
177261-Added FT for Re-issue scenario AB#177261
Oct 3, 2024
8610e34
177261-changed property of input file to Copy always AB#177261
Oct 3, 2024
ea1ecdc
177902-exception logs formatting issue fix AB#177902
pravinvarade10801 Oct 3, 2024
c0bb701
Merge branch 'Feature/177261-implement-updated-sap-action-rules' of h…
pravinvarade10801 Oct 3, 2024
0cc0c73
177261 Fixed UTs post refactoring error logs
Oct 3, 2024
2df535b
177902-Exception logs format fixed AB#177902
pravinvarade10801 Oct 3, 2024
37ccbd6
177261 Updated expected xml files AB#177261
Oct 3, 2024
3a8168e
177261 - Resolved review comments AB#177261
Oct 3, 2024
54900ab
177261-code review comments fixed AB#177261 AB#181398
pravinvarade10801 Oct 4, 2024
c55d532
updated correlationid
Oct 4, 2024
2806ea4
177261-minor code review comment fixed AB#177261 AB#181398
pravinvarade10801 Oct 4, 2024
dd9dff4
177261-code review comments resolved in FT's AB#177261
pravinvarade10801 Oct 4, 2024
e300ea1
177261-Updated payload and xml for Reissue scenario as per the latest…
Oct 6, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
240 changes: 237 additions & 3 deletions NVDSuppressions.xml
Original file line number Diff line number Diff line change
Expand Up @@ -253,7 +253,7 @@
</notes>
<packageUrl regex="true">^pkg:generic/dotnet\-getdocument@.*$</packageUrl>
<cve>CVE-2023-36558</cve>
</suppress>
</suppress>
<suppress>
<notes>
<![CDATA[
Expand Down Expand Up @@ -394,7 +394,7 @@
</notes>
<packageUrl regex="true">^pkg:generic/Azure\.Identity@.*$</packageUrl>
<cve>CVE-2024-35255</cve>
</suppress>
</suppress>
<suppress>
<notes>
<![CDATA[
Expand Down Expand Up @@ -475,7 +475,7 @@
</notes>
<packageUrl regex="true">^pkg:generic/Elasticsearch\.Net@.*$</packageUrl>
<cve>CVE-2020-7009</cve>
<cve>CVE-2020-7014</cve>
<cve>CVE-2020-7014</cve>
<cve>CVE-2023-31418</cve>
<cve>CVE-2023-31419</cve>
<cve>CVE-2023-46673</cve>
Expand Down Expand Up @@ -534,4 +534,238 @@
<packageUrl regex="true">^pkg:generic/Elasticsearch\.Net@.*$</packageUrl>
<cve>CVE-2023-46674</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
As this vulnerability is due to string input and this service will be run locally with no outside requests, this vulnerability is not applicable
file name: ProtoBufJsonConverter.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/ProtoBufJsonConverter@.*$</packageUrl>
<cve>CVE-2020-12762</cve>
<cve>CVE-2013-6370</cve>
<cve>CVE-2013-6371</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
As this vulnerability is due to string input and this service will be run locally with no outside requests, this vulnerability is not applicable
file name: JsonConverter.Newtonsoft.Json.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/JsonConverter\.Newtonsoft\.Json@.*$</packageUrl>
<cve>CVE-2020-12762</cve>
<cve>CVE-2013-6370</cve>
<cve>CVE-2013-6371</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
Not applicable for our use
file name: NJsonSchema.Extensions.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/NJsonSchema\.Extensions@.*$</packageUrl>
<cve>CVE-2021-3918</cve>
</suppress>
<!-- Below suppression are for wire mock and should be removed when wire mock is removed from ERPFacade -->
<suppress>
<notes>
<![CDATA[
As this vulnerability is due to string input and this service will be run locally with no outside requests, this vulnerability is not applicable
file name: Handlebars.Net.Helpers.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/Handlebars\.Net\.Helpers@.*$</packageUrl>
<cve>CVE-2020-7661</cve>
<cve>CVE-2022-21195</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
False positive, vulnerability is for package "wire" not wire mock
file name: WireMock.Net.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Net@.*$</packageUrl>
<cve>CVE-2020-27853</cve>
<cve>CVE-2021-41093</cve>
<cve>CVE-2021-41100</cve>
<cve>CVE-2022-23610</cve>
<cve>CVE-2022-31122</cve>
<cve>CVE-2020-15258</cve>
<cve>CVE-2018-8909</cve>
<cve>CVE-2021-41119</cve>
<cve>CVE-2021-32665</cve>
<cve>CVE-2021-32666</cve>
<cve>CVE-2022-23625</cve>
<cve>CVE-2022-31009</cve>
<cve>CVE-2023-22737</cve>
<cve>CVE-2021-41101</cve>
<cve>CVE-2022-43673</cve>
<cve>CVE-2021-21301</cve>
<cve>CVE-2021-32755</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
Vulnerability not applicable as we run wire mock locally
file name: WireMock.Net.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Net@.*$</packageUrl>
<cve>CVE-2018-9116</cve>
<cve>CVE-2023-41329</cve>
<cve>CVE-2018-9117</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
Vulnerability not applicable as we run wire mock locally
file name: WireMock.Net.Abstractions.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Net\.Abstractions@.*$</packageUrl>
<cve>CVE-2018-9116</cve>
<cve>CVE-2018-9117</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
Vulnerability for java version of wire mock
file name: WireMock.Net.Abstractions.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Net\.Abstractions@.*$</packageUrl>
<cve>CVE-2023-41329</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
False positive, vulnerability is for package "wire" not wire mock
file name: WireMock.Net.Abstractions.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Net\.Abstractions@.*$</packageUrl>
<cve>CVE-2020-27853</cve>
<cve>CVE-2021-41093</cve>
<cve>CVE-2020-15258</cve>
<cve>CVE-2018-8909</cve>
<cve>CVE-2021-32665</cve>
<cve>CVE-2021-32666</cve>
<cve>CVE-2022-23625</cve>
<cve>CVE-2022-23625</cve>
<cve>CVE-2022-31009</cve>
<cve>CVE-2023-22737</cve>
<cve>CVE-2022-43673</cve>
<cve>CVE-2021-21301</cve>
<cve>CVE-2021-32755</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
False positive, vulnerability is for package "wire" not wire mock
file name: WireMock.Net.OpenApiParser.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Net\.OpenApiParser@.*$</packageUrl>
<cve>CVE-2020-27853</cve>
<cve>CVE-2021-41093</cve>
<cve>CVE-2020-15258</cve>
<cve>CVE-2018-8909</cve>
<cve>CVE-2021-32665</cve>
<cve>CVE-2021-32665</cve>
<cve>CVE-2021-32666</cve>
<cve>CVE-2022-23625</cve>
<cve>CVE-2022-31009</cve>
<cve>CVE-2023-22737</cve>
<cve>CVE-2022-43673</cve>
<cve>CVE-2021-21301</cve>
<cve>CVE-2021-32755</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
Vulnerability not applicable as we run wire mock locally
file name: WireMock.Net.OpenApiParser.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Net\.OpenApiParser@.*$</packageUrl>
<cve>CVE-2018-9116</cve>
<cve>CVE-2023-41329</cve>
<cve>CVE-2018-9117</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
False positive, vulnerability is for package "wire" not wire mock
file name: WireMock.Org.Abstractions.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Org\.Abstractions@.*$</packageUrl>
<cve>CVE-2020-27853</cve>
<cve>CVE-2021-41093</cve>
<cve>CVE-2020-15258</cve>
<cve>CVE-2018-8909</cve>
<cve>CVE-2021-32665</cve>
<cve>CVE-2021-32666</cve>
<cve>CVE-2022-23625</cve>
<cve>CVE-2022-31009</cve>
<cve>CVE-2023-22737</cve>
<cve>CVE-2021-41101</cve>
<cve>CVE-2022-43673</cve>
<cve>CVE-2021-21301</cve>
<cve>CVE-2021-32755</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
Vulnerability not applicable as we run wire mock locally
file name: WireMock.Org.Abstractions.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/WireMock\.Org\.Abstractions@.*$</packageUrl>
<cve>CVE-2018-9116</cve>
<cve>CVE-2023-41329</cve>
<cve>CVE-2018-9117</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
file name: JsonConverter.Abstractions.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/JsonConverter\.Abstractions@.*$</packageUrl>
<cve>CVE-2020-12762</cve>
<cve>CVE-2013-6370</cve>
<cve>CVE-2013-6371</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
file name: System.Security.Cryptography.X509Certificates:4.1.0
.NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data.
POS is pinned to .Net core SDK 6.0.419 which is not vulnerable.
]]>
</notes>
<cve>CVE-2017-11770</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
file name: GraphQL.NewtonsoftJson.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/GraphQL.NewtonsoftJson@.*$</packageUrl>
<cve>CVE-2024-21907</cve>
</suppress>
<suppress>
<notes>
<![CDATA[
file name: YamlDotNet.dll
]]>
</notes>
<packageUrl regex="true">^pkg:generic/YamlDotNet@.*$</packageUrl>
<cve>CVE-2018-1000210</cve>
</suppress>
</suppressions>
1 change: 0 additions & 1 deletion azure-pipelines.yml
Original file line number Diff line number Diff line change
Expand Up @@ -452,7 +452,6 @@ stages:
value : $[ dependencies.DevDeployTerraform.outputs['DevDeployTerraform.TerraformDeploy.mockWebApp'] ]
- name : mockWebAppResourceGroup
value : $[ dependencies.DevDeployTerraform.outputs['DevDeployTerraform.TerraformDeploy.mockWebAppResourceGroupName'] ]

displayName: "Dev Functional Automated Tests"
workspace:
clean: all
Expand Down
Loading
Loading