remove altcha feature flag for security #53

Merged
gdupont merged 1 commits from issue-4543-bis into develop 2025-04-15 10:07:14 +02:00
Owner

ticket lié CNOUS/mse#4543

PR sur hydra-sql-theme : CNOUS/hydra-sql-mse-theme#12 + CNOUS/hydra-sql-mse-theme#13
PR sur sso-kustom : CadolesKube/sso-kustom#72
PR sur kustomization : CNOUS/mse-kustom#377

Pour tester :

  • builder l'image d'hydra-sql sur son propre harbor (ou utiliser reg.cadoles.com/cadoles/hydra-sql-base:2025.4.14-issue4543bis.1633.79337ef)
  • modifier le fichier misc/k8s/kustomization/overlays/dev/patches/hydra-sql-deployment.yaml dans le MSE et ajouter son image
  • se connecter au MSE et vérifier la présence d'altcha
  • une alerte doit apparaître si on ne coche pas la case
  • si on coche la case on doit pouvoir se connecter
ticket lié CNOUS/mse#4543 PR sur hydra-sql-theme : CNOUS/hydra-sql-mse-theme#12 + CNOUS/hydra-sql-mse-theme#13 PR sur sso-kustom : CadolesKube/sso-kustom#72 PR sur kustomization : CNOUS/mse-kustom#377 Pour tester : - builder l'image d'hydra-sql sur son propre harbor (ou utiliser reg.cadoles.com/cadoles/hydra-sql-base:2025.4.14-issue4543bis.1633.79337ef) - modifier le fichier misc/k8s/kustomization/overlays/dev/patches/hydra-sql-deployment.yaml dans le MSE et ajouter son image - se connecter au MSE et vérifier la présence d'altcha - une alerte doit apparaître si on ne coche pas la case - si on coche la case on doit pouvoir se connecter
gdupont added 1 commit 2025-04-14 16:40:10 +02:00
feat(altcha): remove feature flag for security
Some checks reported warnings
Cadoles/hydra-sql/pipeline/head This commit is unstable
Cadoles/hydra-sql/pipeline/pr-develop This commit is unstable
79337efef0
Owner

Symfony Security Check Report

No packages have known vulnerabilities.

Note that this checker can only detect vulnerabilities that are referenced in the security advisories database.
Execute this command regularly to check the newly discovered vulnerabilities.

Symfony Security Check Report ============================= No packages have known vulnerabilities. Note that this checker can only detect vulnerabilities that are referenced in the security advisories database. Execute this command regularly to check the newly discovered vulnerabilities.
Owner

Test report

PHP CS Fixer

Overview

State Total
Passed 0
Skipped 0
Failed 1
Error 0

Total duration: 0s

See details
Status Name Class
src/Form/LoginType

Errors

`src/Form/LoginType`

Output

applied fixers:
---------------
* trailing_comma_in_multiline```

</details>





# Test report ## PHP CS Fixer ### Overview | State | Total | |-------|-------| | Passed | 0 | | Skipped | 0 | | Failed | 1 | | Error | 0 | **Total duration**: 0s <details> <summary>See details</summary> | Status | Name | Class | |--------|------|-------| | &#10799; | `src/Form/LoginType` || </details> <br /> #### Errors <details> <summary>`src/Form/LoginType`</summary> **Output** ``` applied fixers: --------------- * trailing_comma_in_multiline``` </details>
Owner

Rapport PHPStan


 [OK] No errors                                                                 


## Rapport PHPStan ``` [OK] No errors ```
Owner

Rapport d'analyse du fichier ./misc/images/hydra-sql-standalone/Dockerfile avec Hadolint

Rien à signaler.
## Rapport d'analyse du fichier `./misc/images/hydra-sql-standalone/Dockerfile` avec [Hadolint](https://github.com/hadolint/hadolint) ``` Rien à signaler. ```
Owner

Rapport d'analyse de l'image avec Trivy

Target reg.cadoles.com/cadoles/hydra-sql-standalone:2025.4.14-pr53.1633.79337ef (alpine 3.17.1)

Vulnerabilities (4)

Package ID Severity Installed Version Fixed Version
libcrypto3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
libexpat CVE-2024-50602 MEDIUM 2.6.3-r0 2.6.4-r0
libssl3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
musl-utils CVE-2025-26519 UNKNOWN 1.2.3-r5 1.2.3-r6

No Misconfigurations found

Target Node.js

Vulnerabilities (1)

Package ID Severity Installed Version Fixed Version
cross-spawn CVE-2024-21538 HIGH 7.0.3 7.0.5, 6.0.6

No Misconfigurations found

## Rapport d'analyse de l'image avec [Trivy](https://github.com/aquasecurity/trivy) <h3>Target <code>reg.cadoles.com/cadoles/hydra-sql-standalone:2025.4.14-pr53.1633.79337ef (alpine 3.17.1)</code></h3> <h4>Vulnerabilities (4)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>libexpat</code></td> <td>CVE-2024-50602</td> <td>MEDIUM</td> <td>2.6.3-r0</td> <td>2.6.4-r0</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>musl-utils</code></td> <td>CVE-2025-26519</td> <td>UNKNOWN</td> <td>1.2.3-r5</td> <td>1.2.3-r6</td> </tr> </table> <h4>No Misconfigurations found</h4> <h3>Target <code>Node.js</code></h3> <h4>Vulnerabilities (1)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>cross-spawn</code></td> <td>CVE-2024-21538</td> <td>HIGH</td> <td>7.0.3</td> <td>7.0.5, 6.0.6</td> </tr> </table> <h4>No Misconfigurations found</h4>
Owner

Rapport d'analyse du fichier ./misc/images/hydra-sql-base/Dockerfile avec Hadolint

Rien à signaler.
## Rapport d'analyse du fichier `./misc/images/hydra-sql-base/Dockerfile` avec [Hadolint](https://github.com/hadolint/hadolint) ``` Rien à signaler. ```
Owner

Rapport d'analyse de l'image avec Trivy

Target reg.cadoles.com/cadoles/hydra-sql-base:2025.4.14-pr53.1633.79337ef (alpine 3.17.1)

Vulnerabilities (4)

Package ID Severity Installed Version Fixed Version
libcrypto3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
libexpat CVE-2024-50602 MEDIUM 2.6.3-r0 2.6.4-r0
libssl3 CVE-2024-9143 LOW 3.0.15-r0 3.0.15-r1
musl-utils CVE-2025-26519 UNKNOWN 1.2.3-r5 1.2.3-r6

No Misconfigurations found

Target Node.js

Vulnerabilities (1)

Package ID Severity Installed Version Fixed Version
cross-spawn CVE-2024-21538 HIGH 7.0.3 7.0.5, 6.0.6

No Misconfigurations found

## Rapport d'analyse de l'image avec [Trivy](https://github.com/aquasecurity/trivy) <h3>Target <code>reg.cadoles.com/cadoles/hydra-sql-base:2025.4.14-pr53.1633.79337ef (alpine 3.17.1)</code></h3> <h4>Vulnerabilities (4)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>libcrypto3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>libexpat</code></td> <td>CVE-2024-50602</td> <td>MEDIUM</td> <td>2.6.3-r0</td> <td>2.6.4-r0</td> </tr> <tr> <td><code>libssl3</code></td> <td>CVE-2024-9143</td> <td>LOW</td> <td>3.0.15-r0</td> <td>3.0.15-r1</td> </tr> <tr> <td><code>musl-utils</code></td> <td>CVE-2025-26519</td> <td>UNKNOWN</td> <td>1.2.3-r5</td> <td>1.2.3-r6</td> </tr> </table> <h4>No Misconfigurations found</h4> <h3>Target <code>Node.js</code></h3> <h4>Vulnerabilities (1)</h4> <table> <tr> <th>Package</th> <th>ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> </tr> <tr> <td><code>cross-spawn</code></td> <td>CVE-2024-21538</td> <td>HIGH</td> <td>7.0.3</td> <td>7.0.5, 6.0.6</td> </tr> </table> <h4>No Misconfigurations found</h4>
mlamalle approved these changes 2025-04-15 10:00:49 +02:00
gdupont merged commit 945a558565 into develop 2025-04-15 10:07:14 +02:00
gdupont deleted branch issue-4543-bis 2025-04-15 10:07:17 +02:00
Sign in to join this conversation.
No Reviewers
No Label
3 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: Cadoles/hydra-sql#53
No description provided.