Skip to content

Commit ad2853f

Browse files
authored
Hotfix release v5.11.3 (#328)
* Move application.yaml properties to application.properties * Update available dependencies for fic CVE issues. * Update Dockerfile
1 parent 90fde59 commit ad2853f

15 files changed

+308
-154
lines changed

.github/workflows/dockerhub-release.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ jobs:
1717
name: Retag and push image
1818
runs-on: ubuntu-latest
1919
environment: rc
20-
if: github.event.pull_request.base.ref == 'master' || github.event.pull_request.base.ref == 'main'
20+
if: github.event.review.state == 'approved' && (github.event.pull_request.base.ref == 'master' || github.event.pull_request.base.ref == 'main')
2121
steps:
2222
- name: Checkout
2323
uses: actions/checkout@v3

.github/workflows/release.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ on:
1111

1212
env:
1313
GH_USER_NAME: github.actor
14-
RELEASE_VERSION: 5.11.1
14+
RELEASE_VERSION: 5.11.3
1515

1616
jobs:
1717
release:

Dockerfile

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
FROM --platform=$BUILDPLATFORM gradle:6.8.3-jdk11 AS build
1+
FROM --platform=$BUILDPLATFORM gradle:8.10.0-jdk11-alpine AS build
22
ARG RELEASE_MODE
33
ARG APP_VERSION
44
WORKDIR /usr/app
@@ -10,13 +10,13 @@ RUN if [ "${RELEASE_MODE}" = true ]; then \
1010
else gradle build --no-build-cache --exclude-task test -Dorg.gradle.project.version=${APP_VERSION}; fi
1111

1212
# For ARM build use flag: `--platform linux/arm64`
13-
FROM --platform=$BUILDPLATFORM amazoncorretto:11.0.20
14-
LABEL version=${APP_VERSION} description="EPAM ReportPortal. Auth Service" maintainer="Andrei Varabyeu <[email protected]>, Hleb Kanonik <[email protected]>"
13+
FROM --platform=$BUILDPLATFORM amazoncorretto:11.0.24
1514
ARG APP_VERSION=${APP_VERSION}
15+
LABEL version=${APP_VERSION} description="EPAM ReportPortal. Auth Service" maintainer="Andrei Varabyeu <[email protected]>, Hleb Kanonik <[email protected]>"
1616
ENV APP_DIR=/usr/app
1717
ENV JAVA_OPTS="-Xmx1g -XX:+UseG1GC -XX:InitiatingHeapOccupancyPercent=70 -Djava.security.egd=file:/dev/./urandom"
1818
WORKDIR $APP_DIR
1919
COPY --from=build $APP_DIR/build/libs/service-authorization-*exec.jar .
2020
VOLUME ["/tmp"]
2121
EXPOSE 8080
22-
ENTRYPOINT exec java ${JAVA_OPTS} -jar ${APP_DIR}/service-authorization-*exec.jar
22+
ENTRYPOINT ["sh", "-c", "java ${JAVA_OPTS} -jar ${APP_DIR}/service-authorization-*exec.jar"]

build.gradle

+17-17
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ plugins {
66
}
77

88
apply from: 'project-properties.gradle'
9-
apply from: "$scriptsUrl/build-docker.gradle"
9+
//apply from: "$scriptsUrl/build-docker.gradle"
1010
apply from: "$scriptsUrl/build-info.gradle"
1111
apply from: "$scriptsUrl/build-commons.gradle"
1212
//apply from: "$scriptsUrl/build-quality.gradle"
@@ -15,12 +15,12 @@ apply from: "$scriptsUrl/signing.gradle"
1515

1616
repositories {
1717
mavenCentral { url "https://repo1.maven.org/maven2" }
18-
1918
if (!releaseMode) {
2019
maven { url 'https://jitpack.io' }
2120
}
2221
}
2322

23+
ext['spring-boot.version'] = '2.5.15'
2424
//https://nvd.nist.gov/vuln/detail/CVE-2020-10683 (dom4j 2.1.3 version dependency) AND https://nvd.nist.gov/vuln/detail/CVE-2019-14900
2525
ext['hibernate.version'] = '5.4.18.Final'
2626
//https://nvd.nist.gov/vuln/detail/CVE-2020-10693
@@ -52,12 +52,10 @@ dependencies {
5252
implementation 'org.apache.tomcat.embed:tomcat-embed-core:9.0.86'
5353
implementation 'org.apache.tomcat.embed:tomcat-embed-el:9.0.86'
5454
implementation 'org.apache.tomcat.embed:tomcat-embed-websocket:9.0.86'
55-
//Fix CVE-2020-15522
56-
implementation 'org.bouncycastle:bcprov-jdk15on:1.69'
5755
//Fix CVE-2015-7501, CVE-2015-4852
5856
implementation 'org.apache.commons:commons-collections4:4.4'
5957
//Fix CVE-2018-10237
60-
implementation 'com.google.guava:guava:31.1-jre'
58+
implementation 'com.google.guava:guava:33.3.0-jre'
6159
//Fix CVE-2020-13956
6260
implementation 'org.apache.httpcomponents:httpclient:4.5.14'
6361
//Fix CVE-2022-40152
@@ -70,26 +68,27 @@ dependencies {
7068
//Fix CVE-2023-34050
7169
implementation 'org.springframework.amqp:spring-amqp:2.4.17'
7270
//Fix CVE-2023-40827, CVE-2023-40828, CVE-2023-40826
73-
implementation 'org.springframework:spring-webmvc:5.3.33'
74-
implementation 'org.springframework:spring-web:5.3.33'
71+
implementation 'org.springframework:spring-webmvc:5.3.39'
72+
implementation 'org.springframework:spring-web:5.3.39'
7573

7674
///// Security
7775
//https://nvd.nist.gov/vuln/detail/CVE-2020-5407 AND https://nvd.nist.gov/vuln/detail/CVE-2020-5408
78-
implementation 'org.springframework.security:spring-security-core:5.8.5'
79-
implementation 'org.springframework.security:spring-security-config:5.8.5'
80-
implementation 'org.springframework.security:spring-security-web:5.8.5'
81-
//
82-
76+
implementation 'org.springframework.security:spring-security-core:5.8.14'
77+
implementation 'org.springframework.security:spring-security-config:5.8.14'
78+
implementation 'org.springframework.security:spring-security-web:5.8.14'
8379
implementation 'org.springframework.security:spring-security-oauth2-client'
8480
//Fix CVE-2023-1370
8581
implementation 'net.minidev:json-smart:2.4.10'
8682
//Fix CVE-2022-22969
8783
implementation 'org.springframework.security.oauth:spring-security-oauth2:2.5.2.RELEASE'
88-
implementation 'org.springframework.security:spring-security-jwt:1.0.11.RELEASE'
84+
implementation 'org.springframework.security:spring-security-jwt:1.1.1.RELEASE'
85+
//Fix CVE-2020-15522 in org.springframework.security:spring-security-jwt:1.1.1.RELEASE
86+
implementation 'org.bouncycastle:bcprov-jdk15on:1.70'
8987
implementation 'org.springframework.security:spring-security-ldap'
9088
// TODO: consider migration to spring-security-saml2-service-provider
9189
implementation 'org.springframework.security.extensions:spring-security-saml2-core:2.0.0.M31'
92-
// Temporary fix of https://nvd.nist.gov/vuln/detail/CVE-2019-12400
90+
implementation 'commons-collections:commons-collections:3.2.2'
91+
//Temporary fix of https://nvd.nist.gov/vuln/detail/CVE-2019-12400
9392
implementation 'org.apache.santuario:xmlsec:3.0.3'
9493
//Fix CVE-2015-7501, CVE-2015-4852
9594
implementation 'org.apache.commons:commons-collections4:4.4'
@@ -104,10 +103,11 @@ dependencies {
104103
implementation 'io.springfox:springfox-swagger2'
105104
implementation 'org.apache.commons:commons-compress:1.26.0'
106105
implementation 'org.cryptacular:cryptacular:1.1.4'
107-
// TODO: snakeyaml 2.0 supported by Spring Boot 3 only
108-
implementation 'org.yaml:snakeyaml:1.33'
106+
// TODO: snakeyaml 2.0 supported by Spring Boot 2.7 and 3.X only
107+
// We don't user application.yml, so it's safe to use 2.2
108+
implementation 'org.yaml:snakeyaml:2.2'
109109
implementation 'org.hibernate:hibernate-core:5.4.24.Final'
110-
implementation 'org.springframework:spring-core:5.3.30'
110+
implementation 'org.springframework:spring-core:5.3.39'
111111
implementation "com.rabbitmq:http-client:5.2.0"
112112

113113
// Lombok

gradle.properties

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
version=5.11.2
1+
version=5.11.3
22
description=Unified Authorization Trap for all ReportPortal's Services
33
dockerPrepareEnvironment=
44
dockerJavaOpts=-Xmx512m -XX:+UseG1GC -XX:InitiatingHeapOccupancyPercent=70 -Djava.security.egd=file:/dev/./urandom

gradle/wrapper/gradle-wrapper.jar

-15.3 KB
Binary file not shown.
+3-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
distributionBase=GRADLE_USER_HOME
22
distributionPath=wrapper/dists
3-
distributionUrl=https\://services.gradle.org/distributions/gradle-6.8-bin.zip
3+
distributionUrl=https\://services.gradle.org/distributions/gradle-8.10-bin.zip
4+
networkTimeout=10000
5+
validateDistributionUrl=true
46
zipStoreBase=GRADLE_USER_HOME
57
zipStorePath=wrapper/dists

0 commit comments

Comments
 (0)