Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ 20º ] - Release/v2.1.0 frontend agree: Frontend policy decline/agree functionality #206

Merged

Conversation

matbmoser
Copy link
Contributor

Why we create this PR?

Users should have the option to choose a contract/policy or decline the passport reciving process

What we want to achieve with this PR?

We want to display available contracts and available policies for the user.
Users can choose one and continue receiving the passport or decline and cancel getting the passport.

What is new?

Added

  • Added Policy selector when autosign is not enable
  • Added Contract JSON details display
  • Added Agree/Decline btn for contract/policy
  • Added Fixes in backend and frontend integration

davidzynda and others added 30 commits December 20, 2023 16:07
Integration/v2.1.0: Frontend policy decline/agree functionality
@matbmoser matbmoser added the frontend Issue or PR connected to the frontend application label Feb 2, 2024
@matbmoser matbmoser added this to the v2.1.0 milestone Feb 2, 2024
Copy link

gitguardian bot commented Feb 2, 2024

⚠️ GitGuardian has uncovered 4 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
9408211 Triggered Generic High Entropy Secret a79919c src/store/index.js View secret
9408211 Triggered Generic High Entropy Secret d11b85a src/store/index.js View secret
9408211 Triggered Generic High Entropy Secret ea216db src/store/index.js View secret
9408211 Triggered Generic High Entropy Secret cc7e7c6 src/store/index.js View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Our GitHub checks need improvements? Share your feedbacks!

@matbmoser matbmoser changed the title Release/v2.1.0 frontend agree: Frontend policy decline/agree functionality [ 20º ] - Release/v2.1.0 frontend agree: Frontend policy decline/agree functionality Feb 2, 2024
@matbmoser matbmoser requested a review from saudkhan116 February 2, 2024 18:32

- name: Upload Trivy scan results to GitHub Security tab
if: always()
uses: github/codeql-action/upload-sarif@v2
uses: github/codeql-action/upload-sarif@v3

Check notice

Code scanning / KICS

Unpinned Actions Full Length Commit SHA Note

Action is not pinned to a full length commit SHA.

- name: Upload Trivy scan results to GitHub Security tab
if: always()
uses: github/codeql-action/upload-sarif@v2
uses: github/codeql-action/upload-sarif@v3

Check notice

Code scanning / KICS

Unpinned Actions Full Length Commit SHA Note

Action is not pinned to a full length commit SHA.

- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2
uses: github/codeql-action/upload-sarif@v3

Check notice

Code scanning / KICS

Unpinned Actions Full Length Commit SHA Note

Action is not pinned to a full length commit SHA.
.github/workflows/publish-dpp-backend-docker-image.yml Dismissed Show dismissed Hide dismissed
.github/workflows/publish-dpp-backend-docker-image.yml Dismissed Show dismissed Hide dismissed
.github/workflows/publish-dpp-frontend-docker-image.yml Dismissed Show dismissed Hide dismissed
.github/workflows/publish-dpp-backend-docker-image.yml Dismissed Show dismissed Hide dismissed
.github/workflows/publish-dpp-backend-docker-image.yml Dismissed Show dismissed Hide dismissed
.github/workflows/publish-dpp-backend-docker-image.yml Dismissed Show dismissed Hide dismissed
Dockerfile Outdated
@@ -62,15 +63,15 @@
HEALTHCHECK NONE

# add permissions for a user
RUN chown -R 10000:3000 /app && chmod -R 775 /app/
RUN chown 10000:3000 /entrypoint.sh && chmod -R 775 /entrypoint.sh
RUN chown -R 1000:3000 /app && chmod -R 775 /app/

Check notice

Code scanning / KICS

Multiple RUN, ADD, COPY, Instructions Listed Note

There are RUN instructions that could be grouped
@matbmoser matbmoser force-pushed the release/v2.1.0-frontend-agree branch from 5eb7ae2 to a458abd Compare February 2, 2024 20:29
@matbmoser matbmoser force-pushed the release/v2.1.0-frontend-agree branch from a458abd to abe3799 Compare February 2, 2024 20:32
@matbmoser
Copy link
Contributor Author

Revised and no secrets are there..... The token is not a secret is a session token that expires and this ones in concrete are not real secrets

@matbmoser matbmoser merged commit e59172d into eclipse-tractusx:main Feb 2, 2024
5 of 7 checks passed
@matbmoser matbmoser deleted the release/v2.1.0-frontend-agree branch February 2, 2024 20:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
frontend Issue or PR connected to the frontend application
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

3 participants