|
172 | 172 | DD_SOCIAL_AUTH_GITHUB_ENTERPRISE_API_URL=(str, ""), |
173 | 173 | DD_SOCIAL_AUTH_GITHUB_ENTERPRISE_KEY=(str, ""), |
174 | 174 | DD_SOCIAL_AUTH_GITHUB_ENTERPRISE_SECRET=(str, ""), |
| 175 | + DD_SOCIAL_AUTH_USERNAME_IS_FULL_EMAIL=(bool, True), |
175 | 176 | DD_SAML2_ENABLED=(bool, False), |
176 | 177 | # Allows to override default SAML authentication backend. Check https://djangosaml2.readthedocs.io/contents/setup.html#custom-user-attributes-processing |
177 | 178 | DD_SAML2_AUTHENTICATION_BACKENDS=(str, "djangosaml2.backends.Saml2Backend"), |
@@ -577,7 +578,7 @@ def generate_url(scheme, double_slashes, user, password, host, port, path, param |
577 | 578 | SOCIAL_AUTH_STRATEGY = "social_django.strategy.DjangoStrategy" |
578 | 579 | SOCIAL_AUTH_STORAGE = "social_django.models.DjangoStorage" |
579 | 580 | SOCIAL_AUTH_ADMIN_USER_SEARCH_FIELDS = ["username", "first_name", "last_name", "email"] |
580 | | -SOCIAL_AUTH_USERNAME_IS_FULL_EMAIL = True |
| 581 | +SOCIAL_AUTH_USERNAME_IS_FULL_EMAIL = env("DD_SOCIAL_AUTH_USERNAME_IS_FULL_EMAIL") |
581 | 582 |
|
582 | 583 | GOOGLE_OAUTH_ENABLED = env("DD_SOCIAL_AUTH_GOOGLE_OAUTH2_ENABLED") |
583 | 584 | SOCIAL_AUTH_GOOGLE_OAUTH2_KEY = env("DD_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY") |
@@ -1325,6 +1326,7 @@ def saml2_attrib_map_format(din): |
1325 | 1326 | "Scout Suite Scan": ["file_path", "vuln_id_from_tool"], # for now we use file_path as there is no attribute for "service" |
1326 | 1327 | "Meterian Scan": ["cwe", "component_name", "component_version", "description", "severity"], |
1327 | 1328 | "Github Vulnerability Scan": ["title", "severity", "component_name", "vulnerability_ids", "file_path"], |
| 1329 | + "Github Secrets Detection Report": ["title", "file_path", "line"], |
1328 | 1330 | "Solar Appscreener Scan": ["title", "file_path", "line", "severity"], |
1329 | 1331 | "pip-audit Scan": ["vuln_id_from_tool", "component_name", "component_version"], |
1330 | 1332 | "Rubocop Scan": ["vuln_id_from_tool", "file_path", "line"], |
@@ -1570,6 +1572,7 @@ def saml2_attrib_map_format(din): |
1570 | 1572 | "AWS Security Hub Scan": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL, |
1571 | 1573 | "Meterian Scan": DEDUPE_ALGO_HASH_CODE, |
1572 | 1574 | "Github Vulnerability Scan": DEDUPE_ALGO_HASH_CODE, |
| 1575 | + "Github Secrets Detection Report": DEDUPE_ALGO_HASH_CODE, |
1573 | 1576 | "Cloudsploit Scan": DEDUPE_ALGO_HASH_CODE, |
1574 | 1577 | "SARIF": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL_OR_HASH_CODE, |
1575 | 1578 | "Azure Security Center Recommendations Scan": DEDUPE_ALGO_UNIQUE_ID_FROM_TOOL, |
@@ -1850,6 +1853,7 @@ def saml2_attrib_map_format(din): |
1850 | 1853 | "ALSA-": "https://osv.dev/vulnerability/", # e.g. https://osv.dev/vulnerability/ALSA-2024:0827 |
1851 | 1854 | "ASA-": "https://security.archlinux.org/", # e.g. https://security.archlinux.org/ASA-202003-8 |
1852 | 1855 | "AVD": "https://avd.aquasec.com/misconfig/", # e.g. https://avd.aquasec.com/misconfig/avd-ksv-01010 |
| 1856 | + "AWS-": "https://aws.amazon.com/security/security-bulletins/", # e.g. https://aws.amazon.com/security/security-bulletins/AWS-2025-001 |
1853 | 1857 | "BAM-": "https://jira.atlassian.com/browse/", # e.g. https://jira.atlassian.com/browse/BAM-25498 |
1854 | 1858 | "BSERV-": "https://jira.atlassian.com/browse/", # e.g. https://jira.atlassian.com/browse/BSERV-19020 |
1855 | 1859 | "C-": "https://hub.armosec.io/docs/", # e.g. https://hub.armosec.io/docs/c-0085 |
|
0 commit comments