feat(api): add okta provider support#11184
Conversation
…k-with-1-security-check
|
✅ Conflict Markers Resolved All conflict markers have been successfully resolved in this pull request. |
|
✅ All necessary |
🔒 osv-scanner: 4 finding(s) in
|
| Severity | ID | Package | Version | Summary |
|---|---|---|---|---|
| 🟠 HIGH (7.5) | GHSA-vfmq-68hx-4jfw |
PyPI/lxml |
5.3.2 |
lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files |
| 🟠 HIGH (7) | GHSA-7j59-v9qr-6fq9 |
PyPI/microsoft-kiota-http |
1.9.2 |
Kiota abstractions RedirectHandler leaks Cookie/Proxy-Authorization headers on cross-host redirect |
| 🟠 HIGH (8.9) | GHSA-mf9v-mfxr-j63j |
PyPI/urllib3 |
2.6.3 |
urllib3: Decompression-bomb safeguards bypassed in parts of the streaming API |
| 🟠 HIGH (8.2) | GHSA-qccp-gfcp-xxvc |
PyPI/urllib3 |
2.6.3 |
urllib3: Sensitive headers forwarded across origins in proxied low-level redirects |
To accept a finding, add an [[IgnoredVulns]] entry to osv-scanner.toml at the repo root with a reason and ignoreUntil.
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## master #11184 +/- ##
========================================
Coverage 93.65% 93.66%
========================================
Files 232 242 +10
Lines 33968 34409 +441
========================================
+ Hits 31813 32229 +416
- Misses 2155 2180 +25
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
🔒 Container Security ScanImage: 📊 Vulnerability Summary
9 package(s) affected
|
🔒 Container Security ScanImage: 📊 Vulnerability Summary
5 package(s) affected
|
Align validate_okta_uid with prowler.providers.okta.okta_provider.ORG_DOMAIN_RE so gov/mil orgs (.okta.mil, .okta-miltest.com, .trex-govcloud.com) can be onboarded. Fold the Okta routing test into the main return_prowler_provider parametrize, and add SDK changelog entry for the provider_id guard introduced in this branch.
Context
This PR adds API support for the Okta provider on top of the existing SDK work. The goal is to let Prowler Cloud create, validate, store, and test Okta providers through the API with the same auth model exposed by the UI: Okta org domain as provider UID plus raw private key content in the provider secret.
Description
This PR wires Okta into the API provider flow end to end:
Steps to review
Checklist
Community Checklist
SDK/CLI
UI
API
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.