Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

202410 #124

Open
wants to merge 145 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
145 commits
Select commit Hold shift + click to select a range
aea76be
Create KeyAuth.js
xc-link Oct 7, 2024
58203d0
Update and rename chains.json to xx.json
xc-link Oct 7, 2024
efb3e6a
Create chains.json
xc-link Oct 7, 2024
8abf74b
Update and rename Maskchain/chains.json to xxx.json
xc-link Oct 7, 2024
87a5fcc
Create codeql.yml
xc-link Oct 7, 2024
8e7aac5
Create dependabot.yml
xc-link Oct 7, 2024
f49a9fc
Update KeyAuth.js
xc-link Oct 7, 2024
4f16eb8
Update chains.json
xc-link Oct 8, 2024
f39d7dd
Update dependabot.yml
xc-link Oct 9, 2024
7502524
Update dependabot.yml
xc-link Oct 9, 2024
a1de82b
Update dependabot.yml
xc-link Oct 9, 2024
7f22b21
Update dependabot.yml
xc-link Oct 9, 2024
1e7f602
Update dependabot.yml
xc-link Oct 9, 2024
1e62079
Update dependabot.yml
xc-link Oct 9, 2024
4d5da2c
Update dependabot.yml
xc-link Oct 10, 2024
1fedd4f
Update dependabot.yml
xc-link Oct 13, 2024
5222aca
Update codeql.yml
xc-link Oct 13, 2024
3212a6b
Update codeql.yml
xc-link Oct 13, 2024
9b146bb
Create SECURITY.md
xc-link Oct 13, 2024
152f400
Create sonarcloud.yml
xc-link Oct 13, 2024
7b5a2a7
Update codeql.yml
xc-link Oct 13, 2024
698caa0
Create sonarqube.yml
xc-link Oct 13, 2024
e652196
Create apisec-scan.yml
xc-link Oct 13, 2024
69128d8
Create codacy.yml
xc-link Oct 13, 2024
28131fe
Create codescan.yml
xc-link Oct 13, 2024
0bfcf81
Create zscan.yml
xc-link Oct 13, 2024
653b3f1
Create zscaler-iac-scan.yml
xc-link Oct 13, 2024
0d38da8
Create trivy.yml
xc-link Oct 13, 2024
d8ad7ea
Create tfsec.yml
xc-link Oct 13, 2024
8f594c4
Create soos-dast-scan.yml
xc-link Oct 13, 2024
a30ccde
Create sobelow.yml
xc-link Oct 13, 2024
2c596b7
Create snyk-infrastructure.yml
xc-link Oct 13, 2024
ee28dcb
Create securitycodescan.yml
xc-link Oct 13, 2024
25ef873
Create scorecard.yml
xc-link Oct 13, 2024
78ba7e9
Bump SonarSource/sonarqube-scan-action from 1.1.0 to 3.0.0
dependabot[bot] Oct 14, 2024
82389d2
Create rubocop.yml
xc-link Oct 14, 2024
1ac24e5
Create pysa.yml
xc-link Oct 14, 2024
b34c5d6
Create pyre.yml
xc-link Oct 14, 2024
24b6a7a
Create puppet-lint.yml
xc-link Oct 14, 2024
d2eae92
Create psalm.yml
xc-link Oct 14, 2024
a7c5ea5
Create prisma.yml
xc-link Oct 14, 2024
09714db
Create mobsf.yml
xc-link Oct 14, 2024
e4af507
Create hadolint.yml
xc-link Oct 14, 2024
20a1682
Create appknox.yml
xc-link Oct 14, 2024
cc8ec8e
Update dependabot.yml
xc-link Oct 15, 2024
05f8435
Update dependabot.yml
xc-link Oct 15, 2024
c13097b
Update issue templates
xc-link Oct 18, 2024
ad213ff
Create tencent.yml
xc-link Oct 19, 2024
3509858
Create npm-publish-github-packages.yml
xc-link Oct 20, 2024
c165a18
Create npm-publish.yml
xc-link Oct 20, 2024
bec4bf2
Update dependabot.yml
xc-link Oct 22, 2024
25cdb56
Create webpack.yml
xc-link Oct 22, 2024
e6831cf
Create dependency-review.yml
xc-link Oct 22, 2024
9afc078
Update chains.json
xc-link Oct 22, 2024
1e6ca87
Create python-app.yml
xc-link Oct 23, 2024
a7993b7
Create frogbot-scan-and-fix.yml
xc-link Oct 23, 2024
23e1c1c
Create frogbot-scan-pr.yml
xc-link Oct 23, 2024
9096426
Rename KeyAuth.js to AJX.js
xc-link Oct 23, 2024
ca1449e
Rename KeyAuth.js to AJX.js
xc-link Oct 24, 2024
3824331
Update AJX.js
xc-link Oct 29, 2024
5cb3d79
Update AJX.js
xc-link Oct 29, 2024
1413c89
Update AJX.js
xc-link Nov 3, 2024
7bb0b6a
Update AJX.js
xc-link Nov 3, 2024
1d6279d
Bump SonarSource/sonarqube-scan-action from 1.1.0 to 3.0.0 (#11)
xc-link Nov 12, 2024
25d0b58
Bump codescan-io/codescan-scanner-action from 1.2 to 1.6
dependabot[bot] Nov 13, 2024
b85e5e3
Bump codescan-io/codescan-scanner-action from 1.2 to 1.6 (#28)
xc-link Nov 13, 2024
412284d
Create ibm.yml
xc-link Nov 16, 2024
2a90220
Create alibabacloud.yml
xc-link Nov 16, 2024
58e81b7
Create google.yml
xc-link Nov 16, 2024
b84613e
Update README.md
xc-link Nov 24, 2024
8f7755b
modified:package-lock.json
xc-link Nov 30, 2024
8714172
Update dependabot.yml
xc-link Dec 3, 2024
1aa3cea
Create npm-grunt.yml
xc-link Dec 3, 2024
dfdfddf
Create ruby.yml
xc-link Dec 4, 2024
49ff99c
Create crda.yml
xc-link Dec 9, 2024
a8aa270
Create rust-clippy.yml
xc-link Dec 9, 2024
0498073
Create greetings.yml
xc-link Dec 10, 2024
f42e50e
Create label.yml
xc-link Dec 10, 2024
9c65682
Create stale.yml
xc-link Dec 10, 2024
68b8eb9
Create manual.yml
xc-link Dec 10, 2024
370e577
Create deno.yml
xc-link Dec 11, 2024
80cfdf6
Create datadog-synthetics.yml
xc-link Dec 12, 2024
d4f98e5
Create generator-generic-ossf-slsa3-publish.yml
xc-link Dec 12, 2024
8abc7db
Create maven-publish.yml
xc-link Dec 12, 2024
f60c901
Create python-package-conda.yml
xc-link Dec 12, 2024
8a7b6b2
Create jekyll-gh-pages.yml
xc-link Dec 12, 2024
132ea58
Create c-cpp.yml
xc-link Dec 13, 2024
a4218cc
Create cmake-single-platform.yml
xc-link Dec 13, 2024
1dfcb98
Create jekyll.yml
xc-link Dec 14, 2024
316b9d7
Create static.yml
xc-link Dec 15, 2024
3ec88a6
Create gradle.yml
xc-link Dec 16, 2024
5fe147f
Create objective-c-xcode.yml
xc-link Dec 19, 2024
99cd828
Create swift.yml
xc-link Dec 20, 2024
56a610e
Create super-linter.yml
xc-link Dec 22, 2024
d6db218
Create haskell.yml
xc-link Dec 26, 2024
12cb2e9
Create laravel.yml
xc-link Dec 26, 2024
28f2735
Create rust.yml
xc-link Dec 29, 2024
a10909c
Create d.yml
xc-link Dec 30, 2024
ae10d9c
Create gatsby.yml
xc-link Jan 5, 2025
0918b59
Create erlang.yml
xc-link Jan 9, 2025
5518c62
Create verify_signature.js
xc-link Jan 14, 2025
cfce525
Create octopusdeploy.yml
xc-link Jan 14, 2025
6997f95
Create mv.js
xc-link Jan 19, 2025
fe51416
Create Dockerfile
xc-link Jan 27, 2025
0d2f20f
Create package-prepare_job-lock.JSON
xc-link Jan 28, 2025
bcf761e
Update package-prepare_job-lock.JSON
xc-link Jan 28, 2025
f59b289
Create package-prepare_job_ responseFile.JSON
xc-link Jan 28, 2025
0dff44f
Create package-cleanup_job-lock.JSON
xc-link Jan 28, 2025
da57160
Create package-run_container_step_or_docker_image.JSON
xc-link Jan 28, 2025
38a038a
Create package-run_container_step_or_dockerfile.JSON
xc-link Jan 28, 2025
feb8697
Create package-run_script_step-lock.JSON
xc-link Jan 28, 2025
13379a0
Create eslint.yml
xc-link Jan 30, 2025
394d514
Create docker-publish.yml
xc-link Jan 31, 2025
35eed31
Update snyk-infrastructure.yml
xc-link Feb 3, 2025
681b8d8
Update dependabot.yml
xc-link Feb 6, 2025
3a3e75f
Update eslint.yml
xc-link Feb 8, 2025
dee8428
Update docker-publish.yml
xc-link Feb 8, 2025
655ca86
Update scorecard.yml
xc-link Feb 8, 2025
8214918
Update rubocop.yml
xc-link Feb 8, 2025
40dcf69
Update psalm.yml
xc-link Feb 8, 2025
84a86a1
Update sobelow.yml
xc-link Feb 8, 2025
caf2abb
Update puppet-lint.yml
xc-link Feb 9, 2025
9540e79
Update prisma.yml
xc-link Feb 9, 2025
076022a
Update codeql.yml
xc-link Feb 10, 2025
8c6308c
Update securitycodescan.yml
xc-link Feb 10, 2025
4392366
Update rust-clippy.yml
xc-link Feb 14, 2025
83a553b
Update zscaler-iac-scan.yml
xc-link Feb 14, 2025
9da40bc
Update trivy.yml
xc-link Feb 14, 2025
0ee3190
Update apisec-scan.yml
xc-link Feb 15, 2025
df14e87
Update snyk-infrastructure.yml
xc-link Feb 18, 2025
a02a861
Update codescan.yml
xc-link Feb 18, 2025
7a8b318
Update chains.json
xc-link Feb 18, 2025
8450660
Update hadolint.yml
xc-link Feb 19, 2025
5f45ea5
Update pysa.yml
xc-link Feb 22, 2025
24562be
Update eslint.yml
xc-link Feb 22, 2025
13dfff6
Update AJX.js
xc-link Feb 22, 2025
a2cf63b
Update README.md
xc-link Feb 28, 2025
1aee456
Update dependabot.yml
xc-link Feb 28, 2025
1c09f2f
Create FUNDING.yml
xc-link Mar 1, 2025
41c2e5b
Update chains.json
xc-link Mar 2, 2025
8f66248
Update AJX.js
xc-link Mar 2, 2025
94dd9ca
modified:package-lock.json
xc-link Mar 2, 2025
317c789
Update dependabot.yml
xc-link Mar 3, 2025
8ec6e72
Create openshift.yml
xc-link Mar 6, 2025
94b8cb8
modifide:yarn.lock
xc-link Mar 20, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions .github/ISSUE_TEMPLATE/custom.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
name: Custom issue template
about: Describe this issue template's purpose here.
title: ''
labels: ''
assignees: ''

---


145 changes: 145 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,145 @@
# To get started with Dependabot version updates, you'll need to specify which
# package ecosystems to update and where the package manifests are located.
# Please see the documentation for all configuration options:
# https://docs.github.com/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file
#Basic set up for three package managers

version: 2

enable-beta-ecosystems: true

updates:

# Maintain dependencies for GitHub Actions
- package-ecosystem: "github-actions"
# Workflow files stored in the default location of `.github/workflows`. (You don't need to specify `/.github/workflows` for `directory`. You can use `directory: "/"`.)
directory: "/"
schedule:
interval: "daily"

# Check for npm updates at 9am UTC
time: "01:00"

allow:
# Allow both direct and indirect updates for all packages
- dependency-type: "all"

pull-request-branch-name:
# Separate sections of the branch name with a hyphen
# for example, `dependabot-npm_and_yarn-next_js-acorn-6.4.1`
separator: "-"

# Maintain dependencies for npm
- package-ecosystem: "npm"
directory: "/"
schedule:
interval: "daily"

# Check for npm updates at 9am UTC
time: "01:00"

allow:
# Allow both direct and indirect updates for all packages
- dependency-type: "all"

pull-request-branch-name:
# Separate sections of the branch name with a hyphen
# for example, `dependabot-npm_and_yarn-next_js-acorn-6.4.1`
separator: "-"

# Maintain dependencies for Composer
- package-ecosystem: "composer"
directory: "/"
schedule:
interval: "daily"

# Check for npm updates at 9am UTC
time: "01:00"

allow:
# Allow both direct and indirect updates for all packages
- dependency-type: "all"

pull-request-branch-name:
# Separate sections of the branch name with a hyphen
# for example, `dependabot-npm_and_yarn-next_js-acorn-6.4.1`
separator: "-"

# Maintain dependencies for Bundler
- package-ecosystem: "bundler"
directory: "/"
schedule:
interval: "daily"

# Check for npm updates at 9am UTC
time: "01:00"

allow:
# Allow both direct and indirect updates for all packages
- dependency-type: "all"

pull-request-branch-name:
# Separate sections of the branch name with a hyphen
# for example, `dependabot-npm_and_yarn-next_js-acorn-6.4.1`
separator: "-"


# Maintain dependencies for Pip
- package-ecosystem: "pip"
directory: "/"
schedule:
interval: "daily"

# Check for npm updates at 9am UTC
time: "01:00"

allow:
# Allow both direct and indirect updates for all packages
- dependency-type: "all"

pull-request-branch-name:
# Separate sections of the branch name with a hyphen
# for example, `dependabot-npm_and_yarn-next_js-acorn-6.4.1`
separator: "-"


# Maintain dependencies for Pub
- package-ecosystem: "pub"
directory: "/"
schedule:
interval: "daily"

# Check for npm updates at 9am UTC
time: "01:00"

allow:
# Allow both direct and indirect updates for all packages
- dependency-type: "all"

pull-request-branch-name:
# Separate sections of the branch name with a hyphen
# for example, `dependabot-npm_and_yarn-next_js-acorn-6.4.1`
separator: "-"


# Maintain dependencies for Docker
- package-ecosystem: "docker"
directory: "/"
schedule:
interval: "daily"

# Check for npm updates at 9am UTC
time: "01:00"

allow:
# Allow both direct and indirect updates for all packages
- dependency-type: "all"

pull-request-branch-name:
# Separate sections of the branch name with a hyphen
# for example, `dependabot-npm_and_yarn-next_js-acorn-6.4.1`
separator: "-"


# Use this YAML in your workflow file for each job
# runs-on: self-hosted
122 changes: 122 additions & 0 deletions .github/workflows/alibabacloud.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,122 @@
# This workflow will build and push a new container image to Alibaba Cloud Container Registry (ACR),
# and then will deploy it to Alibaba Cloud Container Service for Kubernetes (ACK), when there is a push to the "main" branch.
#
# To use this workflow, you will need to complete the following set-up steps:
#
# 1. Create an ACR repository to store your container images.
# You can use ACR EE instance for more security and better performance.
# For instructions see https://www.alibabacloud.com/help/doc-detail/142168.htm
#
# 2. Create an ACK cluster to run your containerized application.
# You can use ACK Pro cluster for more security and better performance.
# For instructions see https://www.alibabacloud.com/help/doc-detail/95108.htm
#
# 3. Store your AccessKey pair in GitHub Actions secrets named `ACCESS_KEY_ID` and `ACCESS_KEY_SECRET`.
# For instructions on setting up secrets see: https://developer.github.com/actions/managing-workflows/storing-secrets/
#
# 4. Change the values for the REGION_ID, REGISTRY, NAMESPACE, IMAGE, ACK_CLUSTER_ID, and ACK_DEPLOYMENT_NAME.
#

name: Build and Deploy to ACK

on:
push:
branches: [ "main" ]

# Environment variables available to all jobs and steps in this workflow.
env:
REGION_ID: cn-hangzhou
REGISTRY: registry.cn-hangzhou.aliyuncs.com
NAMESPACE: namespace
IMAGE: repo
TAG: ${{ github.sha }}
ACK_CLUSTER_ID: clusterID
ACK_DEPLOYMENT_NAME: nginx-deployment

ACR_EE_REGISTRY: myregistry.cn-hangzhou.cr.aliyuncs.com
ACR_EE_INSTANCE_ID: instanceID
ACR_EE_NAMESPACE: namespace
ACR_EE_IMAGE: repo
ACR_EE_TAG: ${{ github.sha }}

permissions:
contents: read

jobs:
build:
runs-on: ubuntu-latest
environment: production

steps:
- name: Checkout
uses: actions/checkout@v4

# 1.1 Login to ACR
- name: Login to ACR with the AccessKey pair
uses: aliyun/acr-login@v1
with:
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"

# 1.2 Build and push image to ACR
- name: Build and push image to ACR
run: |
docker build --tag "$REGISTRY/$NAMESPACE/$IMAGE:$TAG" .
docker push "$REGISTRY/$NAMESPACE/$IMAGE:$TAG"

# 1.3 Scan image in ACR
- name: Scan image in ACR
uses: aliyun/acr-scan@v1
with:
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
repository: "${{ env.NAMESPACE }}/${{ env.IMAGE }}"
tag: "${{ env.TAG }}"

# 2.1 (Optional) Login to ACR EE
- uses: actions/checkout@v4
- name: Login to ACR EE with the AccessKey pair
uses: aliyun/acr-login@v1
with:
login-server: "https://${{ env.ACR_EE_REGISTRY }}"
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
instance-id: "${{ env.ACR_EE_INSTANCE_ID }}"

# 2.2 (Optional) Build and push image ACR EE
- name: Build and push image to ACR EE
run: |
docker build -t "$ACR_EE_REGISTRY/$ACR_EE_NAMESPACE/$ACR_EE_IMAGE:$TAG" .
docker push "$ACR_EE_REGISTRY/$ACR_EE_NAMESPACE/$ACR_EE_IMAGE:$TAG"
# 2.3 (Optional) Scan image in ACR EE
- name: Scan image in ACR EE
uses: aliyun/acr-scan@v1
with:
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
instance-id: "${{ env.ACR_EE_INSTANCE_ID }}"
repository: "${{ env.ACR_EE_NAMESPACE}}/${{ env.ACR_EE_IMAGE }}"
tag: "${{ env.ACR_EE_TAG }}"

# 3.1 Set ACK context
- name: Set K8s context
uses: aliyun/ack-set-context@v1
with:
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
cluster-id: "${{ env.ACK_CLUSTER_ID }}"

# 3.2 Deploy the image to the ACK cluster
- name: Set up Kustomize
run: |-
curl -s "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash /dev/stdin 3.8.6
- name: Deploy
run: |-
./kustomize edit set image REGISTRY/NAMESPACE/IMAGE:TAG=$REGISTRY/$NAMESPACE/$IMAGE:$TAG
./kustomize build . | kubectl apply -f -
kubectl rollout status deployment/$ACK_DEPLOYMENT_NAME
kubectl get services -o wide
72 changes: 72 additions & 0 deletions .github/workflows/apisec-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,72 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# APIsec addresses the critical need to secure APIs before they reach production.
# APIsec provides the industry’s only automated and continuous API testing platform that uncovers security vulnerabilities and logic flaws in APIs.
# Clients rely on APIsec to evaluate every update and release, ensuring that no APIs go to production with vulnerabilities.

# How to Get Started with APIsec.ai
# 1. Schedule a demo at https://www.apisec.ai/request-a-demo .
#
# 2. Register your account at https://cloud.apisec.ai/#/signup .
#
# 3. Register your API . See the video (https://www.youtube.com/watch?v=MK3Xo9Dbvac) to get up and running with APIsec quickly.
#
# 4. Get GitHub Actions scan attributes from APIsec Project -> Configurations -> Integrations -> CI-CD -> GitHub Actions
#
# apisec-run-scan
#
# This action triggers the on-demand scans for projects registered in APIsec.
# If your GitHub account allows code scanning alerts, you can then upload the sarif file generated by this action to show the scan findings.
# Else you can view the scan results from the project home page in APIsec Platform.
# The link to view the scan results is also displayed on the console on successful completion of action.

# This is a starter workflow to help you get started with APIsec-Scan Actions

name: APIsec

# Controls when the workflow will run
on:
# Triggers the workflow on push or pull request events but only for the "main" branch
# Customize trigger events based on your DevSecOps processes.
push:
branches: [ "main" ]
pull_request:
branches: [ "main" ]
schedule:
- cron: '32 0 * * 6'

# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:


permissions:
contents: read

jobs:

Trigger_APIsec_scan:
permissions:
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest

steps:
- name: APIsec scan
uses: apisec-inc/apisec-run-scan@025432089674a28ba8fb55f8ab06c10215e772ea
with:
# The APIsec username with which the scans will be executed
apisec-username: ${{ secrets.apisec_username }}
# The Password of the APIsec user with which the scans will be executed
apisec-password: ${{ secrets.apisec_password}}
# The name of the project for security scan
apisec-project: "VAmPI"
# The name of the sarif format result file The file is written only if this property is provided.
sarif-result-file: "apisec-results.sarif"
- name: Import results
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: ./apisec-results.sarif
#20250215
Loading