Skip to content

Commit be78c6f

Browse files
authored
Merge branch 'main' into add-udisks-checker
2 parents eeadd7b + 9fc71f1 commit be78c6f

File tree

128 files changed

+3410
-1788
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

128 files changed

+3410
-1788
lines changed

.github/actions/spelling/allow.txt

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,7 @@ dsa
139139
dtls
140140
e
141141
elfutils
142+
emacs
142143
endoflife
143144
enscript
144145
entrypoint
@@ -167,6 +168,7 @@ filetype
167168
filterdiv
168169
firefox
169170
flac
171+
fluidsynth
170172
freeradius
171173
freerdp
172174
FReeshabh
@@ -185,12 +187,14 @@ gcc
185187
gdb
186188
Gemfile
187189
Gemfiles
190+
geopy
188191
getenv
189192
gettext
190193
gimp
191194
Giridhar
192195
git
193196
github
197+
githubusercontent
194198
gitlab
195199
GitLab
196200
gitlint
@@ -215,6 +219,7 @@ gsoc
215219
gstreamer
216220
gupnp
217221
gvfs
222+
gzip
218223
Hacktoberfest
219224
haproxy
220225
harfbuzz
@@ -242,6 +247,7 @@ imgur
242247
imsahil
243248
INI
244249
iperf
250+
ipk
245251
ipmitool
246252
ipsec
247253
iptables
@@ -269,6 +275,7 @@ kodi
269275
kritirikhi
270276
kubernetes
271277
landley
278+
ldns
272279
lftp
273280
lgpl
274281
lgtm
@@ -293,6 +300,7 @@ libksba
293300
liblas
294301
libmatroska
295302
libmemcached
303+
libmicrohttpd
296304
libnss
297305
libpcap
298306
libpng
@@ -348,6 +356,7 @@ metabiswadeep
348356
metadata
349357
microsoft
350358
mingw
359+
mini
351360
minicom
352361
minidlna
353362
miniupnpc
@@ -401,6 +410,7 @@ nplurals
401410
ntia
402411
ntp
403412
ntpsec
413+
numpy
404414
nvd
405415
nvdosvgad
406416
nvdosvgadcurl
@@ -438,6 +448,7 @@ perl
438448
php
439449
picocom
440450
pigz
451+
pixman
441452
plotly
442453
png
443454
pocoo
@@ -513,6 +524,7 @@ securityscorecards
513524
shadowsocks
514525
shreyamalviya
515526
sip
527+
sngrep
516528
snort
517529
sofia
518530
somefile
@@ -548,13 +560,15 @@ syslogng
548560
sysstat
549561
systemd
550562
SYSV
563+
tagvalue
551564
taskbar
552565
tcpdump
553566
tcpreplay
554567
templating
555568
terri
556569
terriko
557570
testfiles
571+
tgz
558572
thrift
559573
thttpd
560574
thunderbird
@@ -598,6 +612,7 @@ utm
598612
varnish
599613
venv
600614
vfy
615+
vim
601616
virtualenv
602617
visualstudio
603618
vm

.github/dependabot.yml

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,3 +7,52 @@ updates:
77
directory: "/"
88
schedule:
99
interval: "daily"
10+
11+
- package-ecosystem: pip
12+
directory: /doc
13+
schedule:
14+
interval: daily
15+
16+
- package-ecosystem: pip
17+
directory: /
18+
schedule:
19+
interval: daily
20+
21+
# Scanning is disabled for files in /test/ to avoid false positives.
22+
# These files are used for testing; vulnerable code is never installed or used.
23+
24+
- package-ecosystem: cargo
25+
directory: /test/language_data
26+
schedule:
27+
interval: monthly
28+
ignore:
29+
- dependency-name: "*"
30+
31+
- package-ecosystem: bundler
32+
directory: /test/language_data
33+
schedule:
34+
interval: monthly
35+
ignore:
36+
- dependency-name: "*"
37+
38+
- package-ecosystem: gomod
39+
directory: /test/language_data
40+
schedule:
41+
interval: monthly
42+
ignore:
43+
- dependency-name: "*"
44+
45+
- package-ecosystem: pip
46+
directory: /test/language_data
47+
schedule:
48+
interval: monthly
49+
ignore:
50+
- dependency-name: "*"
51+
52+
- package-ecosystem: maven
53+
directory: /test/language_data
54+
schedule:
55+
interval: monthly
56+
ignore:
57+
- dependency-name: "*"
58+

.github/workflows/codeql-analysis.yml

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,9 @@ on:
2020
schedule:
2121
- cron: '38 0 * * 4'
2222

23+
permissions:
24+
contents: read
25+
2326
jobs:
2427
analyze:
2528
name: Analyze
@@ -38,12 +41,17 @@ jobs:
3841
# https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed
3942

4043
steps:
44+
- name: Harden Runner
45+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
46+
with:
47+
egress-policy: audit
48+
4149
- name: Checkout repository
42-
uses: actions/checkout@v3
50+
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
4351

4452
# Initializes the CodeQL tools for scanning.
4553
- name: Initialize CodeQL
46-
uses: github/codeql-action/init@v2
54+
uses: github/codeql-action/init@0225834cc549ee0ca93cb085b92954821a145866 # v2.3.5
4755
with:
4856
languages: ${{ matrix.language }}
4957
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -54,7 +62,7 @@ jobs:
5462
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
5563
# If this step fails, then you should remove it and run the build manually (see below)
5664
- name: Autobuild
57-
uses: github/codeql-action/autobuild@v2
65+
uses: github/codeql-action/autobuild@0225834cc549ee0ca93cb085b92954821a145866 # v2.3.5
5866

5967
# ℹ️ Command-line programs to run using the OS shell.
6068
# 📚 https://git.io/JvXDl
@@ -68,4 +76,4 @@ jobs:
6876
# make release
6977

7078
- name: Perform CodeQL Analysis
71-
uses: github/codeql-action/analyze@v2
79+
uses: github/codeql-action/analyze@0225834cc549ee0ca93cb085b92954821a145866 # v2.3.5

.github/workflows/coverity.yml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,13 @@ jobs:
1010
coverity:
1111
runs-on: ubuntu-22.04
1212
steps:
13-
- uses: actions/checkout@v3
14-
- uses: vapier/coverity-scan-action@v1
13+
- name: Harden Runner
14+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
15+
with:
16+
egress-policy: audit
17+
18+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
19+
- uses: vapier/coverity-scan-action@cae3c096a2eb21c431961a49375ac17aea2670ce # v1.7.0
1520
with:
1621
email: ${{ secrets.COVERITY_SCAN_EMAIL }}
1722
token: ${{ secrets.COVERITY_SCAN_TOKEN }}

.github/workflows/cve_scan.yml

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,22 @@ on:
55
pull_request:
66
workflow_dispatch:
77

8+
permissions:
9+
contents: read
10+
811
jobs:
912
cve_scan:
1013
name: CVE scan on dependencies
1114
runs-on: ubuntu-22.04
1215
timeout-minutes: 10
1316
steps:
14-
- uses: actions/checkout@v3
15-
- uses: actions/setup-python@v4
17+
- name: Harden Runner
18+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
19+
with:
20+
egress-policy: audit
21+
22+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
23+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
1624
with:
1725
python-version: '3.x'
1826
cache: 'pip'
@@ -22,7 +30,7 @@ jobs:
2230
run: |
2331
echo "date=$(/bin/date -u "+%Y%m%d")" >> $GITHUB_OUTPUT
2432
- name: Get cached database
25-
uses: actions/cache@v3
33+
uses: actions/cache@88522ab9f39a2ea568f7027eddc7d8d8bc9d59c8 # v3.3.1
2634
with:
2735
path: cache
2836
key: Linux-cve-bin-tool-${{ steps.get-date.outputs.date }}
@@ -33,7 +41,8 @@ jobs:
3341
python -m pip install --upgrade wheel
3442
python -m pip install --upgrade pytest
3543
pip install . -r doc/requirements.txt
36-
[[ -e cache ]] && mkdir -p .cache && mv cache ~/.cache/cve-bin-tool
44+
[[ -e cache ]] && mkdir -p .cache && mv -f cache .cache/cve-bin-tool
45+
sleep 5
3746
- name: Test to check for CVEs for Python requirements and HTML report dependencies
3847
run: |
3948
pytest test/test_requirements.py
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required,
6+
# PRs introducing known-vulnerable packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
name: 'Dependency Review'
10+
on: [pull_request]
11+
12+
permissions:
13+
contents: read
14+
15+
jobs:
16+
dependency-review:
17+
runs-on: ubuntu-22.04
18+
steps:
19+
- name: Harden Runner
20+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
21+
with:
22+
egress-policy: audit
23+
24+
- name: 'Checkout Repository'
25+
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
26+
- name: 'Dependency Review'
27+
uses: actions/dependency-review-action@1360a344ccb0ab6e9475edef90ad2f46bf8003b1 # v3.0.6

.github/workflows/export_data.yml

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,25 @@ env:
1414
NO_EXIT_CVE_NUM: 1
1515
nvd_api_key: ${{ secrets.NVD_API_KEY }}
1616

17+
permissions:
18+
contents: read
19+
1720
jobs:
1821
update:
22+
permissions:
23+
contents: write # for peter-evans/create-pull-request to create branch
24+
pull-requests: write # for peter-evans/create-pull-request to create a PR
1925
runs-on: ubuntu-22.04
2026

21-
steps:
22-
- uses: actions/checkout@v3
27+
steps:
28+
- name: Harden Runner
29+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
30+
with:
31+
egress-policy: audit
32+
33+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
2334

24-
- uses: actions/setup-python@v4
35+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
2536
with:
2637
python-version: '3.x'
2738

@@ -39,7 +50,7 @@ jobs:
3950
python -m cve_bin_tool.cli --export-json exported_data
4051
4152
- name: Create Pull Request
42-
uses: peter-evans/create-pull-request@v5
53+
uses: peter-evans/create-pull-request@284f54f989303d2699d373481a0cfa13ad5a6666 # v5.0.1
4354
with:
4455
commit-message: 'chore: update database copy'
4556
title: 'chore: create copy of NVD database'

.github/workflows/formatting.yml

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,24 @@ on:
77
paths:
88
- 'cve_bin_tool/checkers/__init__.py'
99

10+
permissions:
11+
contents: read
12+
1013
jobs:
1114
formatting:
15+
permissions:
16+
contents: write # for peter-evans/create-pull-request to create branch
17+
pull-requests: write # for peter-evans/create-pull-request to create a PR
1218
name: Update checkers table
1319
runs-on: ubuntu-22.04
1420
steps:
15-
- uses: actions/checkout@v3
16-
- uses: actions/setup-python@v4
21+
- name: Harden Runner
22+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
23+
with:
24+
egress-policy: audit
25+
26+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
27+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
1728
with:
1829
python-version: '3.x'
1930
cache: 'pip'
@@ -25,7 +36,7 @@ jobs:
2536
run: |
2637
python cve_bin_tool/format_checkers.py
2738
- name: Create Pull Request
28-
uses: peter-evans/create-pull-request@v5
39+
uses: peter-evans/create-pull-request@284f54f989303d2699d373481a0cfa13ad5a6666 # v5.0.1
2940
with:
3041
commit-message: "chore: update checkers table"
3142
title: "chore: update checkers table"

0 commit comments

Comments
 (0)