Skip to content

Commit bf31f3d

Browse files
authored
Merge branch 'main' into add-libmodbus-checker
2 parents ff95b5a + 06cb2e9 commit bf31f3d

File tree

90 files changed

+2001
-1054
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+2001
-1054
lines changed

.github/actions/spelling/allow.txt

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,7 @@ dsa
139139
dtls
140140
e
141141
elfutils
142+
emacs
142143
endoflife
143144
enscript
144145
entrypoint
@@ -167,6 +168,7 @@ filetype
167168
filterdiv
168169
firefox
169170
flac
171+
fluidsynth
170172
freeradius
171173
freerdp
172174
FReeshabh
@@ -217,6 +219,7 @@ gsoc
217219
gstreamer
218220
gupnp
219221
gvfs
222+
gzip
220223
Hacktoberfest
221224
haproxy
222225
harfbuzz
@@ -272,6 +275,7 @@ kodi
272275
kritirikhi
273276
kubernetes
274277
landley
278+
ldns
275279
lftp
276280
lgpl
277281
lgtm
@@ -296,6 +300,7 @@ libksba
296300
liblas
297301
libmatroska
298302
libmemcached
303+
libmicrohttpd
299304
libnss
300305
libpcap
301306
libpng
@@ -351,6 +356,7 @@ metabiswadeep
351356
metadata
352357
microsoft
353358
mingw
359+
mini
354360
minicom
355361
minidlna
356362
miniupnpc
@@ -442,6 +448,7 @@ perl
442448
php
443449
picocom
444450
pigz
451+
pixman
445452
plotly
446453
png
447454
pocoo
@@ -517,6 +524,7 @@ securityscorecards
517524
shadowsocks
518525
shreyamalviya
519526
sip
527+
sngrep
520528
snort
521529
sofia
522530
somefile
@@ -552,6 +560,7 @@ syslogng
552560
sysstat
553561
systemd
554562
SYSV
563+
tagvalue
555564
taskbar
556565
tcpdump
557566
tcpreplay

.github/dependabot.yml

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,3 +7,52 @@ updates:
77
directory: "/"
88
schedule:
99
interval: "daily"
10+
11+
- package-ecosystem: pip
12+
directory: /doc
13+
schedule:
14+
interval: daily
15+
16+
- package-ecosystem: pip
17+
directory: /
18+
schedule:
19+
interval: daily
20+
21+
# Scanning is disabled for files in /test/ to avoid false positives.
22+
# These files are used for testing; vulnerable code is never installed or used.
23+
24+
- package-ecosystem: cargo
25+
directory: /test/language_data
26+
schedule:
27+
interval: monthly
28+
ignore:
29+
- dependency-name: "*"
30+
31+
- package-ecosystem: bundler
32+
directory: /test/language_data
33+
schedule:
34+
interval: monthly
35+
ignore:
36+
- dependency-name: "*"
37+
38+
- package-ecosystem: gomod
39+
directory: /test/language_data
40+
schedule:
41+
interval: monthly
42+
ignore:
43+
- dependency-name: "*"
44+
45+
- package-ecosystem: pip
46+
directory: /test/language_data
47+
schedule:
48+
interval: monthly
49+
ignore:
50+
- dependency-name: "*"
51+
52+
- package-ecosystem: maven
53+
directory: /test/language_data
54+
schedule:
55+
interval: monthly
56+
ignore:
57+
- dependency-name: "*"
58+

.github/workflows/codeql-analysis.yml

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,9 @@ on:
2020
schedule:
2121
- cron: '38 0 * * 4'
2222

23+
permissions:
24+
contents: read
25+
2326
jobs:
2427
analyze:
2528
name: Analyze
@@ -38,12 +41,17 @@ jobs:
3841
# https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed
3942

4043
steps:
44+
- name: Harden Runner
45+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
46+
with:
47+
egress-policy: audit
48+
4149
- name: Checkout repository
42-
uses: actions/checkout@v3
50+
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
4351

4452
# Initializes the CodeQL tools for scanning.
4553
- name: Initialize CodeQL
46-
uses: github/codeql-action/init@v2
54+
uses: github/codeql-action/init@0225834cc549ee0ca93cb085b92954821a145866 # v2.3.5
4755
with:
4856
languages: ${{ matrix.language }}
4957
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -54,7 +62,7 @@ jobs:
5462
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
5563
# If this step fails, then you should remove it and run the build manually (see below)
5664
- name: Autobuild
57-
uses: github/codeql-action/autobuild@v2
65+
uses: github/codeql-action/autobuild@0225834cc549ee0ca93cb085b92954821a145866 # v2.3.5
5866

5967
# ℹ️ Command-line programs to run using the OS shell.
6068
# 📚 https://git.io/JvXDl
@@ -68,4 +76,4 @@ jobs:
6876
# make release
6977

7078
- name: Perform CodeQL Analysis
71-
uses: github/codeql-action/analyze@v2
79+
uses: github/codeql-action/analyze@0225834cc549ee0ca93cb085b92954821a145866 # v2.3.5

.github/workflows/coverity.yml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,13 @@ jobs:
1010
coverity:
1111
runs-on: ubuntu-22.04
1212
steps:
13-
- uses: actions/checkout@v3
14-
- uses: vapier/coverity-scan-action@v1
13+
- name: Harden Runner
14+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
15+
with:
16+
egress-policy: audit
17+
18+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
19+
- uses: vapier/coverity-scan-action@cae3c096a2eb21c431961a49375ac17aea2670ce # v1.7.0
1520
with:
1621
email: ${{ secrets.COVERITY_SCAN_EMAIL }}
1722
token: ${{ secrets.COVERITY_SCAN_TOKEN }}

.github/workflows/cve_scan.yml

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,22 @@ on:
55
pull_request:
66
workflow_dispatch:
77

8+
permissions:
9+
contents: read
10+
811
jobs:
912
cve_scan:
1013
name: CVE scan on dependencies
1114
runs-on: ubuntu-22.04
1215
timeout-minutes: 10
1316
steps:
14-
- uses: actions/checkout@v3
15-
- uses: actions/setup-python@v4
17+
- name: Harden Runner
18+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
19+
with:
20+
egress-policy: audit
21+
22+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
23+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
1624
with:
1725
python-version: '3.x'
1826
cache: 'pip'
@@ -22,7 +30,7 @@ jobs:
2230
run: |
2331
echo "date=$(/bin/date -u "+%Y%m%d")" >> $GITHUB_OUTPUT
2432
- name: Get cached database
25-
uses: actions/cache@v3
33+
uses: actions/cache@88522ab9f39a2ea568f7027eddc7d8d8bc9d59c8 # v3.3.1
2634
with:
2735
path: cache
2836
key: Linux-cve-bin-tool-${{ steps.get-date.outputs.date }}
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required,
6+
# PRs introducing known-vulnerable packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
name: 'Dependency Review'
10+
on: [pull_request]
11+
12+
permissions:
13+
contents: read
14+
15+
jobs:
16+
dependency-review:
17+
runs-on: ubuntu-22.04
18+
steps:
19+
- name: Harden Runner
20+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
21+
with:
22+
egress-policy: audit
23+
24+
- name: 'Checkout Repository'
25+
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
26+
- name: 'Dependency Review'
27+
uses: actions/dependency-review-action@1360a344ccb0ab6e9475edef90ad2f46bf8003b1 # v3.0.6

.github/workflows/export_data.yml

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,25 @@ env:
1414
NO_EXIT_CVE_NUM: 1
1515
nvd_api_key: ${{ secrets.NVD_API_KEY }}
1616

17+
permissions:
18+
contents: read
19+
1720
jobs:
1821
update:
22+
permissions:
23+
contents: write # for peter-evans/create-pull-request to create branch
24+
pull-requests: write # for peter-evans/create-pull-request to create a PR
1925
runs-on: ubuntu-22.04
2026

2127
steps:
22-
- uses: actions/checkout@v3
28+
- name: Harden Runner
29+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
30+
with:
31+
egress-policy: audit
32+
33+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
2334

24-
- uses: actions/setup-python@v4
35+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
2536
with:
2637
python-version: '3.x'
2738

@@ -39,7 +50,7 @@ jobs:
3950
python -m cve_bin_tool.cli --export-json exported_data
4051
4152
- name: Create Pull Request
42-
uses: peter-evans/create-pull-request@v5
53+
uses: peter-evans/create-pull-request@284f54f989303d2699d373481a0cfa13ad5a6666 # v5.0.1
4354
with:
4455
commit-message: 'chore: update database copy'
4556
title: 'chore: create copy of NVD database'

.github/workflows/formatting.yml

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,24 @@ on:
77
paths:
88
- 'cve_bin_tool/checkers/__init__.py'
99

10+
permissions:
11+
contents: read
12+
1013
jobs:
1114
formatting:
15+
permissions:
16+
contents: write # for peter-evans/create-pull-request to create branch
17+
pull-requests: write # for peter-evans/create-pull-request to create a PR
1218
name: Update checkers table
1319
runs-on: ubuntu-22.04
1420
steps:
15-
- uses: actions/checkout@v3
16-
- uses: actions/setup-python@v4
21+
- name: Harden Runner
22+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
23+
with:
24+
egress-policy: audit
25+
26+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
27+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
1728
with:
1829
python-version: '3.x'
1930
cache: 'pip'
@@ -25,7 +36,7 @@ jobs:
2536
run: |
2637
python cve_bin_tool/format_checkers.py
2738
- name: Create Pull Request
28-
uses: peter-evans/create-pull-request@v5
39+
uses: peter-evans/create-pull-request@284f54f989303d2699d373481a0cfa13ad5a6666 # v5.0.1
2940
with:
3041
commit-message: "chore: update checkers table"
3142
title: "chore: update checkers table"

.github/workflows/linting.yml

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,9 @@ on:
55
pull_request:
66
workflow_dispatch:
77

8+
permissions:
9+
contents: read
10+
811
jobs:
912
linting:
1013
name: Linting
@@ -14,8 +17,13 @@ jobs:
1417
matrix:
1518
tool: ['isort', 'black', 'pyupgrade', 'flake8', 'bandit', 'gitlint', 'mypy']
1619
steps:
17-
- uses: actions/checkout@v3
18-
- uses: actions/setup-python@v4
20+
- name: Harden Runner
21+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
22+
with:
23+
egress-policy: audit
24+
25+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
26+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
1927
with:
2028
python-version: '3.x'
2129
cache: 'pip'

.github/workflows/sbom.yml

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,27 @@ on:
66
# Runs at 02:00 UTC every Monday
77
- cron: '2 0 * * 1'
88

9+
permissions:
10+
contents: read
11+
912
jobs:
1013
sbom_gen:
14+
permissions:
15+
contents: write # for peter-evans/create-pull-request to create branch
16+
pull-requests: write # for peter-evans/create-pull-request to create a PR
1117
name: Generate SBOM
1218
runs-on: ubuntu-22.04
1319
strategy:
1420
matrix:
1521
python: ['3.7', '3.8', '3.9', '3.10', '3.11']
1622
steps:
17-
- uses: actions/checkout@v3
18-
- uses: actions/setup-python@v4
23+
- name: Harden Runner
24+
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0
25+
with:
26+
egress-policy: audit
27+
28+
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
29+
- uses: actions/setup-python@bd6b4b6205c4dbad673328db7b31b7fab9e241c0 # v4.6.1
1930
with:
2031
python-version: ${{ matrix.python }}
2132
cache: 'pip'
@@ -50,7 +61,7 @@ jobs:
5061
cp cve-bin-tool-py${{ matrix.python }}.json sbom/cve-bin-tool-py${{ matrix.python }}.json
5162
- name: Create Pull Request
5263
if: ${{ steps.diff-sbom.outputs.changed }}
53-
uses: peter-evans/create-pull-request@v5
64+
uses: peter-evans/create-pull-request@284f54f989303d2699d373481a0cfa13ad5a6666 # v5.0.1
5465
with:
5566
commit-message: "chore: update SBOM for Python ${{ matrix.python }}"
5667
title: "chore: update SBOM for Python ${{ matrix.python }}"

0 commit comments

Comments
 (0)