Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 0 additions & 3 deletions .github/license-reminder.md

This file was deleted.

83 changes: 60 additions & 23 deletions .github/pull_request_template.md
Original file line number Diff line number Diff line change
@@ -1,58 +1,95 @@
<!--- Please provide a general summary of your changes in the title above -->

## Pull request type

# Pull request type
<!-- Please try to limit your pull request to one type, submit multiple pull requests if needed -->

**🚨 Jekyll Precheck Verify blog(s), page(s) before merge 🚨**
- [ ] title
- [ ] tags
- [ ] categories
- [ ] date

<!-
IS#9999 – Issue created independently of a Pull Request
PR#9999 – Issue created from a Pull Request
-->
Pull Request/Issue Number: N/A

Please check the type of change your PR introduces:

- [ ] New blog post
- [ ] Bugfix
- [ ] New blog post(s)
- [ ] Bugfix(es)
- [ ] Code change(s)
- [ ] Jekyll change(s)
- [ ] Liquid change(s)
- [ ] Markdown change(s)
- [ ] YAML change(s)
- [ ] Build error(s)
- [ ] Feature
- [ ] Feature(s)
- [ ] Code style update (formatting, renaming)
- [ ] Refactoring (no functional changes, no api changes)
- [ ] Build related changes
- [ ] Documentation content changes
- [ ] Build related change(s)
- [ ] Documentation content change(s)
- [ ] Other (please describe):

## Language
## Language(s)

- [ ] Assembler
- [ ] awk
- [ ] C/C++/C#
- [ ] HTML
- [ ] Javascript
- [ ] Jekyll
- [ ] Liquid
- [ ] Markdown
- [ ] Ruby
- [ ] Python

## Files added

-
- [ ] Python
- [ ] YAML

## Files modified
## Operating System(s)

-

## Files deleted

-
- [ ] Linux
- [ ] Unix
- [ ] Solaris
- [ ] Windows

## What is the current behavior?

<!-- Please describe the current behavior that you are modifying, or link to a relevant issue -->

Issue Number: N/A
-

## What is the new behavior?

<!-- Please describe the behavior or changes that are being added by this PR -->

-

## Files Added

-

## Files Modified

-

## Files Deleted

-

## Other information
<!-- Any other information that is important to this PR such as screenshots of how the component looks before and after the change -->

-

<!-- Any other information that is important to this PR such as screenshots of how the component looks before and after the change -->
## Hardware

- [ ] ARM
- [ ] DEC PDP-8
- [ ] DEC PDP-11
- [ ] DEC VAX
- [ ] DEC VAXStation
- [ ] Intel 8080
- [ ] Intel Core
- [ ] Motorola 68000
- [ ] Raspberry Pi
- [ ] RISC/V
- [ ] Sun SPARCStation
1 change: 0 additions & 1 deletion .github/quarterlyRelease.md

This file was deleted.

12 changes: 12 additions & 0 deletions .github/workflows/GitHubActionPermissions.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
permissions:
actions: read|write|none
checks: read|write|none
contents: read|write|none
deployments: read|write|none
issues: read|write|none
packages: read|write|none
pull-requests: read|write|none
repository-projects: read|write|none
security-events: read|write|none
statuses: read|write|none

10 changes: 5 additions & 5 deletions .github/workflows/ci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,21 +15,21 @@ jobs:
runs-on: "ubuntu-latest"
strategy:
matrix:
jekyll: ["~> 4.3.4"]
jekyll: ["~> 4.3.4", "~>4.4.1"]
env:
JEKYLL_VERSION: ${{ matrix.jekyll }}
steps:
- name: Harden the runner (Audit all outbound calls)
- name: Harden Runner
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
with:
egress-policy: audit

- name: Checkout Repository
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
- name: Set Up Ruby 3.4.7
uses: ruby/setup-ruby@ae195bbe749a7cef685ac729197124a48305c1cb # v1.276.0
uses: ruby/setup-ruby@4c24fa5ec04b2e79eb40571b1cee2a0d2b705771 # v1.278.0
with:
ruby-version: 3.4.7
bundler-cache: true
- name: Run tests
run: script/cibuild
# - name: Run tests
# run: script/cibuild
108 changes: 43 additions & 65 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,92 +9,70 @@
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL Advanced"
name: "CodeQL"

on:
push:
branches: [ "main", "main*" ]
branches: ["main"]
pull_request:
branches: [ "main", "main*" ]
# The branches below must be a subset of the branches above
branches: ["main"]
schedule:
- cron: '43 4 * * 3'
- cron: "0 0 * * 1"

permissions:
contents: read

jobs:
analyze:
name: Analyze (${{ matrix.language }})
# Runner size impacts CodeQL analysis time. To learn more, please see:
# - https://gh.io/recommended-hardware-resources-for-running-codeql
# - https://gh.io/supported-runners-and-hardware-resources
# - https://gh.io/using-larger-runners (GitHub.com only)
# Consider using larger runners or machines with greater resources for possible analysis time improvements.
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
name: Analyze
runs-on: ubuntu-latest
permissions:
# required for all workflows
security-events: write

# required to fetch internal or private CodeQL packs
packages: read

# only required for workflows in private repositories
actions: read
contents: read
security-events: write

strategy:
fail-fast: false
matrix:
include:
- language: ruby
build-mode: none
# CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
# Use `c-cpp` to analyze code written in C, C++ or both
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
language: ["ruby"]
# CodeQL supports [ $supported-codeql-languages ]
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support

steps:
- name: Harden Runner
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
with:
egress-policy: audit
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
with:
egress-policy: audit

- name: Checkout repository
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

- name: Checkout repository
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun

# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality
# If the Autobuild fails above, remove it and uncomment the following three lines.
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.

# If the analyze step fails for one of the languages you are analyzing with
# "We were unable to automatically build your code", modify the matrix above
# to set the build mode to "manual" for that language. Then modify this step
# to build your code.
# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
- if: matrix.build-mode == 'manual'
shell: bash
run: |
echo 'If you are using a "manual" build mode for one or more of the' \
'languages you are analyzing, replace this with the commands to build' \
'your code, for example:'
echo ' make bootstrap'
echo ' make release'
exit 1
# - run: |
# echo "Run, Build Application using script"
# ./location_of_script_within_repo/buildscript.sh

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5
with:
category: "/language:${{matrix.language}}"
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
with:
category: "/language:${{matrix.language}}"
35 changes: 35 additions & 0 deletions .github/workflows/dependabot.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
# Basic `dependabot.yml` file with
# minimum configuration for two package managers

version: 2
updates:
permissions:
contents: write
# Enable version updates for npm
- package-ecosystem: "npm"
# Look for `package.json` and `lock` files in the `root` directory
directory: "/"
# Check the npm registry for updates every day (weekdays)
schedule:
interval: "daily"
commit-message:
prefix: "[info](sec) npm:"

# Enable version updates for Ruby
- package-ecosystem: "bundler"
# Look for `Ruby Gems` in the following directories
directories:
- "/"
# - "_plugins"
# Check for updates once a week
schedule:
interval: "daily"
commit-message:
prefix: "[info](sec) bundler:"

- package-ecosystem: github-actions
directory: /
schedule:
interval: daily
commit-message:
prefix: "[info](sec) gh-actions:"
27 changes: 22 additions & 5 deletions .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,15 +2,26 @@
#
# This Action will scan dependency manifest files that change as part of a Pull Request,
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
# Once installed, if the workflow run is marked as required,
# PRs introducing known-vulnerable packages will be blocked from merging.
# Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable
# packages will be blocked from merging.
#
# Source repository: https://github.com/actions/dependency-review-action
name: 'dependency – Dependency Review'
on: [pull_request]
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
name: 'Dependency review'
on:
pull_request:
branches: [ "main", "main*" ]

# If using a dependency submission action in this workflow this permission will need to be set to:
#
# permissions:
# contents: write
#
# https://docs.github.com/en/enterprise-cloud@latest/code-security/supply-chain-security/understanding-your-software-supply-chain/using-the-dependency-submission-api
permissions:
contents: read
# Write permissions for pull-requests are required for using the `comment-summary-in-pr` option, comment out if you aren't using this option
pull-requests: write

jobs:
dependency-review:
Expand All @@ -21,7 +32,13 @@ jobs:
with:
egress-policy: audit

- name: 'Checkout Repository'
- name: 'Checkout repository'
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
- name: 'Dependency Review'
uses: actions/dependency-review-action@3c4e3dcb1aa7874d2c16be7d79418e9b7efd6261 # v4.8.2
# Commonly enabled options, see https://github.com/actions/dependency-review-action#configuration-options for all available options.
with:
comment-summary-in-pr: always
# fail-on-severity: moderate
# deny-licenses: GPL-1.0-or-later, LGPL-2.0-or-later
# retry-on-snapshot-warnings: true
Loading
Loading