-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Address errors raised by OpenSSF's Scorecard #55748
Conversation
About the NPM issues, they are all false positives related to the use of javascript as a backend language, we are using javascript to build a frontend web application based on vue js. |
... forgot to mention that the JS application is not built nor shipped anymore, see: #55462 if not action is taken by the package maintainers I will probably remove the landing page functionality altogether. |
I appreciate the context! This doesn't relate to QGIS-Server, right? Is this related to just the Catalog feature? Apologies, I'm not terribly familiar with this side of the project. |
The server landing page is part of the OGC API new specifications, so yes, it belongs to QGIS server. See http://opengeospatial.github.io/e-learning/ogcapi-features/text/operations.html#landing-page Thanks a lot for your PR , it will be excellent to have scanner results in PR's artifacts. |
@elpaso So were you planning on axing QGIS Server in its entirety or just the Catalog feature? @haubourg I appreciate you all being open towards the PR, usually folks bristle at the thought of dealing with security patches and the added work it entails. We do have a two options available for implementing the Scorecard.
|
I've added the OpenSSF Best Practices Badge as well. @NathanW2 By the looks of it I have reason to believe that this repo would get a much higher score than what the audit 2018 and I'd be more than willing to do the audit if you give me the ability to update your prior audit. |
@elpaso All right, feel free to review the reasons listed under my most recent commit. Feel free provide additional context as to why these are being ignored if my paraphrasing of your statement and reference to this PR isn't enough. You score 10/10 for the Vulnerabilities check because of these changes, along with adding the OpenSSF Scorecard and the OpenSSF Best Practices badge has been added to the README.md. |
Just the catalog. |
c9a1637
to
976ffd5
Compare
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
This has been reverted in 4967b29. |
I've held off from adding the following recommendations from StepSecurity for this repo for the time being:
I can understand if adding OpenSSF's GitHub Action may be a bit of a large ask. I can break the following out into a separate pull request if you all are concerned about additional labor for maintainers:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@gregorywaynepower Hello, sorry for the lag.
I would focus the PR on the OSSF activation part, ie. readme, actions and artifacts creation.
Fixing dependency and docker versions should probably be tackled in a subsequent approach where will probably discuss a lot about maintenance, real exposure etc.. I'd be happy to have other dev's opinion here
@haubourg I can understand the lag--there is a lot going on in this pull request. I have no problem with having the addition of OpenSSF's GitHub Action and making decisions on what recommendations to implement as a separate pull request so you aren't inundated with notifications from OpenSSF's GitHub Action. For context, all those "StepSecurity" commits are what the OpenSSF GitHub Action will pester you about adding. |
The QGIS project highly values your contribution and would love to see this work merged! Unfortunately this PR has not had any activity in the last 14 days and is being automatically marked as "stale". If you think this pull request should be merged, please check
|
a912b82
to
310b917
Compare
Hello Folks, I'm closing this pull request since we should address the addition of the Open Source Security Foundation's Scorecard GitHub Action incrementally. Thank you all for your input so far in this process. |
Description
Endeavoring to make this repository score better on the OpenSSF's Scorecard metrics and make security less of a pain. The reason I'm submitting is due to the results I got from the OpenSSF's Scorecard CLI Tool--the writeup is attached to #55733. I can see what I can do to test and update these dependencies. From the conversation I've had with maintainers so far that some of these are centered around the qgis server landing page.
If the above are false positives, I can go ahead with making a osv-scanner.toml as listed so y'all aren't peppered with never-ending alerts if these issues have been addressed. If y'all want more information on OSV-Scanner, which is what is used under the hood you can look to the Google's Website for OSV-Scanner or GitHub Repo.