Skip to content

Commit bfe733c

Browse files
authored
Merge branch 'main' into copilot/fix-4
2 parents 2da693e + b6a918a commit bfe733c

20 files changed

+775
-26
lines changed

.github/Debot.yml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# To get started with Dependabot version updates, you'll need to specify which
2+
# package ecosystems to update and where the package manifests are located.
3+
# Please see the documentation for all configuration options:
4+
# https://docs.github.com/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file
5+
6+
version: 2
7+
updates:
8+
- package-ecosystem: "" # See documentation for possible values
9+
directory: "/" # Location of package manifests
10+
schedule:
11+
interval: "weekly"

.github/dependably.yml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# To get started with Dependabot version updates, you'll need to specify which
2+
# package ecosystems to update and where the package manifests are located.
3+
# Please see the documentation for all configuration options:
4+
# https://docs.github.com/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file
5+
6+
version: 2
7+
updates:
8+
- package-ecosystem: "" # See documentation for possible values
9+
directory: "/" # Location of package manifests
10+
schedule:
11+
interval: "weekly"

.github/workflows/apisec-scan.yml

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
2+
steps:
3+
- name: APIsec scan
4+
uses: apisec-inc/apisec-run-scan@025432089674a28ba8fb55f8ab06c10215e772ea
5+
with:
6+
# The APIsec username with which the scans will be executed
7+
apisec-username: ${{ secrets.apisec_username }}
8+
# The Password of the APIsec user with which the scans will be executed
9+
apisec-password: ${{ secrets.apisec_password}}
10+
# The name of the project for security scan
11+
apisec-project: "VAmPI"
12+
# The name of the sarif format result file The file is written only if this property is provided.
13+
sarif-result-file: "apisec-results.sarif"
14+
- name: Import results
15+
uses: github/codeql-action/upload-sarif@v3
16+
with:
17+
sarif_file: ./apisec-results.sarif

.github/workflows/auto-assign.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: CI/CD Pipeline
2+
3+
on:
4+
pull_request:
5+
types: [opened, reopened, synchronize]
6+
7+
jobs:
8+
auto-assign:
9+
runs-on: ubuntu-latest
10+
steps:
11+
- name: Checkout code
12+
uses: actions/checkout@v2
13+
14+
- name: Set up Node.js
15+
uses: actions/setup-node@v2
16+
with:
17+
node-version: '14'
18+
19+
- name: Install dependencies
20+
run: npm install --legacy-peer-deps
21+
22+
- name: Auto assign reviewers
23+
uses: kentaro-m/auto-assign-action@v1
24+
with:
25+
reviewers: 'your-reviewer-username'

.github/workflows/ci-cd.yml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
name: CI/CD
2+
3+
on:
4+
push:
5+
branches:
6+
- main
7+
8+
jobs:
9+
build:
10+
runs-on: ubuntu-latest
11+
12+
steps:
13+
- uses: actions/checkout@v4
14+
15+
- name: Set up Node.js
16+
uses: actions/setup-node@v4
17+
with:
18+
node-version: '18'
19+
20+
- name: Install dependencies
21+
run: npm ci
22+
23+
- name: Run tests
24+
run: npm test
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
name: "CodeQL Multi-Language Analysis"
2+
3+
on:
4+
push:
5+
branches: [ main ]
6+
pull_request:
7+
branches: [ main ]
8+
workflow_dispatch:
9+
10+
jobs:
11+
codeql:
12+
name: CodeQL Analysis for Java and Python
13+
runs-on: ubuntu-latest
14+
15+
permissions:
16+
actions: read
17+
contents: read
18+
security-events: write
19+
20+
steps:
21+
- name: Checkout code
22+
uses: actions/checkout@v4
23+
24+
- name: Set up JDK 17
25+
uses: actions/setup-java@v4
26+
with:
27+
distribution: 'temurin'
28+
java-version: '17'
29+
30+
- name: Set up Python 3.x
31+
uses: actions/setup-python@v5
32+
with:
33+
python-version: '3.x'
34+
35+
- name: Initialize CodeQL
36+
uses: github/codeql-action/init@v3
37+
with:
38+
languages: java, python
39+
40+
- name: Build using myBuildScript
41+
run: ./myBuildScript
42+
43+
- name: Create CodeQL databases
44+
run: |
45+
codeql database create codeql-dbs --source-root=src \
46+
--db-cluster --language=java,python --command=./myBuildScript
47+
48+
- name: Analyze Java database
49+
run: |
50+
codeql database analyze codeql-dbs/java java-code-scanning.qls \
51+
--format=sarif-latest --sarif-category=java --output=java-results.sarif
52+
53+
- name: Analyze Python database
54+
run: |
55+
codeql database analyze codeql-dbs/python python-code-scanning.qls \
56+
--format=sarif-latest --sarif-category=python --output=python-results.sarif
57+
58+
- name: Upload Java SARIF results
59+
uses: github/codeql-action/upload-sarif@v3
60+
with:
61+
sarif_file: java-results.sarif
62+
63+
- name: Upload Python SARIF results
64+
uses: github/codeql-action/upload-sarif@v3
65+
with:
66+
sarif_file: python-results.sarif
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable
6+
# packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
10+
name: 'Dependency review'
11+
on:
12+
pull_request:
13+
branches: [ "main" ]
14+
15+
# If using a dependency submission action in this workflow this permission will need to be set to:
16+
#
17+
# permissions:
18+
# contents: write
19+
#
20+
# https://docs.github.com/en/enterprise-cloud@latest/code-security/supply-chain-security/understanding-your-software-supply-chain/using-the-dependency-submission-api
21+
permissions:
22+
contents: read
23+
# Write permissions for pull-requests are required for using the `comment-summary-in-pr` option, comment out if you aren't using this option
24+
pull-requests: write
25+
26+
jobs:
27+
dependency-review:
28+
runs-on: ubuntu-latest
29+
steps:
30+
- name: 'Checkout repository'
31+
uses: actions/checkout@v4
32+
- name: 'Dependency Review'
33+
uses: actions/dependency-review-action@v4
34+
# Commonly enabled options, see https://github.com/actions/dependency-review-action#configuration-options for all available options.
35+
with:
36+
comment-summary-in-pr: always
37+
# fail-on-severity: moderate
38+
# deny-licenses: GPL-1.0-or-later, LGPL-2.0-or-later
39+
# retry-on-snapshot-warnings: true

Actions

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
- name: Setup Node.js environment
2+
uses: actions/setup-node@v4.4.0

Apisec.prompt.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
messages:
2+
- role: system
3+
content: |
4+
Add APIsec scan workflow for security testing #1
5+
- role: user
6+
content: |
7+
Add APIsec scan workflow for security testing #1
8+
model: openai/gpt-4o

Seqcoin.prompt.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
messages:
2+
- role: system
3+
content: You are gold
4+
- role: user
5+
content: I need you to fix all my errors in my repositories
6+
model: mistral-ai/codestral-2501

0 commit comments

Comments
 (0)