Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add osv-scanner to ignore false positives thrown by OpenSSF Scorecard #56100

Merged
merged 12 commits into from
Feb 8, 2024

Conversation

gregorywaynepower
Copy link
Contributor

@gregorywaynepower gregorywaynepower commented Jan 31, 2024

Hello @elpaso @haubourg @DelazJ ,

This is a simplification of pull request #55748 and does not include the addition of the Open Source Security Foundation's Github Action. I think adding that action would be a separate pull request.

TLDR:

  • Add your OpenSSF Scorecard to the README
  • OpenSSF Best Practices Badge to the README
  • add the osv-scanner.toml file to remove the Vulnerability positives from the OpenSSF scorecard CLI Tool

@github-actions github-actions bot added this to the 3.36.0 milestone Jan 31, 2024
Copy link
Member

@m-kuhn m-kuhn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for opening this followup which is arguably less intrusive.

It looks to me as if this potentially opens up a box of things to consider and invest into. I am not familiar with the OpenSSF Scorecard and therefore currently cannot comment on if this is desirable. If it is, it also opens the question about who does this, I see you already started @gregorywaynepower (thanks!) can we expect continued involvement?

What would be the next steps?

README.md Show resolved Hide resolved
@nyalldawson
Copy link
Collaborator

@gregorywaynepower is this good to go now? Can you the merge conflicts?

@gregorywaynepower
Copy link
Contributor Author

@nyalldawson I'll handle the merge conflicts and do another pass on the OpenSSF Best Practices badge so the score isn't sitting at 22%.

@gregorywaynepower
Copy link
Contributor Author

@nyalldawson Merge conflicts managed, you should be good to go.

@DelazJ
Copy link
Contributor

DelazJ commented Feb 8, 2024

@gregorywaynepower Thanks for the updates (we now have 22% to cover instead of being at 22% 😃). About https://www.bestpractices.dev/fr/projects/1581, afaict all the official pages we handle are https (website, downloads, user manuals, APIs, plugins, github...) so there is a missing checkbox in the General group. And the URL of the website should be https.

@nyalldawson nyalldawson merged commit 19a00a8 into qgis:master Feb 8, 2024
28 checks passed
@m-kuhn
Copy link
Member

m-kuhn commented Feb 8, 2024

Thanks!
Any idea why the "branch protection" doesn't show up (we should have a good score here I guess)

image

@gregorywaynepower
Copy link
Contributor Author

gregorywaynepower commented Feb 8, 2024

I just ran the the OpenSSF's CLI Tool against master at 472ce88 and your score should be an 8/10 for Branch-Protection.

Here's the new summary report and your aggregate score is 8.1/10: ScoreCardCLI_Report.txt

Along with the specifics for how you have the 8/10 score: ScoreCardCLI_Report_Branch_Protection.txt

Here's the settings they expect if you want to get a 10/10 for Branch-Protection.

I'd expect this to be more up-to-date when y'all add the OpenSSF's Scorecard GitHub action, but that'll be a separate and more involved pull-request.

@gregorywaynepower
Copy link
Contributor Author

gregorywaynepower commented Feb 9, 2024

@gregorywaynepower Thanks for the updates (we now have 22% to cover instead of being at 22% 😃). About https://www.bestpractices.dev/fr/projects/1581, afaict all the official pages we handle are https (website, downloads, user manuals, APIs, plugins, github...) so there is a missing checkbox in the General group. And the URL of the website should be https.

Woops, I didn't realize that the third question under Basics had an http link. I've fixed that and we're at 79%!

@gregorywaynepower
Copy link
Contributor Author

gregorywaynepower commented Jul 19, 2024

Thanks! Any idea why the "branch protection" doesn't show up (we should have a good score here I guess)

image

Sorry for taking so long on this @m-kuhn!

It looks like it may be an issue with permissions associated with the Github Action.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants