Skip to content

Commit 97453e9

Browse files
Merge pull request #158 from regulaforensics/stable
Release
2 parents 7733f79 + 75b13ab commit 97453e9

23 files changed

+1353
-1310
lines changed

.github/workflows/run-smoke-test.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ on:
44
pull_request:
55
branches:
66
- master
7+
- develop
8+
- stable
79

810
jobs:
911
run_smoke_test:

.github/workflows/sast.yaml

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
name: Semgrep SAST
2+
3+
on:
4+
pull_request:
5+
branches:
6+
- develop
7+
- staging
8+
- production
9+
- stable
10+
- main
11+
- master
12+
13+
env:
14+
# Fail workflow or not if vulnerabilities found
15+
FAIL_ON_VULNERABILITIES: true
16+
# List of paths (space separated) to ignore
17+
# Supports PATTERNS
18+
# EXCLUDE_PATHS: 'foo bar/baz file.txt dir/*.yml'
19+
EXCLUDE_PATHS: 'examples'
20+
# List of rules (space separated) to ignore
21+
# EXCLUDE_RULES: 'generic.secrets.security.detected-aws-account-id.detected-aws-account-id'
22+
# See https://github.com/semgrep/semgrep-rules for rules registry
23+
EXCLUDE_RULES: ''
24+
25+
jobs:
26+
semgrep:
27+
name: semgrep-oss/scan
28+
runs-on: ubuntu-latest
29+
container:
30+
image: semgrep/semgrep
31+
steps:
32+
- uses: actions/checkout@v4
33+
- name: Scan
34+
shell: bash
35+
run: |
36+
EXCLUDED_PATHS=()
37+
if [[ ! -z $EXCLUDE_PATHS ]]; then
38+
for path in $EXCLUDE_PATHS; do
39+
EXCLUDED_PATHS+=("--exclude $path")
40+
done
41+
fi
42+
43+
EXCLUDED_RULES=()
44+
if [[ ! -z $EXCLUDE_RULES ]]; then
45+
for rule in $EXCLUDE_RULES; do
46+
EXCLUDED_RULES+=("--exclude-rule $rule")
47+
done
48+
fi
49+
50+
if [[ $FAIL_ON_VULNERABILITIES == "true" ]]; then
51+
semgrep scan --config auto ${EXCLUDED_PATHS[@]} ${EXCLUDED_RULES[@]} --error --verbose
52+
elif [[ $FAIL_ON_VULNERABILITIES == "false" ]]; then
53+
semgrep scan --config auto ${EXCLUDED_PATHS[@]} ${EXCLUDED_RULES[@]} --error --verbose || true
54+
else
55+
echo "Bad FAIL_ON_VULNERABILITIES env var value"
56+
exit 1
57+
fi
58+

.github/workflows/trivy-scan.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ on:
66
- main
77
- master
88
- develop
9+
- stable
910

1011
jobs:
1112
trivy-scan:

examples/auth/client/package-lock.json

Lines changed: 19 additions & 19 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

examples/auth/client/package.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
"type": "module",
44
"dependencies": {
55
"@regulaforensics/document-reader-webclient": "file:../../..",
6-
"axios": "^1.6.8",
7-
"qs": "^6.12.0"
6+
"axios": "^1.7.4",
7+
"qs": "^6.13.0"
88
},
99
"version": "0.0.0"
1010
}

examples/auth/server/package-lock.json

Lines changed: 16 additions & 16 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

examples/auth/server/package.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@
99
"start": "node index.js"
1010
},
1111
"dependencies": {
12-
"axios": "^1.6.8",
12+
"axios": "^1.7.4",
1313
"body-parser": "^1.20.2",
1414
"cors": "^2.8.5",
1515
"express": "^4.19.2",
1616
"helmet": "^7.1.0",
1717
"jsonwebtoken": "^9.0.2",
18-
"jwk-to-pem": "^2.0.5",
18+
"jwk-to-pem": "^2.0.6",
1919
"morgan": "^1.10.0",
20-
"ramda": "^0.29.1"
20+
"ramda": "^0.30.1"
2121
}
2222
}

0 commit comments

Comments
 (0)