Giter Site home page Giter Site logo

mam-dev / security-constraints Goto Github PK

View Code? Open in Web Editor NEW
12.0 4.0 1.0 112 KB

Fetches security vulnerabilities and creates pip-constraints based on them.

License: Apache License 2.0

Python 98.78% Shell 1.22%
python security dependencies pip supply-chain-security

security-constraints's People

Contributors

bunny-therapist avatar whardier avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar

Forkers

whardier

security-constraints's Issues

Try ruff instead of flake8

Consider using ruff instead of flake8. Try it out, read a bit, compare, see if the project should switch.

Add links to github

The PyPi page does not link to github. This probably requires changes to pyproject.toml (or possibly the readme).

Update readme after bug fix

The readme still shows constraints with min and max version in the output. This is not consistent with behavior after the 1.0.1 bug fix.

Review CI

sed: can't read 3.9: No such file or directory
The "sed" part may not even be needed.

There are probably new versions of the actions used.

Support multiple config files

Allow passing multiple config files. The config then gets merged, the same way it is merged with the args.

Since Configuration.merge already support merging multiple configs, this should be quite easy to implement.

Usecase: A group may want one config file for all their projects, plus an optional additional one per project, so that the group can have a list of vulnerabilities they have agreed on ignoring globally but then individual projects can ignore others.

Add system testing

Connects to external source and produces output. Verify some features of that output (obviously, the output will be different as the source database changes). Tokens should be handed securely.

Constraints cannot be met

If a vulnerability affects versions >=2, <3, then security-constraints will generate the contraints <2,>=3. This would be fine if the comma represented an OR, but it actually represents an AND, so it creates a constraint that cannot be met. In this case, security-constraints should just generate ">=3" (higher version is better). If the vulnerability affects versions >=2 only, then it makes sense to have <2. But there should never be incompatible conditions.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.