-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
ba3603d
commit f17ca62
Showing
263 changed files
with
1,834 additions
and
1,790 deletions.
There are no files selected for viewing
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -39,22 +39,22 @@ jobs: | |
- name: Run Integration Tests | ||
run: make test-integration | ||
|
||
- name: Run Trivy vulnerability scanner in repo mode | ||
- name: Run Tunnel vulnerability scanner in repo mode | ||
uses: aquasecurity/[email protected] | ||
with: | ||
scan-type: 'fs' | ||
ignore-unfixed: true | ||
format: 'sarif' | ||
output: 'trivy-results.sarif' | ||
output: 'tunnel-results.sarif' | ||
severity: 'CRITICAL' | ||
exit-code: 0 | ||
|
||
- name: Upload Trivy scan results to GitHub Security tab | ||
- name: Upload Tunnel scan results to GitHub Security tab | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: 'trivy-results.sarif' | ||
sarif_file: 'tunnel-results.sarif' | ||
|
||
- name: Run Trivy vulnerability scanner in IaC mode | ||
- name: Run Tunnel vulnerability scanner in IaC mode | ||
uses: aquasecurity/[email protected] | ||
with: | ||
scan-type: 'config' | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
name: Aqua Cloud | ||
name: Khulnasoft Cloud | ||
|
||
on: | ||
push: | ||
|
@@ -14,15 +14,15 @@ jobs: | |
- name: Checkout code | ||
uses: actions/checkout@v3 | ||
|
||
- name: Run Trivy vulnerability scanner against Aqua Cloud | ||
- name: Run Tunnel vulnerability scanner against Khulnasoft Cloud | ||
uses: aquasecurity/[email protected] | ||
with: | ||
scan-type: 'fs' | ||
hide-progress: true | ||
format: 'table' | ||
security-checks: 'vuln,config' | ||
env: | ||
AQUA_KEY: ${{ secrets.AQUA_KEY }} | ||
AQUA_SECRET: ${{ secrets.AQUA_SECRET }} | ||
TRIVY_RUN_AS_PLUGIN: 'aqua' | ||
KHULNASOFT_KEY: ${{ secrets.KHULNASOFT_KEY }} | ||
KHULNASOFT_SECRET: ${{ secrets.KHULNASOFT_SECRET }} | ||
TUNNEL_RUN_AS_PLUGIN: 'khulnasoft' | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -13,8 +13,8 @@ on: | |
workflow_dispatch: # manually it will get the latest tag to publish the helm chart | ||
env: | ||
HELM_REP: helm-charts | ||
GH_OWNER: aquasecurity | ||
CHART_DIR: deploy/helm/postee | ||
GH_OWNER: khulnasoft-lab | ||
CHART_DIR: deploy/helm/hooker | ||
GO_VERSION: "1.18" | ||
KIND_VERSION: "v0.12.0" | ||
KIND_IMAGE: "kindest/node:v1.23.4@sha256:0e34f0d0fd448aa2f2819cfd74e99fe5793a6e4938b328f657c8e3f81ee0dfb9" | ||
|
@@ -75,5 +75,5 @@ jobs: | |
destination_repo: '${{ env.GH_OWNER }}/${{ env.HELM_REP }}' | ||
destination_folder: '.' | ||
destination_branch: 'gh-pages' | ||
user_email: aqua[email protected] | ||
user_name: 'aqua-bot' | ||
user_email: khulnasoft[email protected] | ||
user_name: 'khulnasoft-bot' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,6 +1,6 @@ | ||
--- | ||
# This is a manually triggered workflow to build and publish the MkDocs from the | ||
# specified Git revision to GitHub pages on https://aquasecurity.github.io/postee | ||
# specified Git revision to GitHub pages on https://khulnasoft-lab.github.io/hooker | ||
name: Publish Documentation | ||
|
||
on: | ||
|
@@ -30,14 +30,14 @@ jobs: | |
with: | ||
python-version: 3.x | ||
- run: | | ||
pip install git+https://${GH_TOKEN}@github.com/squidfunk/mkdocs-material-insiders.git | ||
pip install git+https://${GH_TOKEN}@github.com/squidfunk/mkdocs-material.git | ||
pip install mike | ||
pip install mkdocs-macros-plugin | ||
env: | ||
# Note: It is not the same as ${{ secrets.GITHUB_TOKEN }} ! | ||
GH_TOKEN: ${{ secrets.MKDOCS_AQUA_BOT }} | ||
GH_TOKEN: ${{ secrets.MKDOCS_KHULNASOFT_BOT }} | ||
- run: | | ||
git config user.name "aqua-bot" | ||
git config user.email "aqua[email protected]" | ||
git config user.name "khulnasoft-bot" | ||
git config user.email "khulnasoft[email protected]" | ||
- run: | | ||
mike deploy --push --update-aliases ${{ github.event.inputs.ref }} latest |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -31,7 +31,7 @@ jobs: | |
- name: Run Integration Tests | ||
run: make test-integration | ||
|
||
- name: Run Trivy vulnerability scanner in repo mode | ||
- name: Run Tunnel vulnerability scanner in repo mode | ||
uses: aquasecurity/[email protected] | ||
with: | ||
scan-type: 'fs' | ||
|
@@ -40,17 +40,17 @@ jobs: | |
severity: 'CRITICAL' | ||
exit-code: 0 | ||
|
||
- name: Run Trivy vulnerability scanner against Aqua Cloud | ||
- name: Run Tunnel vulnerability scanner against Khulnasoft Cloud | ||
uses: aquasecurity/[email protected] | ||
with: | ||
scan-type: 'fs' | ||
hide-progress: true | ||
format: 'table' | ||
security-checks: 'vuln,config' | ||
env: | ||
AQUA_KEY: ${{ secrets.AQUA_KEY }} | ||
AQUA_SECRET: ${{ secrets.AQUA_SECRET }} | ||
TRIVY_RUN_AS_PLUGIN: 'aqua' | ||
KHULNASOFT_KEY: ${{ secrets.KHULNASOFT_KEY }} | ||
KHULNASOFT_SECRET: ${{ secrets.KHULNASOFT_SECRET }} | ||
TUNNEL_RUN_AS_PLUGIN: 'khulnasoft' | ||
|
||
release: | ||
name: Release | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,13 +0,0 @@ | ||
.idea/ | ||
bin/ | ||
pkg/ | ||
src/github.com/ | ||
src/gopkg.in/ | ||
src/go.etcd.io/ | ||
**/*.out | ||
**/*.db | ||
coverage.txt | ||
dist/ | ||
.vscode/ | ||
|
||
|
||
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.