rails_template_18f 0.7.1 → 0.7.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/Gemfile.lock +1 -1
- data/lib/generators/rails_template18f/github_actions/github_actions_generator.rb +1 -1
- data/lib/rails_template18f/generators/base.rb +1 -1
- data/lib/rails_template18f/generators/pipeline_options.rb +4 -11
- data/lib/rails_template18f/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 9125789bccf3587593670a5046e6a019c8e65265cca40e8a9434f77b1a69cc7a
|
4
|
+
data.tar.gz: 72b8d7345799e1d26eef6506b035e80f1de94ea2679d6272f9ad525dbac5870a
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 60c7961c07e40710113c4608162e3888335b0d86d8270d82b56bf7d16d607454dad73b7f4626fba87804d251358e744d5a307967562537b9d326f90d77a4630e
|
7
|
+
data.tar.gz: 3bd8def94a8f3f576b0f03622e1cf1461e6e79f00d4e3f3e17bd52bad4f91a59e365d3edcbc548be0ceeb6181271446b61a41ea0956832e64ad740c031ade812
|
data/CHANGELOG.md
CHANGED
@@ -1,5 +1,10 @@
|
|
1
1
|
## [Unreleased]
|
2
2
|
|
3
|
+
## [0.7.2] - 2022-07-07
|
4
|
+
|
5
|
+
- update default node version in github actions to 16.15
|
6
|
+
- update OSCAL message format to include the app_name as an OSCAL component once assembled
|
7
|
+
|
3
8
|
## [0.7.1] - 2022-07-05
|
4
9
|
|
5
10
|
- fix issue with initial git commit when no OSCAL docs were updated during initial app creation
|
data/Gemfile.lock
CHANGED
@@ -94,18 +94,11 @@ module RailsTemplate18f
|
|
94
94
|
insert_into_oscal "sa-11.md", <<~EOS, after: "## Implementation a.\n"
|
95
95
|
The CI/CD pipeline utilizes multiple tools to perform static code analysis for security and privacy:
|
96
96
|
|
97
|
-
|
98
|
-
Brakeman is a static code scanner designed to find security issues in Ruby on Rails code. It can flag potential SQL injection,
|
97
|
+
* **Brakeman** is a static code scanner designed to find security issues in Ruby on Rails code. It can flag potential SQL injection,
|
99
98
|
Command Injection, open redirects, and other common vulnerabilities.
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
### Yarn Audit
|
105
|
-
yarn audit checks Javascript dependencies against a database of known CVE numbers.
|
106
|
-
|
107
|
-
### OWASP ZAP
|
108
|
-
OWASP ZAP is a dynamic security scanner that can simulate actual attacks on a running server.
|
99
|
+
* **bundle-audit** checks Ruby dependencies against a database of known CVE numbers.
|
100
|
+
* **yarn audit** checks Javascript dependencies against a database of known CVE numbers.
|
101
|
+
* **OWASP ZAP** is a dynamic security scanner that can simulate actual attacks on a running server.
|
109
102
|
|
110
103
|
An additional RAILS_ENV has been created called ci. It inherits from production to ensure that the system being tested is as close as possible to production while allowing for overrides such as bypassing authentication in a secure way.
|
111
104
|
EOS
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: rails_template_18f
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.7.
|
4
|
+
version: 0.7.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Ryan Ahearn
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-07-
|
11
|
+
date: 2022-07-07 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: railties
|