israeli-banks-actual-budget-importer 1.0.0-beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,15 @@
1
+ # To get started with Dependabot version updates, you'll need to specify which
2
+ # package ecosystems to update and where the package manifests are located.
3
+ # Please see the documentation for all configuration options:
4
+ # https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
5
+
6
+ version: 2
7
+ updates:
8
+ - package-ecosystem: "npm" # See documentation for possible values
9
+ directory: "/" # Location of package manifests
10
+ schedule:
11
+ interval: "weekly"
12
+ - package-ecosystem: "docker" # See documentation for possible values
13
+ directory: "/" # Location of package manifests
14
+ schedule:
15
+ interval: "weekly"
@@ -0,0 +1,26 @@
1
+ name: Codecov
2
+ on:
3
+ push:
4
+ branches:
5
+ - main # or master, or whichever branch you want this to run on
6
+ merge_group:
7
+ branches:
8
+ - main
9
+ pull_request:
10
+
11
+ jobs:
12
+ release:
13
+ runs-on: ubuntu-latest
14
+ permissions:
15
+ contents: write # to be able to publish a GitHub release
16
+ issues: write # to be able to comment on released issues
17
+ pull-requests: write # to be able to comment on released pull requests
18
+ id-token: write # to enable use of OIDC for npm provenance
19
+
20
+ steps:
21
+ - name: Checkout
22
+ uses: actions/checkout@v4
23
+ - name: Upload coverage reports to Codecov
24
+ uses: codecov/codecov-action@v5
25
+ env:
26
+ CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}
@@ -0,0 +1,82 @@
1
+ # For most projects, this workflow file will not need changing; you simply need
2
+ # to commit it to your repository.
3
+ #
4
+ # You may wish to alter this file to override the set of languages analyzed,
5
+ # or to provide custom queries or build logic.
6
+ #
7
+ # ******** NOTE ********
8
+ # We have attempted to detect the languages in your repository. Please check
9
+ # the `language` matrix defined below to confirm you have the correct set of
10
+ # supported CodeQL languages.
11
+ #
12
+ name: "CodeQL"
13
+
14
+ on:
15
+ push:
16
+ branches: [ "main" ]
17
+ pull_request:
18
+ # The branches below must be a subset of the branches above
19
+ branches: [ "main" ]
20
+ schedule:
21
+ - cron: '43 18 * * 5'
22
+
23
+ jobs:
24
+ analyze:
25
+ name: Analyze
26
+ # Runner size impacts CodeQL analysis time. To learn more, please see:
27
+ # - https://gh.io/recommended-hardware-resources-for-running-codeql
28
+ # - https://gh.io/supported-runners-and-hardware-resources
29
+ # - https://gh.io/using-larger-runners
30
+ # Consider using larger runners for possible analysis time improvements.
31
+ runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
32
+ timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
33
+ permissions:
34
+ actions: read
35
+ contents: read
36
+ security-events: write
37
+
38
+ strategy:
39
+ fail-fast: false
40
+ matrix:
41
+ language: [ 'javascript' ]
42
+ # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby', 'swift' ]
43
+ # Use only 'java' to analyze code written in Java, Kotlin or both
44
+ # Use only 'javascript' to analyze code written in JavaScript, TypeScript or both
45
+ # Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
46
+
47
+ steps:
48
+ - name: Checkout repository
49
+ uses: actions/checkout@v4
50
+
51
+ # Initializes the CodeQL tools for scanning.
52
+ - name: Initialize CodeQL
53
+ uses: github/codeql-action/init@v3
54
+ with:
55
+ languages: ${{ matrix.language }}
56
+ # If you wish to specify custom queries, you can do so here or in a config file.
57
+ # By default, queries listed here will override any specified in a config file.
58
+ # Prefix the list here with "+" to use these queries and those in the config file.
59
+
60
+ # For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
61
+ # queries: security-extended,security-and-quality
62
+
63
+
64
+ # Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
65
+ # If this step fails, then you should remove it and run the build manually (see below)
66
+ - name: Autobuild
67
+ uses: github/codeql-action/autobuild@v3
68
+
69
+ # ℹ️ Command-line programs to run using the OS shell.
70
+ # 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
71
+
72
+ # If the Autobuild fails above, remove it and uncomment the following three lines.
73
+ # modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
74
+
75
+ # - run: |
76
+ # echo "Run, Build Application using script"
77
+ # ./location_of_script_within_repo/buildscript.sh
78
+
79
+ - name: Perform CodeQL Analysis
80
+ uses: github/codeql-action/analyze@v3
81
+ with:
82
+ category: "/language:${{matrix.language}}"
@@ -0,0 +1,20 @@
1
+ # Dependency Review Action
2
+ #
3
+ # This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable packages will be blocked from merging.
4
+ #
5
+ # Source repository: https://github.com/actions/dependency-review-action
6
+ # Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
7
+ name: 'Dependency Review'
8
+ on: [pull_request]
9
+
10
+ permissions:
11
+ contents: read
12
+
13
+ jobs:
14
+ dependency-review:
15
+ runs-on: ubuntu-latest
16
+ steps:
17
+ - name: 'Checkout Repository'
18
+ uses: actions/checkout@v4
19
+ - name: 'Dependency Review'
20
+ uses: actions/dependency-review-action@v4
@@ -0,0 +1,39 @@
1
+ name: Semantic Versioning
2
+
3
+ on:
4
+ push:
5
+ branches:
6
+ - main
7
+ - develop
8
+
9
+ jobs:
10
+ release:
11
+ runs-on: ubuntu-latest
12
+ permissions:
13
+ contents: write # to be able to publish a GitHub release
14
+ issues: write # to be able to comment on released issues
15
+ pull-requests: write # to be able to comment on released pull requests
16
+ id-token: write # to enable use of OIDC for npm provenance
17
+
18
+ steps:
19
+ - name: Checkout
20
+ uses: actions/checkout@v4
21
+
22
+ - name: Setup Bun
23
+ uses: oven-sh/setup-bun@v2
24
+
25
+ - name: Install Dependencies
26
+ run: bun i --dev
27
+
28
+ # Authenticate with ghcr.io
29
+ - name: Authenticate with ghcr.io
30
+ run: echo "${{ secrets.GH_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin
31
+
32
+ - name: Semantic Release
33
+ run: bunx semantic-release
34
+ env:
35
+ NPM_TOKEN: ${{ secrets.NPM_TOKEN }}
36
+ GH_TOKEN: ${{ secrets.GH_TOKEN }}
37
+ GH_REPO: ${{ github.server_url }}/${{ github.repository }}
38
+ DOCKER_REGISTRY_USER: ${{ secrets.DOCKER_REGISTRY_USER }}
39
+ DOCKER_REGISTRY_PASSWORD: ${{ secrets.DOCKER_REGISTRY_PASSWORD }}
@@ -0,0 +1,72 @@
1
+ # This workflow uses actions that are not certified by GitHub. They are provided
2
+ # by a third-party and are governed by separate terms of service, privacy
3
+ # policy, and support documentation.
4
+
5
+ name: Scorecard supply-chain security
6
+ on:
7
+ # For Branch-Protection check. Only the default branch is supported. See
8
+ # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9
+ branch_protection_rule:
10
+ # To guarantee Maintained check is occasionally updated. See
11
+ # https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
12
+ schedule:
13
+ - cron: '15 2 * * 1'
14
+ push:
15
+ branches: [ "main" ]
16
+
17
+ # Declare default permissions as read only.
18
+ permissions: read-all
19
+
20
+ jobs:
21
+ analysis:
22
+ name: Scorecard analysis
23
+ runs-on: ubuntu-latest
24
+ permissions:
25
+ # Needed to upload the results to code-scanning dashboard.
26
+ security-events: write
27
+ # Needed to publish results and get a badge (see publish_results below).
28
+ id-token: write
29
+ # Uncomment the permissions below if installing in a private repository.
30
+ # contents: read
31
+ # actions: read
32
+
33
+ steps:
34
+ - name: "Checkout code"
35
+ uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
36
+ with:
37
+ persist-credentials: false
38
+
39
+ - name: "Run analysis"
40
+ uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1
41
+ with:
42
+ results_file: results.sarif
43
+ results_format: sarif
44
+ # (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
45
+ # - you want to enable the Branch-Protection check on a *public* repository, or
46
+ # - you are installing Scorecard on a *private* repository
47
+ # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
48
+ # repo_token: ${{ secrets.SCORECARD_TOKEN }}
49
+
50
+ # Public repositories:
51
+ # - Publish results to OpenSSF REST API for easy access by consumers
52
+ # - Allows the repository to include the Scorecard badge.
53
+ # - See https://github.com/ossf/scorecard-action#publishing-results.
54
+ # For private repositories:
55
+ # - `publish_results` will always be set to `false`, regardless
56
+ # of the value entered here.
57
+ publish_results: true
58
+
59
+ # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
60
+ # format to the repository Actions tab.
61
+ - name: "Upload artifact"
62
+ uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
63
+ with:
64
+ name: SARIF file
65
+ path: results.sarif
66
+ retention-days: 5
67
+
68
+ # Upload the results to GitHub's code scanning dashboard.
69
+ - name: "Upload to code-scanning"
70
+ uses: github/codeql-action/upload-sarif@1b549b9259bda1cb5ddde3b41741a82a2d15a841 # v3.28.13
71
+ with:
72
+ sarif_file: results.sarif
@@ -0,0 +1,67 @@
1
+ # In order to use the Snyk Action you will need to have a Snyk API token.
2
+ # More details in https://github.com/snyk/actions#getting-your-snyk-token
3
+ # or you can signup for free at https://snyk.io/login
4
+
5
+ name: Snyk Security
6
+
7
+ on:
8
+ push:
9
+ branches: ["main" ]
10
+ pull_request:
11
+ branches: ["main"]
12
+
13
+ permissions:
14
+ contents: read
15
+
16
+ jobs:
17
+ snyk:
18
+ permissions:
19
+ contents: read # for actions/checkout to fetch code
20
+ security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
21
+ actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
22
+ runs-on: ubuntu-latest
23
+ steps:
24
+ - uses: actions/checkout@v4
25
+
26
+ - uses: actions/setup-node@v4
27
+ with:
28
+ node-version: 20
29
+
30
+ - name: Setup Bun
31
+ uses: oven-sh/setup-bun@v2
32
+
33
+ - name: Install Dependencies
34
+ run: bun i --dev
35
+
36
+ - name: Set up Snyk CLI to check for security issues
37
+ uses: snyk/actions/setup@cdb760004ba9ea4d525f2e043745dfe85bb9077e
38
+ env:
39
+ SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
40
+
41
+ - name: Snyk version
42
+ run: echo "${{ steps.snyk.outputs.version }}"
43
+
44
+ - name: Snyk Test
45
+ run: snyk test
46
+ env:
47
+ SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
48
+
49
+ - name: Build a Docker image
50
+ run: docker build -t your/image-to-test .
51
+ - name: Run Snyk to check Docker image for vulnerabilities
52
+ # Snyk can be used to break the build when it detects vulnerabilities.
53
+ # In this case we want to upload the issues to GitHub Code Scanning
54
+ continue-on-error: true
55
+ uses: snyk/actions/docker@master
56
+ env:
57
+ # In order to use the Snyk Action you will need to have a Snyk API token.
58
+ # More details in https://github.com/snyk/actions#getting-your-snyk-token
59
+ # or you can signup for free at https://snyk.io/login
60
+ SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
61
+ with:
62
+ image: your/image-to-test
63
+ args: --file=Dockerfile
64
+ - name: Upload result to GitHub Code Scanning
65
+ uses: github/codeql-action/upload-sarif@v3
66
+ with:
67
+ sarif_file: snyk.sarif
package/.releaserc ADDED
@@ -0,0 +1,47 @@
1
+ {
2
+ "branches": [
3
+ "main",
4
+ {
5
+ "name": "develop",
6
+ "prerelease": "beta",
7
+ "channel": "beta"
8
+ }
9
+ ],
10
+ "plugins": [
11
+ "@semantic-release/commit-analyzer",
12
+ "@semantic-release/release-notes-generator",
13
+ "@semantic-release/npm",
14
+ "@semantic-release/changelog",
15
+ "@semantic-release/git",
16
+ "@semantic-release/github",
17
+ [
18
+ "@codedependant/semantic-release-docker",
19
+ {
20
+ "dockerTags": [
21
+ "latest",
22
+ "{{version}}",
23
+ "{{major}}",
24
+ "{{major}}.{{minor}}"
25
+ ],
26
+ "dockerLogin": false,
27
+ "dockerRegistry": "ghcr.io",
28
+ "dockerProject": "tomerh2001",
29
+ "dockerArgs": {
30
+ "GH_REPO": "{{env.GH_REPO}}"
31
+ }
32
+ }
33
+ ],
34
+ [
35
+ "@codedependant/semantic-release-docker",
36
+ {
37
+ "dockerTags": [
38
+ "latest",
39
+ "{{version}}",
40
+ "{{major}}",
41
+ "{{major}}.{{minor}}"
42
+ ],
43
+ "dockerProject": "tomerh2001"
44
+ }
45
+ ]
46
+ ]
47
+ }
@@ -0,0 +1 @@
1
+ {}