Skip to content

Commit 502b8cd

Browse files
committed
🔧 update lint configuration, clean up package.json, fix minor issues
Signed-off-by: ctcpip <[email protected]>
1 parent 734aace commit 502b8cd

File tree

9 files changed

+45
-602
lines changed

9 files changed

+45
-602
lines changed

.github/workflows/linter.yml

Lines changed: 17 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,53 +1,27 @@
1-
---
2-
#################################
3-
#################################
4-
## Super Linter GitHub Actions ##
5-
#################################
6-
#################################
7-
name: Lint Code Base
1+
name: 'Lint Markdown'
82

9-
#############################
10-
# Start the job on all push #
11-
#############################
123
on:
134
push:
14-
branches: [main]
155
pull_request:
16-
branches: [main]
6+
workflow_dispatch:
7+
8+
permissions:
9+
contents: read
1710

18-
###############
19-
# Set the Job #
20-
###############
2111
jobs:
22-
build:
23-
# Name the Job
24-
name: Lint Markdown
25-
# Set the agent to run on
12+
lint:
13+
name: Lint
2614
runs-on: ubuntu-latest
27-
28-
##################
29-
# Load all steps #
30-
##################
3115
steps:
32-
##########################
33-
# Checkout the code base #
34-
##########################
35-
- name: Checkout Code
36-
uses: actions/checkout@v3
16+
- uses: actions/checkout@v4
3717
with:
38-
# Full git history is needed to get a proper
39-
# list of changed files within `super-linter`
40-
fetch-depth: 0
18+
persist-credentials: false
19+
- uses: actions/setup-node@v4
20+
with:
21+
node-version: 'lts/*'
22+
23+
- name: Install dependencies
24+
run: npm install --ignore-scripts --include=dev
4125

42-
############################################
43-
# Run Linter against Markdown in code base #
44-
############################################
45-
- name: Lint Markdown
46-
uses: github/super-linter@v4
47-
env:
48-
VALIDATE_ALL_CODEBASE: false
49-
DEFAULT_BRANCH: main
50-
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
51-
VALIDATE_MARKDOWN: true
52-
LINTER_RULES_PATH: /
53-
MARKDOWN_CONFIG_FILE: .markdownlint.yml
26+
- name: Run lint
27+
run: npm test

.markdownlint-cli2.jsonc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
{
2+
"globs": [
3+
"**/*.md"
4+
],
5+
"ignores": [
6+
"node_modules",
7+
"docs/meeting-notes/202[0-3]*.md",
8+
"docs/SIREN",
9+
"docs/TTX"
10+
]
11+
}

.npmrc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
package-lock=false

README.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,21 @@
44

55
The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by helping mature and advocate well-managed vulnerability reporting and communication.
66

7-
The Vulnerability Disclosure Working group is officially a [Graduated-level](https://github.com/ossf/tac/blob/main/process/working-group-lifecycle.md) working group within the OpenSSF <img align="right" src="https://github.com/ossf/tac/blob/main/files/images/OpenSSF_StagesBadges_graduated.png" width="100" height="100">>
7+
The Vulnerability Disclosure Working group is officially a [Graduated-level](https://github.com/ossf/tac/blob/main/process/working-group-lifecycle.md) working group within the OpenSSF <img alt="openssf gradtuated WG" align="right" src="https://github.com/ossf/tac/blob/main/files/images/OpenSSF_StagesBadges_graduated.png" width="100" height="100"><!-- markdownlint-disable-line MD033 -->
88

9-
<img align="right" src="https://github.com/ossf/wg-vulnerability-disclosures/blob/main/ossf-goose-vuln.png" width="300" height="300"><!-- markdownlint-disable-line MD033 -->
9+
<img alt="OpenSSF Vulnerability Disclosures Working Group logo" align="right" src="https://github.com/ossf/wg-vulnerability-disclosures/blob/main/ossf-goose-vuln.png" width="300" height="300"><!-- markdownlint-disable-line MD033 -->
1010

1111
## **Mission**
12+
1213
The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by helping develop and advocate well-managed vulnerability reporting and communication. We serve open source maintainers and developers, assist security researchers, and help downstream open source software consumers.
1314

1415
## **Vision**
16+
1517
A world where coordinated vulnerability disclosure is a normal, easy, and expected process that is supported by guidance, automation, and tooling for maintainers, consumers, researchers, and vendors, with the goal of making open source software and the open source software supply chain more secure for everyone.
1618

1719
A world where coordinated vulnerability disclosure is:
18-
- a common, easy, and expected process
20+
21+
- a common, easy, and expected process
1922
- supported by well-documented guidance, automation, and tooling for open source maintainers and consumers, security researchers, and vendors
2023
- with the goal of making open source software and supply chains more secure for everyone.
2124

@@ -43,7 +46,7 @@ We plan on addressing this challenge through the following actions:
4346

4447
## **Current work**
4548

46-
<img align="right" src="https://github.com/ossf/wg-vulnerability-disclosures/blob/main/ossf-vuln-wg.png" width="400" height="400"><!-- markdownlint-disable-line MD033 -->
49+
<img alt="diagram of current work" align="right" src="https://github.com/ossf/wg-vulnerability-disclosures/blob/main/ossf-vuln-wg.png" width="400" height="400"><!-- markdownlint-disable-line MD033 -->
4750

4851
- [Guides to coordinated vulnerability disclosure for open source software projects](https://github.com/ossf/oss-vulnerability-guide) to assist projects in handling vulnerabilities.
4952
- [Open Source Vulnerability Schema](https://github.com/ossf/osv-schema) - see also [osv.dev](https://osv.dev).

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@ If you've been unable to find a way to report it,
99
or have received no response after repeated attempts, please contact the
1010
OpenSSF security contact email, security @ openssf . org.
1111

12-
Thank you.
12+
Thank you.

docs/guides/becoming-a-cna-as-an-open-source-org-or-project.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
> **NOTE:**
44
> This document was drafted using the following document revisions:
5-
>
5+
>
66
> * CVE Numbering Authority (CNA) Rules, Version 3.0
77
> * CVE Record Dispute Policy, Version 1.0
88
> * CVE Program Policy and Procedure for End of Life Products, Version 1.2
@@ -106,7 +106,7 @@ Optionally have the answers to this information:
106106
If you don't want Red Hat to be your Root you can contact any other Root (search "Root" in the [list of CNAs](https://www.cve.org/PartnerInformation/ListofPartners)).
107107

108108
> [!TIP]
109-
> A [Root CNA](https://www.cve.org/ResourcesSupport/Glossary#glossaryRoot) is an organization authorized within the CVE Program that is responsible, within a specific Scope, for the recruitment, training, and governance of one or more entities that are a CNA, CNA-LR, or another Root. Red Hat became a Root CNA to develop governance focusing on **open source software (OSS)** needs. Red Hat uses this approach to invite the community to create unique and different aspects of OSS for the CVE Program to consider. For example, as a Root CNA, Red Hat has created opportunities for CNAs to collaborate with other projects and communities, has championed OSS automated tooling improvements within the Program, and has successfully helped OSS projects like [curl](https://curl.se/docs/CVE-2023-52071.html) navigate CVE complexities. Learn more [here](https://access.redhat.com/articles/red_hat_cve_program) & [here](https://github.com/ossf/wg-vulnerability-disclosures/issues/157#issuecomment-2545939617) about Red Hat's engagement with CVE.
109+
> A [Root CNA](https://www.cve.org/ResourcesSupport/Glossary#glossaryRoot) is an organization authorized within the CVE Program that is responsible, within a specific Scope, for the recruitment, training, and governance of one or more entities that are a CNA, CNA-LR, or another Root. Red Hat became a Root CNA to develop governance focusing on **open source software (OSS)** needs. Red Hat uses this approach to invite the community to create unique and different aspects of OSS for the CVE Program to consider. For example, as a Root CNA, Red Hat has created opportunities for CNAs to collaborate with other projects and communities, has championed OSS automated tooling improvements within the Program, and has successfully helped OSS projects like [curl](https://curl.se/docs/CVE-2023-52071.html) navigate CVE complexities. Learn more about [Red Hat's CVE Program](https://access.redhat.com/articles/red_hat_cve_program) and their [engagement with open source](https://github.com/ossf/wg-vulnerability-disclosures/issues/157#issuecomment-2545939617).
110110
111111
You can always ask your prospective Root questions about the process of becoming and operating a CNA - they will be an excellent resource to you.
112112

members.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,6 @@ Current Active Members
4242
- Timur Snoke, CERT/CC
4343
- Laurie Tyzenhaus, CERT/CC
4444

45-
4645
## Hall of Fame
4746

4847
Former Vulnaut contributors that are always welcome!

0 commit comments

Comments
 (0)