Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DevOps]: Node Security #1158

Closed
joshbruce opened this issue Mar 23, 2018 · 16 comments
Closed

[DevOps]: Node Security #1158

joshbruce opened this issue Mar 23, 2018 · 16 comments

Comments

@joshbruce
Copy link
Member

Marked version: 0.3.18

Markdown flavor: n/a

Proposal type: other

What pain point are you perceiving?

None. More of a curiosity.

What solution are you suggesting?

Was making the rounds to those projects who became dependent on 8fold-marked to make sure they switched back to latest. Noticed this in their pipeline:

screen shot 2018-03-23 at 11 58 17 am

Node security... @UziTech what is it, should we have it? (Believe there was a REGEX tool mentioned elsewhere at some point.)

@UziTech
Copy link
Member

UziTech commented Mar 23, 2018

That is NSP. It is free for OSPs

There is a free Snyk App that might be helpful as well.

image

It would also be nice to enable Appveyor for testing on windows.

@joshbruce
Copy link
Member Author

Leave it to you, brother. Definitely think Snyk should be a thing since they're the ones nice enough to talk to us. :)

@styfle
Copy link
Member

styfle commented Apr 8, 2018

I also think we should add the policy to prevent merging PRs without having all the checks pass:

  • CI
  • security check
  • 2+ approvals

I can enable 2+ approvals through the github policy.
Is anyone against this? @joshbruce @UziTech @davisjam

@davisjam
Copy link
Contributor

+1

@joshbruce
Copy link
Member Author

I'm okay with the 2+ approvals. If this can be done through the GitHub review process, please post a link of a how-to, if you have one handy.

@styfle
Copy link
Member

styfle commented Apr 17, 2018

Visit "Setting" > "Branches" https://github.com/markedjs/marked/settings/branches

Click "Edit" next to master

Then check the boxes for the policies

image


Update: I accidentally enabled "Require branches to be up to date before merging" and I realize this is going to be painful for each PR so I disabled that option. Sorry about that 😛

@styfle
Copy link
Member

styfle commented Apr 17, 2018

I just enabled that, however I am unable to install Snyk.
I think only @joshbruce can do it: https://github.com/marketplace/snyk

(note: node security is no longer accepting new repos)

@UziTech
Copy link
Member

UziTech commented Apr 17, 2018

NSP has been aquired by NPM and have stopped accepting new accounts. But should probably still do Snyk

@joshbruce
Copy link
Member Author

Added Snyk via the MarkedJSBot account. (Starting to think admin might be an owner...but still considering operations for that.)

  • Testing weekly (daily felt like overkill).
  • Fail if the repo has any vulnerabilities.

@styfle
Copy link
Member

styfle commented Apr 17, 2018

So it doesnt check every PR?

@joshbruce
Copy link
Member Author

If "it" in this context is Snyk, it should be every PR - but they have a CLI to extend it would seem. See #1229

@styfle
Copy link
Member

styfle commented Apr 25, 2018

It looks like npm@6.0.0 will have this security audit built in.

See the blog post for details.

@UziTech
Copy link
Member

UziTech commented Apr 25, 2018

should we add npm audit to travis after lint? (once the registry actually allows it)

@DanielRuf
Copy link

Currently the security check for RegEx fails due to some violations.

@davisjam
Copy link
Contributor

davisjam commented May 9, 2018

@DanielRuf Some fixes and discussion in #1226.

@UziTech UziTech closed this as completed Mar 11, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants