Skip to content

Commit

Permalink
Merge pull request #2 from alphagov/pp-12665/initial-pay-repo-config
Browse files Browse the repository at this point in the history
PP-12665: initial pay repo config
  • Loading branch information
jfharden authored May 28, 2024
2 parents 0c9657a + 49584a4 commit 17cdcda
Show file tree
Hide file tree
Showing 8 changed files with 247 additions and 2 deletions.
33 changes: 33 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
---
version: 2
updates:
- package-ecosystem: gomod
directory: "/"
schedule:
interval: daily
time: "03:00"
open-pull-requests-limit: 0
labels:
- dependencies
- govuk-pay
- go
- package-ecosystem: docker
directory: "/"
schedule:
interval: daily
time: "03:00"
open-pull-requests-limit: 10
labels:
- dependencies
- govuk-pay
- docker
- package-ecosystem: github-actions
directory: "/"
schedule:
interval: daily
time: "03:00"
open-pull-requests-limit: 0
labels:
- dependencies
- govuk-pay
- github_actions
16 changes: 16 additions & 0 deletions .github/workflows/_run-tests.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
name: Github Actions Tests

on:
workflow_call:

permissions:
contents: read

jobs:
build-and-test:
name: Build and test
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29
- run: |
docker build -t test --build-arg base_image=paketobuildpacks/run-jammy-base:latest .
22 changes: 22 additions & 0 deletions .github/workflows/post-merge.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
name: Post Merge

on:
push:
branches:
- master
paths-ignore:
- '.github/**'

permissions:
contents: read

jobs:
tests:
uses: ./.github/workflows/_run-tests.yml

tag-release:
needs:
- tests
permissions:
contents: write
uses: alphagov/pay-ci/.github/workflows/_create-alpha-release-tag.yml@master
11 changes: 11 additions & 0 deletions .github/workflows/pr.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
name: PR

on:
pull_request:

permissions:
contents: read

jobs:
tests:
uses: ./.github/workflows/_run-tests.yml
6 changes: 6 additions & 0 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
repos:
- repo: https://github.com/Yelp/detect-secrets
rev: v1.5.0
hooks:
- id: detect-secrets
args: [ '--baseline', '.secrets.baseline' ]
142 changes: 142 additions & 0 deletions .secrets.baseline
Original file line number Diff line number Diff line change
@@ -0,0 +1,142 @@
{
"version": "1.5.0",
"plugins_used": [
{
"name": "ArtifactoryDetector"
},
{
"name": "AWSKeyDetector"
},
{
"name": "AzureStorageKeyDetector"
},
{
"name": "Base64HighEntropyString",
"limit": 4.5
},
{
"name": "BasicAuthDetector"
},
{
"name": "CloudantDetector"
},
{
"name": "DiscordBotTokenDetector"
},
{
"name": "GitHubTokenDetector"
},
{
"name": "GitLabTokenDetector"
},
{
"name": "HexHighEntropyString",
"limit": 3.0
},
{
"name": "IbmCloudIamDetector"
},
{
"name": "IbmCosHmacDetector"
},
{
"name": "IPPublicDetector"
},
{
"name": "JwtTokenDetector"
},
{
"name": "KeywordDetector",
"keyword_exclude": ""
},
{
"name": "MailchimpDetector"
},
{
"name": "NpmDetector"
},
{
"name": "OpenAIDetector"
},
{
"name": "PrivateKeyDetector"
},
{
"name": "PypiTokenDetector"
},
{
"name": "SendGridDetector"
},
{
"name": "SlackDetector"
},
{
"name": "SoftlayerDetector"
},
{
"name": "SquareOAuthDetector"
},
{
"name": "StripeDetector"
},
{
"name": "TelegramBotTokenDetector"
},
{
"name": "TwilioKeyDetector"
}
],
"filters_used": [
{
"path": "detect_secrets.filters.allowlist.is_line_allowlisted"
},
{
"path": "detect_secrets.filters.common.is_baseline_file",
"filename": ".secrets.baseline"
},
{
"path": "detect_secrets.filters.common.is_ignored_due_to_verification_policies",
"min_level": 2
},
{
"path": "detect_secrets.filters.heuristic.is_indirect_reference"
},
{
"path": "detect_secrets.filters.heuristic.is_likely_id_string"
},
{
"path": "detect_secrets.filters.heuristic.is_lock_file"
},
{
"path": "detect_secrets.filters.heuristic.is_not_alphanumeric_string"
},
{
"path": "detect_secrets.filters.heuristic.is_potential_uuid"
},
{
"path": "detect_secrets.filters.heuristic.is_prefixed_with_dollar_sign"
},
{
"path": "detect_secrets.filters.heuristic.is_sequential_string"
},
{
"path": "detect_secrets.filters.heuristic.is_swagger_file"
},
{
"path": "detect_secrets.filters.heuristic.is_templated_secret"
}
],
"results": {
"README.md": [
{
"type": "Private Key",
"filename": "README.md",
"hashed_secret": "be4fc4886bd949b369d5e092eb87494f12e57e5b",
"is_verified": false,
"line_number": 61,
"is_secret": false
}
]
},
"generated_at": "2024-05-28T09:53:11Z"
}
8 changes: 8 additions & 0 deletions CONTRIBUTING.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# GOV.UK Pay contributing guide

This guide covers the basics of how to contribute to the GOV.UK Pay project.

## Contributions from beyond the team
If you have an idea or a feature request to share, please either open an issue or contact the GOV.UK Pay team by emailing [email protected].

Please do not submit pull requests or raise GitHub issues for security vulnerabilities. Please follow our [vulnerability disclosure](https://github.com/alphagov/pay-webhooks/blob/main/README.md#vulnerability-disclosure) process instead.
11 changes: 9 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
# pool-resource

***Note this is a GOV.UK Pay maintained fork of [concourse/pool-resource](https://github.com/concourse/pool-resource)***

*a pool of locks (modeling semaphores)*

Allows you to lock environments, pipeline flow, or other entities which have to
Expand Down Expand Up @@ -334,5 +336,10 @@ docker build -t pool-resource --build-arg base_image=concourse/golang-builder --

### Contributing

Please make all pull requests to the `master` branch and ensure tests pass
locally.
See the [contributing guide](/CONTRIBUTING.md)


## Vulnerability Disclosure

GOV.UK Pay aims to stay secure for everyone. If you are a security researcher and have discovered a security vulnerability in this code, we appreciate your help in disclosing it to us in a responsible manner. Please refer to our [vulnerability disclosure policy](https://www.gov.uk/help/report-vulnerability) and our [security.txt](https://vdp.cabinetoffice.gov.uk/.well-known/security.txt) file for details.

0 comments on commit 17cdcda

Please sign in to comment.