遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/4806)
<a href="https://www.bestpractices.dev/projects/4806"><img src="https://www.bestpractices.dev/projects/4806/badge"></a>
OperatorFabric is a modular, extensible, industrial-strength platform for use in electricity, water, and other utility operations. It aims to facilitate operational activities for utilities in two ways: - Centralize real time business events in a single place to avoid having multiple screens/software solutions - Facilitate interactions between operational control centers
This repository contains the OperatorFabric core program.
Bus factor of 2 using https://github.com/JetBrains-Research/bus-factor-explorer
We include copyrights (see templates here https://github.com/opfab/operatorfabric-core/tree/develop/src/main/headers) in all files except test resources.
The SPDX tags are included in the copyright templates (https://github.com/opfab/operatorfabric-core/tree/develop/src/main/headers)
Repository on GitHub, which uses git. git is distributed.
We use a "Good first issue" label on issues (https://github.com/opfab/operatorfabric-core/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22)
See https://opfab.github.io/documentation/current/security/#_code_analysis
Information to build locally the application --> https://opfab.github.io/documentation/current/dev_env/ The application is as well build via github actions
The tests are invoked by the appropriate Gradle task for the subproject or the corresponding Angular cli command.
See https://github.com/opfab/operatorfabric-core/blob/develop/build.gradle
We have builds including tests running on Travis CI (https://travis-ci.com/github/opfab/operatorfabric-core).
// X-Content-Type-Options was not set to "nosniff".
A security audit has be conducted on 2024 on behaf of OSTIF The results are available here : https://ostif.org/wp-content/uploads/2024/08/24-06-1685-REP_OSTIF-OperatorFabric-2.pdf
The following hardening mechanism are available : - Automatic Security tests - Access control mechanism - Input validation - Security analysis via sonarCloud : https://sonarcloud.io/summary/overall?id=org.lfenergy.operatorfabric%3Aoperatorfabric-core - Dependency vulnerability check via Mend Bolt for GitHub - Container scanning via Anchore
We do not have any dynamic analysis tool. We have an automated test suite with around 80% code coverage and 70% branch coverage, and the inputs used in tests are random when possible.
警告:需要更长的理由。
后退