遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/725)
<a href="https://www.bestpractices.dev/projects/725"><img src="https://www.bestpractices.dev/projects/725/badge"></a>
The Gitano project is a git server which aims to keep everything in Git repositories, rather than using additional database stores.
https://wiki.gitano.org.uk/contributing/
https://wiki.gitano.org.uk/about/governance/
https://www.gitano.org.uk/covenant/
This is met via the ability to recover the project from Daniel's cold dead hands - see https://wiki.gitano.org.uk/about/governance/
The project is mostly in a maintenance state. The primary goals of the project listed at https://wiki.gitano.org.uk/about/goals/ are met. Wider goals are ongoing and not contingent on the project per-se.
https://wiki.gitano.org.uk/setup/system-user/
The documentation is, for the most part, generated from the software. As such, consistency is assured.
https://www.gitano.org.uk/
This is acceptable since the project is run essentially by one person and as such they do not have time or energy to devote to specific accessibility mechanisms. Patches to improve accessibility will be assessed and merged where possible.
Gitano uses 'Tongue', an i18n library. So far no localisations have been submitted.
The project does not store passwords of contributors or users and relies on SSH for authentication when the software is run.
Upgrade notes are in the NEWS file.
NEWS
https://trello.com/b/l4Id6iiC/gitano
No vulnerabilities have ever been reported in the software.
https://wiki.gitano.org.uk/contributing/ has a section about reporting security issues and vulnerabilities.
This is done entirely by means of the review process documented at https://wiki.gitano.org.uk/contributing/
There is no such tool for Lua
Where we compile C code we honour compiler flags. Mostly Lua code is built which does not need compilation.
We do not use install -s
install -s
We do not use recursive make.
When built with appropriate flags, we are reproducible. This is verified via Debian's reproducibility information.
We do this by being in Debian.
We honour DESTDIR
DESTDIR
By means of Debian packaging and the ability to run from a built tree (not installed)
Debian package dependency information, e.g. at https://git.gitano.org.uk/gitano/debian.git/tree/control
We believe that by means of relying on Debian's security processes, this will not be an issue for Gitano.
All our dependencies come via the operating system - Debian.
We rely only on FLOSS.
While this is not done on every checkin to master, it is done on any packaging release.
Where applicable, tests are adapted or added to expose an issue before a fix is committed.
We use luacov and have reasonable coverage of over 95% in the libraries, and while the total coverage in the app is 76%, it is over 80% for the stated supported code, and over 90% in the core code.
This is explained on https://wiki.gitano.org.uk/contributing/
During development, warnings are considered as errors.
ACLs deny by default, the project developers consider security a critical component of design.
Releases are uploaded to Debian which implies a full signed package of content.
Releases are via Debian which as above implies signed content.
All inputs are filtered via SSH or similar to ensure trustworthiness. Syntax of content is checked where appropriate before acting on it, and the policy of deny-by-default applies.
Such mechanisms are usually not applicable to languages such as Lua
Trust boundaries are via SSH or a web service as per the installation instructions at https://wiki.gitano.org.uk/setup/system-user/ and as such the threat model is handled for us.
No such tool is available for Lua
后退