遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/7774)
<a href="https://www.bestpractices.dev/projects/7774"><img src="https://www.bestpractices.dev/projects/7774/badge"></a>
A reverse proxy based on NGINX. Part of the Yokohama Project
https://github.com/warriors-life/yokohama-proxy/blob/dev/CONTRIBUTING.md
DCO is used and sign-off is required for all Warriors Life's repositories (https://docs.github.com/en/organizations/managing-organization-settings/managing-the-commit-signoff-policy-for-your-organization)
Project doesn't have any user-interacting GUI
It doesn't generate text other than by that extent that NGINX does
They doesn't store passwords
All breaking changes yet were quite easy to update to
GitHub Issues are used as an issue tracker
No vulnerabilities reported yet
No native binaries are being generated
Provenance can be enabled in Docker
It doesn't do that
Docker allows that, I believe
The software is distributed as a Docker image
This can be done just by pulling the needed Docker image
FROM directive in the Dockerfile: https://github.com/warriors-life/yokohama-proxy/blob/dev/src/Dockerfile
Dependabot helps with that
1 is true
There aren't such deprecated or obsolete functions or APIs used
https://github.com/warriors-life/yokohama-proxy/actions/workflows/build.yml
Example: https://github.com/warriors-life/yokohama-proxy/commit/b0769289a0a90182e3d36f6099a7604c4a360320 and https://github.com/warriors-life/yokohama-proxy/commit/7d8de496b7e4838c5ab2a0d9a371ab7cf4bb2206
I don't think there are tools that can measure this criterion for NGINX configuration files
They are maximally strict
They are implemented
It doesn't depend on such. The project uses server SSL ciphers described in https://github.com/warriors-life/yokohama-proxy/blob/dev/src/ssl.conf
There are multiple ciphers
All keys, passwords, etc are stored in files, paths to which are given by configuring environmental variables
Only TLS1.2+ is supported (https://github.com/warriors-life/yokohama-proxy/blob/dev/src/ssl.conf)
Supports (https://github.com/warriors-life/yokohama-proxy/blob/dev/src/ssl.conf)
NGINX performs that, the software ensures that everything can be accessed only by HTTPS (https://github.com/warriors-life/yokohama-proxy/blob/dev/src/http.conf)
The software ensures that everything can be accessed only by HTTPS (https://github.com/warriors-life/yokohama-proxy/blob/dev/src/http.conf)
They are signed
All handling of untrusted sources is done by NGINX, the backend and the configuration are assumed to be absolutely trusted
They are used (e.g. headers in https://github.com/warriors-life/yokohama-proxy/blob/dev/src/static.conf)
CodeQL is used
Doesn't produce any software in a memory-unsafe language by itself
后退