Skip to content

Commit 670b14a

Browse files
authored
patch CI and badges (#58) #none
* CI Update docker-publish.yml #none * Add CI badges #none * add --yes to cosign
1 parent bba7994 commit 670b14a

File tree

2 files changed

+15
-4
lines changed

2 files changed

+15
-4
lines changed

.github/workflows/docker-publish.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232
steps:
3333
- name: Checkout repository
3434
uses: actions/checkout@v3
35-
35+
3636
# Install the cosign tool except on PR
3737
# https://github.com/sigstore/cosign-installer
3838
- name: Install cosign
@@ -77,7 +77,6 @@ jobs:
7777
cache-from: type=gha
7878
cache-to: type=gha,mode=max
7979

80-
8180
# Sign the resulting Docker image digest except on PRs.
8281
# This will only write to the public Rekor transparency log when the Docker
8382
# repository is public to avoid leaking data. If you would like to publish
@@ -89,4 +88,4 @@ jobs:
8988
COSIGN_EXPERIMENTAL: "true"
9089
# This step uses the identity token to provision an ephemeral certificate
9190
# against the sigstore community Fulcio instance.
92-
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign {}@${{ steps.build-and-push.outputs.digest }}
91+
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign --yes {}@${{ steps.build-and-push.outputs.digest }}

README.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,16 @@
11
# Attacker IP Prioritization (AIP) Tool
2+
[![Python CI Tests](https://github.com/stratosphereips/AIP/actions/workflows/python-ci-tests.yml/badge.svg?branch=development)](https://github.com/stratosphereips/AIP/actions/workflows/python-ci-tests.yml)
3+
[![CodeQL](https://github.com/stratosphereips/AIP/actions/workflows/github-code-scanning/codeql/badge.svg?branch=main)](https://github.com/stratosphereips/AIP/actions/workflows/github-code-scanning/codeql)
4+
[![Docker Hub CI](https://github.com/stratosphereips/AIP/actions/workflows/docker-hub.yml/badge.svg?branch=main)](https://github.com/stratosphereips/AIP/actions/workflows/docker-hub.yml)
5+
[![Docker GHCR CI](https://github.com/stratosphereips/AIP/actions/workflows/docker-publish.yml/badge.svg?branch=main)](https://github.com/stratosphereips/AIP/actions/workflows/docker-publish.yml)
6+
7+
[![Docker Pulls](https://img.shields.io/docker/pulls/stratosphereips/aip?color=green)](https://hub.docker.com/r/stratosphereips/aip)
8+
[![GitHub issues](https://img.shields.io/github/issues/stratosphereips/AIP.svg?color=green)](https://github.com/stratosphereips/AIP/issues/)
9+
[![GitHub issues-closed](https://img.shields.io/github/issues-closed/stratosphereips/AIP.svg?color=green)](https://github.com/stratosphereips/AIP/issues?q=is%3Aissue+is%3Aclosed)
10+
[![GitHub open-pull-requests](https://img.shields.io/github/issues-pr-raw/stratosphereips/AIP?color=green&label=open%20PRs)](https://github.com/stratosphereips/AIP/pulls?q=is%3Aopen)
11+
[![GitHub pull-requests closed](https://img.shields.io/github/issues-pr-closed-raw/stratosphereips/AIP?color=green&label=closed%20PRs)](https://github.com/stratosphereips/AIP/pulls?q=is%3Aclosed)
12+
13+
214
The Attacker IP Prioritization (AIP) is a tool to generate efficient and economic IP blocklists based on network traffic captured from honeypot networks.
315

416
With the advent of 5G, IoT devices are directly connected often without firewall protection. Therefore we need blocklists that are small, efficient and economic. The AIP structure is shown below.
@@ -52,4 +64,4 @@ The Stratosphere AIP tool is licensed under [GNU General Public License v3.0](ht
5264
## About
5365
This tool was developed at the Stratosphere Laboratory at the Czech Technical University in Prague. This is part of the [Stratosphere blocklist generation project](https://mcfp.felk.cvut.cz/publicDatasets/CTU-AIPP-BlackList/).
5466

55-
This tool was originally born from the bachelor thesis of Thomas O'Hara, [The Attacker IP Prioritizer: An IoT Optimized Blacklisting Algorithm (2021)](https://dspace.cvut.cz/handle/10467/96722).
67+
This tool was originally born from the bachelor thesis of Thomas O'Hara, [The Attacker IP Prioritizer: An IoT Optimized Blacklisting Algorithm (2021)](https://dspace.cvut.cz/handle/10467/96722).

0 commit comments

Comments
 (0)