From 1559fb96d961999f5e8cb35dbf3314589882aed7 Mon Sep 17 00:00:00 2001 From: newcloudreboss Date: Tue, 29 Oct 2024 15:49:54 -0400 Subject: [PATCH 1/8] Create powershell.yml --- .github/workflows/powershell.yml | 40 ++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 .github/workflows/powershell.yml diff --git a/.github/workflows/powershell.yml b/.github/workflows/powershell.yml new file mode 100644 index 0000000..7d2e1cc --- /dev/null +++ b/.github/workflows/powershell.yml @@ -0,0 +1,40 @@ +name: PSScriptAnalyzer + +on: + push: + branches: [ "master" ] + pull_request: + branches: [ "master" ] + schedule: + - cron: '45 16 * * 1' + +permissions: + contents: read + +jobs: + build: + permissions: + contents: read # for actions/checkout to fetch code + security-events: write # for github/codeql-action/upload-sarif to upload SARIF results + actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status + name: PSScriptAnalyzer + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v4 + + - name: Run PSScriptAnalyzer + uses: microsoft/psscriptanalyzer-action@6b2948b1944407914a58661c49941824d149734f + with: + # Check https://github.com/microsoft/action-psscriptanalyzer for more info about the options. + # The below set up runs PSScriptAnalyzer to your entire repository and runs some basic security rules. + path: .\ + recurse: true + # Include your own basic security rules. Removing this option will run all the rules + includeRule: '"PSAvoidGlobalAliases", "PSAvoidUsingConvertToSecureStringWithPlainText"' + output: results.sarif + + # Upload the SARIF file generated in the previous step + - name: Upload SARIF results file + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: results.sarif From ee695229e5c822387ddbf6122688834431ce9ccc Mon Sep 17 00:00:00 2001 From: newcloudreboss Date: Tue, 29 Oct 2024 15:50:56 -0400 Subject: [PATCH 2/8] Create defender-for-devops.yml --- .github/workflows/defender-for-devops.yml | 45 +++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 .github/workflows/defender-for-devops.yml diff --git a/.github/workflows/defender-for-devops.yml b/.github/workflows/defender-for-devops.yml new file mode 100644 index 0000000..2d2fab0 --- /dev/null +++ b/.github/workflows/defender-for-devops.yml @@ -0,0 +1,45 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. +# +# Microsoft Security DevOps (MSDO) is a command line application which integrates static analysis tools into the development cycle. +# MSDO installs, configures and runs the latest versions of static analysis tools +# (including, but not limited to, SDL/security and compliance tools). +# +# The Microsoft Security DevOps action is currently in beta and runs on the windows-latest queue, +# as well as Windows self hosted agents. ubuntu-latest support coming soon. +# +# For more information about the action , check out https://github.com/microsoft/security-devops-action +# +# Please note this workflow do not integrate your GitHub Org with Microsoft Defender For DevOps. You have to create an integration +# and provide permission before this can report data back to azure. +# Read the official documentation here : https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-github +name: "Microsoft Defender For Devops" +on: + push: + branches: [ "master" ] + pull_request: + branches: [ "master" ] + schedule: + - cron: '32 9 * * 5' + +jobs: + MSDO: + # currently only windows latest is supported + runs-on: windows-latest + + steps: + - uses: actions/checkout@v4 + - uses: actions/setup-dotnet@v4 + with: + dotnet-version: | + 5.0.x + 6.0.x + - name: Run Microsoft Security DevOps + uses: microsoft/security-devops-action@v1.6.0 + id: msdo + - name: Upload results to Security tab + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: ${{ steps.msdo.outputs.sarifFile }} From e8053493d02daa51b82607c95d492b5d1fbe1ebf Mon Sep 17 00:00:00 2001 From: newcloudreboss Date: Tue, 29 Oct 2024 16:29:39 -0400 Subject: [PATCH 3/8] Create SECURITY.md --- SECURITY.md | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 SECURITY.md diff --git a/SECURITY.md b/SECURITY.md new file mode 100644 index 0000000..39abd96 --- /dev/null +++ b/SECURITY.md @@ -0,0 +1,15 @@ + +| Version | Supported | +| ------- | ------------------ | +| 5.1.x | :white_check_mark: | +| 5.0.x | :x: | +| 4.0.x | :white_check_mark: | +| < 4.0 | :x: | + +## Reporting a Vulnerability + +Use this section to tell people how to report a vulnerability. + +Tell them where to go, how often they can expect to get an update on a +reported vulnerability, what to expect if the vulnerability is accepted or +declined, etc. From 5f259729217c2e75ee4463eb6c9927a76f5a1e87 Mon Sep 17 00:00:00 2001 From: newcloudreboss Date: Tue, 29 Oct 2024 17:03:59 -0400 Subject: [PATCH 4/8] Delete edgeos_EdgeRouter-X-5-Port_20230324.tar.gz --- edgeos_EdgeRouter-X-5-Port_20230324.tar.gz | Bin 3244 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 edgeos_EdgeRouter-X-5-Port_20230324.tar.gz diff --git a/edgeos_EdgeRouter-X-5-Port_20230324.tar.gz b/edgeos_EdgeRouter-X-5-Port_20230324.tar.gz deleted file mode 100644 index 247bf6629b73ba8494432040a9a2ebb0ea293e07..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 3244 zcmV;d3{&$TiwFS5(H&$01MM7XZ`(%JpZzOlwfV5yUCKNq#ft**#!BNNu~XUIY=HpA zh#X0SP$bJCrMQLud*5(Kk;6+zWH(9m1e@f%H`lvoc-X!-q0_UI#{^YX^?u*tM-ItR zGke)}Ql^=v+BZzg()uR|X}W6lk#+I}5VHt}2%Ut!ADy(o;sHkywkOk*ZwgZR<2af< zni6a$f5U=b4}i?426vX1h90w~Ep@L8mYvaWL|ZP-Kp zJ^g6^PXd|z;~?}UUd%lNY7|83iU8uG^*n6Mvk0rz@l zChwB`jh?0&<@KMbYdTU-o&f&h@}JOkYbUS3T2u^(1{xA}H#o zpsC&DcQ%mF((p&GUM8bKKk(6%M=$=O2b|VGbNrO)4 z2L)WAC#Z|4H}+%CK~ab&6KbQ0A1-m|5Ge7{n~Uqbf1wdd*1GFY*QhXd3Csl=QtFCBp@pLM79nf62A%81 zN}iV9FfEC#9HdEI0v33?z%F&fh_{o0k`F(1DZzR3MrW1bP^eFrUCt z69m-pl!Nocn!q6$q0unH?HGUcZqY;3o(J*(gV2wB+joVkar_!x>fYS5dz^Id%xvhO zQznb3hZ8cnX%2kFiY!xh#w+P+J^0uOBn0#0(5~Zq+Gt-wKlOYtXxvoJDEylvZBg@9BnJ1{j*NZ)o z!`01QYt(I%!j&HZ<8pSj$pCM#9bvkOTt_5uDPg-ou;W}x&6QTQY zlt50DD-~8!iF~z_4pgjdG`zhVUA?>;UhbdZjDQItwYf~*_%?QP7PTfV&SvKSwVYr= z-heza-4tCrrIv|tNWrpHv+`65!`#P)9AU5tjGXM48+4$0B>Py^pN z9Bog)(e~E1H-Z)D?GUW*;_h?oF9eC)60kt76WiM0k^d$B@4XFL62KuhMB62>)ATv) z?1DHPL|R4Wx9@Q?;yDFW!PAJ*D~b0KYA4lu@D$tkKSHp`Dy>eF<=O<>P$nivq8Y5; zNW@Qysd08omESg47Z&All`Q;7K?UN#C7%$EBY$01y8WF2tuv7Ft+uP{3W=95StZ;` zx^nsU(-s{htECE+CoQHVbly#V#sUJmzMk}|!qlR!OZ@Yr>kZu7*tT9Hu;$U1HbIUfGYto#-B{q#TzE+`hGCR_D48L+Y;p>8B7oARzsXeG14qGe}+UGe~Q#TI50+P0V1+|h&R?XcRHSKQdZnudvfbclYi%a7?ceQ{_m8 z8B{Q0;!so_zNjfWA`T6XheN%&bCB-eRw!0d ziF{Sj*Bs3!*hB3T?6prY*@f9*hPCdML%u%E_J%5Ct4c|eo8_?C)pC&Al&>~$u8-O| z*Kg-sDMWJEn{VQVas|Jtl>Dg-8=!WE4cZx&Y&sl_Wztqig=|$R`BONzf~1x|07=(r zJkMAa@l0f4FllD&pb2(a?#gC9izd`1N*p+Rty1!IYz7Q<6bR5uKl~_?$HbobEg&RM zmA~WXhctprd{JpAX)GS|NUyEkh6=JoReohFEwLM4psz*)$79)4xpKg76N%Y1t0ev$ zQ%}rp%4g@5REUF1Fe7NtGYcZffIs6~oS0G8;|y2?Yq*?FH;oFJEcN^gY zay(nO9f0lDj%>H;`023&dmolg@bg4tZ7CY-kfPzC_W*Jk>?oJP)5wL-?(>8)*itBi zeTBkVY%4enkW<(3>GS#gMU3C2E^Tbjh{EV^{NWLKt}bPu zu?pm0=^|OevIoG<*F~#B*VC95dYMI0AeP7jRVrkn)GV;YcO4QcHVtMZWYsx&xVT8F z-Eu9ajh*2q+l?K9vR6AGS?-jn53;pg`^rkC-l|fv`SBzorXZE2&)X~cGCaGp)i2R8 z>JTMMwyP7_-2KL#=kn809HNJS6j{4Q=55#BFp^~V%I7=SdrEHe#16*845K%{i6r;@ zs4TVA%401OSGliMfvNp2;yQ?5)luk#Dh^b=`-={@F9pG zI0u+9h|UgrW<6v6wPP=Dt= z?}jhu7uwBe?0)?5?x#zsiT`%|W>@VREjST`y(p0Q zn-Hm8&W~>3`)(Hqx_(%UP^&Vzwi~&=8@aIsx%lr-Ca#a20(Q3K(Ww%$((s+=${YuQ z9D#Ec66sI3Zm)rQ(n?ON9S~RrcPx3$sq2p`O@TpEmqrh$e&0k$-t%F^L_)5lt92`x z9ka%^95Rll5-xA5IQ)o$-u&i!1YOKY2!?QWO_uk+KpHC0;;yK$W=4zsIRQnb^pku_ z?3H+u-#9%z`wqRwp$8&3N0&aICkn~jhy0blt~T-c!zf%nE^xeyzB}U;zW@GvB;Mgo zzi*QHtaH>!3+6DYDS?%4^g=s_G7m;;f8^((@4+G2xZw{}JY*L_-CmgI*&fyl>zoFR z*l+|bdSRUZ>N6nzHOA8^exaYUnDGn)iiGzAIn3mr`U zIjDRzp`W_Fu4VPjo~1!p)O17bYN}@OswYSIdLe!PpKG(zP2|r`4h`IJd!~ts@Bi~- zX6BZzBk}&frS|$N;@^MJ%-)yv{{JTYR|rpQ0D_^9{g$9@n0Ww)lz@@VCd@KJ{W!Ns`o+FjL!bmPQEHg z?SDys!{Na`_*DXxfBz->{*S4ZzW*V7fu@_5rm20^;C?|fHBEck@4qaU%j5$%Ck^n8 ze*Z(3|AgQu4iEhWs6FIwSr9Ld@_&5D;=kB^OuX~K(}248&*hKSpswS8U+wYuZ<&x= eswYnX@s{!b8 Date: Tue, 12 Nov 2024 23:05:15 -0500 Subject: [PATCH 5/8] ViewKeeper From b75098d3738e0b69b7f067211d38ad5317457f24 Mon Sep 17 00:00:00 2001 From: "(" Date: Wed, 13 Nov 2024 00:21:42 -0500 Subject: [PATCH 6/8] m16 --- .github/workflows/defender-for-devops.yml | 31 ++++++++++++----------- SECURITY.md | 4 +-- 2 files changed, 18 insertions(+), 17 deletions(-) diff --git a/.github/workflows/defender-for-devops.yml b/.github/workflows/defender-for-devops.yml index 2d2fab0..dc73080 100644 --- a/.github/workflows/defender-for-devops.yml +++ b/.github/workflows/defender-for-devops.yml @@ -15,7 +15,8 @@ # Please note this workflow do not integrate your GitHub Org with Microsoft Defender For DevOps. You have to create an integration # and provide permission before this can report data back to azure. # Read the official documentation here : https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-github -name: "Microsoft Defender For Devops" +name: "Microsoft Defender For DevSecOps" + on: push: branches: [ "master" ] @@ -29,17 +30,17 @@ jobs: # currently only windows latest is supported runs-on: windows-latest - steps: - - uses: actions/checkout@v4 - - uses: actions/setup-dotnet@v4 - with: - dotnet-version: | - 5.0.x - 6.0.x - - name: Run Microsoft Security DevOps - uses: microsoft/security-devops-action@v1.6.0 - id: msdo - - name: Upload results to Security tab - uses: github/codeql-action/upload-sarif@v3 - with: - sarif_file: ${{ steps.msdo.outputs.sarifFile }} +steps: + - uses: actions/checkout@v4 + - uses: actions/setup-dotnet@v4 + with: + dotnet-version: | + 5.0.x + 6.0.x + - name: Run Microsoft Security DevOps + uses: microsoft/security-devops-action@v1.6.0 + id: msdo + - name: Upload results to Security tab + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: ${{ steps.msdo.outputs.sarifFile }} diff --git a/SECURITY.md b/SECURITY.md index 39abd96..3dbef02 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -1,5 +1,5 @@ - -| Version | Supported | +C +|Version|Supported|m<3.8> | ------- | ------------------ | | 5.1.x | :white_check_mark: | | 5.0.x | :x: | From ce39305659d5fe60f52cce0f5f5b7f43239c6051 Mon Sep 17 00:00:00 2001 From: "(" Date: Sat, 16 Nov 2024 16:42:04 -0600 Subject: [PATCH 7/8] Update README.md --- README.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 1804f8f..f755c4e 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,5 @@ -# Home-Network Implementation -Using the Ubiquiti EdgeRouter X and Ubiquiti AP-AC-LR Access Point +Using the Ubiquiti EdgeRouter +and + Ubiquiti AP-AC-LR Access Point +*CMake From 45a7032076df607027a36a8be3edd1441ba31e21 Mon Sep 17 00:00:00 2001 From: "(" Date: Tue, 26 Nov 2024 13:01:33 -0600 Subject: [PATCH 8/8] i --- Ubiquiti.code-workspace | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 Ubiquiti.code-workspace diff --git a/Ubiquiti.code-workspace b/Ubiquiti.code-workspace new file mode 100644 index 0000000..362d7c2 --- /dev/null +++ b/Ubiquiti.code-workspace @@ -0,0 +1,7 @@ +{ + "folders": [ + { + "path": "." + } + ] +} \ No newline at end of file