Skip to content

Commit

Permalink
patch CI and badges (#58) #none
Browse files Browse the repository at this point in the history
* CI Update docker-publish.yml #none

* Add CI badges #none

* add --yes to cosign
  • Loading branch information
verovaleros authored Oct 30, 2024
1 parent bba7994 commit 670b14a
Show file tree
Hide file tree
Showing 2 changed files with 15 additions and 4 deletions.
5 changes: 2 additions & 3 deletions .github/workflows/docker-publish.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ jobs:
steps:
- name: Checkout repository
uses: actions/checkout@v3

# Install the cosign tool except on PR
# https://github.com/sigstore/cosign-installer
- name: Install cosign
Expand Down Expand Up @@ -77,7 +77,6 @@ jobs:
cache-from: type=gha
cache-to: type=gha,mode=max


# Sign the resulting Docker image digest except on PRs.
# This will only write to the public Rekor transparency log when the Docker
# repository is public to avoid leaking data. If you would like to publish
Expand All @@ -89,4 +88,4 @@ jobs:
COSIGN_EXPERIMENTAL: "true"
# This step uses the identity token to provision an ephemeral certificate
# against the sigstore community Fulcio instance.
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign {}@${{ steps.build-and-push.outputs.digest }}
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign --yes {}@${{ steps.build-and-push.outputs.digest }}
14 changes: 13 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,16 @@
# Attacker IP Prioritization (AIP) Tool
[![Python CI Tests](https://github.com/stratosphereips/AIP/actions/workflows/python-ci-tests.yml/badge.svg?branch=development)](https://github.com/stratosphereips/AIP/actions/workflows/python-ci-tests.yml)
[![CodeQL](https://github.com/stratosphereips/AIP/actions/workflows/github-code-scanning/codeql/badge.svg?branch=main)](https://github.com/stratosphereips/AIP/actions/workflows/github-code-scanning/codeql)
[![Docker Hub CI](https://github.com/stratosphereips/AIP/actions/workflows/docker-hub.yml/badge.svg?branch=main)](https://github.com/stratosphereips/AIP/actions/workflows/docker-hub.yml)
[![Docker GHCR CI](https://github.com/stratosphereips/AIP/actions/workflows/docker-publish.yml/badge.svg?branch=main)](https://github.com/stratosphereips/AIP/actions/workflows/docker-publish.yml)

[![Docker Pulls](https://img.shields.io/docker/pulls/stratosphereips/aip?color=green)](https://hub.docker.com/r/stratosphereips/aip)
[![GitHub issues](https://img.shields.io/github/issues/stratosphereips/AIP.svg?color=green)](https://github.com/stratosphereips/AIP/issues/)
[![GitHub issues-closed](https://img.shields.io/github/issues-closed/stratosphereips/AIP.svg?color=green)](https://github.com/stratosphereips/AIP/issues?q=is%3Aissue+is%3Aclosed)
[![GitHub open-pull-requests](https://img.shields.io/github/issues-pr-raw/stratosphereips/AIP?color=green&label=open%20PRs)](https://github.com/stratosphereips/AIP/pulls?q=is%3Aopen)
[![GitHub pull-requests closed](https://img.shields.io/github/issues-pr-closed-raw/stratosphereips/AIP?color=green&label=closed%20PRs)](https://github.com/stratosphereips/AIP/pulls?q=is%3Aclosed)


The Attacker IP Prioritization (AIP) is a tool to generate efficient and economic IP blocklists based on network traffic captured from honeypot networks.

With the advent of 5G, IoT devices are directly connected often without firewall protection. Therefore we need blocklists that are small, efficient and economic. The AIP structure is shown below.
Expand Down Expand Up @@ -52,4 +64,4 @@ The Stratosphere AIP tool is licensed under [GNU General Public License v3.0](ht
## About
This tool was developed at the Stratosphere Laboratory at the Czech Technical University in Prague. This is part of the [Stratosphere blocklist generation project](https://mcfp.felk.cvut.cz/publicDatasets/CTU-AIPP-BlackList/).

This tool was originally born from the bachelor thesis of Thomas O'Hara, [The Attacker IP Prioritizer: An IoT Optimized Blacklisting Algorithm (2021)](https://dspace.cvut.cz/handle/10467/96722).
This tool was originally born from the bachelor thesis of Thomas O'Hara, [The Attacker IP Prioritizer: An IoT Optimized Blacklisting Algorithm (2021)](https://dspace.cvut.cz/handle/10467/96722).

0 comments on commit 670b14a

Please sign in to comment.