Skip to content

Commit d4843ec

Browse files
Initial commit
0 parents  commit d4843ec

22 files changed

+1350
-0
lines changed

.coderabbit.yaml

Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
language: pt-BR
2+
tone_instructions: ''
3+
early_access: true
4+
enable_free_tier: true
5+
reviews:
6+
profile: chill
7+
request_changes_workflow: true
8+
high_level_summary: true
9+
high_level_summary_placeholder: '@coderabbitai summary'
10+
auto_title_placeholder: '@coderabbitai'
11+
review_status: true
12+
poem: true
13+
collapse_walkthrough: false
14+
sequence_diagrams: true
15+
path_filters: []
16+
path_instructions: []
17+
abort_on_close: true
18+
auto_review:
19+
enabled: true
20+
auto_incremental_review: true
21+
ignore_title_keywords: []
22+
labels: []
23+
drafts: false
24+
base_branches: []
25+
tools:
26+
shellcheck:
27+
enabled: true
28+
ruff:
29+
enabled: true
30+
markdownlint:
31+
enabled: true
32+
github-checks:
33+
enabled: true
34+
timeout_ms: 90000
35+
languagetool:
36+
enabled: true
37+
enabled_only: false
38+
level: default
39+
disabled_categories:
40+
- TYPOS
41+
- TYPOGRAPHY
42+
- CASING
43+
biome:
44+
enabled: true
45+
hadolint:
46+
enabled: true
47+
swiftlint:
48+
enabled: true
49+
phpstan:
50+
enabled: true
51+
level: default
52+
golangci-lint:
53+
enabled: true
54+
yamllint:
55+
enabled: true
56+
gitleaks:
57+
enabled: true
58+
checkov:
59+
enabled: true
60+
detekt:
61+
enabled: true
62+
eslint:
63+
enabled: true
64+
rubocop:
65+
enabled: true
66+
buf:
67+
enabled: true
68+
chat:
69+
auto_reply: true
70+
knowledge_base:
71+
opt_out: false
72+
learnings:
73+
scope: auto
74+
issues:
75+
scope: auto
76+
jira:
77+
project_keys: []
78+
linear:
79+
team_keys: []
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
## Título do Pull Request
2+
3+
Descreva brevemente o propósito do pull request.
4+
5+
## Descrição
6+
7+
Por favor, inclua um resumo das mudanças e a motivação por trás delas. Liste quaisquer dependências que são necessárias para esta mudança.
8+
9+
## Tipo de Mudança
10+
11+
- [ ] Bugfix
12+
- [ ] Nova funcionalidade
13+
- [ ] Mudança de funcionalidade existente
14+
- [ ] Documentação
15+
- [ ] Segurança de código
16+
- [ ] Kubernetes
17+
- [ ] Helm
18+
- [ ] Docker
19+
- [ ] GitHub Actions
20+
- [ ] Outro
21+
22+
## Checklist
23+
24+
- [ ] Meu código segue as diretrizes de estilo deste projeto
25+
- [ ] Eu realizei uma auto-revisão do meu próprio código
26+
- [ ] Eu comentei meu código, especialmente em áreas difíceis de entender
27+
- [ ] Eu fiz as mudanças correspondentes na documentação
28+
- [ ] Minhas mudanças não geram novos avisos
29+
- [ ] Eu adicionei testes que provam que minha correção é eficaz ou que minha funcionalidade funciona
30+
- [ ] Testes de unidade novos e existentes passam localmente com minhas mudanças
31+
- [ ] Quaisquer mudanças dependentes foram mescladas e publicadas nos módulos downstream
32+
33+
## Screenshots (se aplicável)
34+
35+
Se aplicável, adicione capturas de tela para ajudar a explicar suas mudanças.
36+
37+
## Questões Relacionadas
38+
39+
Liste quaisquer issues relacionadas aqui, usando o formato `#<issue_number>`.

.github/CODEOWNERS

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Proprietários padrão para todo o repositório
2+
* @nataliagranato

.github/FUNDING.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
# These are supported funding model platforms
2+
3+
github: nataliagranato
4+
ko_fi: nataliagranato
5+
buy_me_a_coffee: nataliagranato
6+
pix: fada126d-7311-495f-bda2-55ec79b0a39b

.github/ISSUE_TEMPLATE/BUG_REPORT.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
name: Bug Report
3+
about: Crie um relatório para nos ajudar a melhorar
4+
title: "[BUG]"
5+
labels: bug
6+
assignees: nataliagranato
7+
8+
---
9+
10+
## Descrição
11+
12+
Por favor, inclua um resumo do problema e a motivação por trás da issue.
13+
14+
## Screenshots (se aplicável)
15+
16+
Se aplicável, adicione capturas de tela para ajudar a explicar o problema.
17+
18+
## Ambiente
19+
20+
- **Método de Execução**:
21+
- [ ] Kubernetes com manifestos
22+
- [ ] Kubernetes com Helm
23+
- [ ] Docker localmente
24+
25+
- **Sistema Operacional**: [e.g. Ubuntu 20.04]
26+
- **Navegador**: [e.g. Chrome 89]
27+
- **Versão da Aplicação**: [e.g. 1.0.0]
28+
29+
## Logs e Saída de Erro
30+
31+
Por favor, inclua quaisquer logs relevantes e saída de erro aqui.
32+
33+
## Questões Relacionadas
34+
35+
Liste quaisquer issues relacionadas aqui, usando o formato `#<issue_number>`.

.github/dependabot.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
version: 2
2+
updates:
3+
- package-ecosystem: github-actions
4+
directory: /
5+
schedule:
6+
interval: daily

.github/workflows/checkov.yml

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
name: Checkov Security Scan
2+
3+
on:
4+
push:
5+
branches:
6+
- main
7+
tags:
8+
- 'v*'
9+
pull_request:
10+
types:
11+
- opened
12+
- synchronize
13+
- reopened
14+
workflow_dispatch:
15+
16+
permissions:
17+
contents: read
18+
security-events: write # Permissão necessária para upload de SARIF
19+
20+
jobs:
21+
checkov-scan:
22+
name: Checkov Scan
23+
runs-on: ubuntu-latest
24+
steps:
25+
- name: Checkout code
26+
uses: actions/checkout@v4
27+
28+
- name: Set up Python
29+
uses: actions/setup-python@v5
30+
with:
31+
python-version: '3.10'
32+
33+
- name: Install Checkov
34+
run: pip install checkov
35+
36+
# Run Checkov with SARIF output
37+
- name: Run Checkov and generate SARIF report
38+
run: |
39+
checkov -d ./ \
40+
-o sarif \
41+
--output-file checkov-results.sarif \
42+
--quiet
43+
44+
- name: Upload SARIF results
45+
uses: github/codeql-action/upload-sarif@v3
46+
with:
47+
sarif_file: checkov-results.sarif
48+
49+
- name: Show Checkov results (verbose)
50+
run: checkov -d ./

.github/workflows/dependabot.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
version: 2
2+
updates:
3+
- package-ecosystem: "github-actions" # Para GitHub Actions
4+
directory: "/" # Localização do workflow YAML
5+
schedule:
6+
interval: "daily"
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required,
6+
# PRs introducing known-vulnerable packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
name: 'Dependency Review'
10+
on: [pull_request]
11+
12+
permissions:
13+
contents: read
14+
15+
jobs:
16+
dependency-review:
17+
runs-on: ubuntu-latest
18+
steps:
19+
- name: Harden the runner (Audit all outbound calls)
20+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
21+
with:
22+
egress-policy: audit
23+
24+
- name: 'Checkout Repository'
25+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26+
- name: 'Dependency Review'
27+
uses: actions/dependency-review-action@ce3cf9537a52e8119d91fd484ab5b8a807627bf8 # v4.6.0

.github/workflows/issue.yml

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
name: Resposta Automática a Issues
2+
3+
on:
4+
issues:
5+
types: [opened]
6+
permissions:
7+
contents: read
8+
issues: write
9+
10+
jobs:
11+
resposta-automatica:
12+
runs-on: ubuntu-latest
13+
14+
steps:
15+
- name: Harden the runner (Audit all outbound calls)
16+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
17+
with:
18+
egress-policy: audit
19+
20+
- uses: derekprior/add-autoresponse@500f8788d667c31d43a4469f8a3ec3b491470fd1 # master
21+
env:
22+
GITHUB_TOKEN: ${{ secrets.USER_TOKEN }}
23+
with:
24+
respondableId: ${{ github.event.issue.node_id }}
25+
response: "Obrigado @${{ github.event.issue.user.login }} por criar esta issue. Se esta issue é sobre um bug, pergunta sobre o produto ou solicitação de funcionalidade: você pode me enviar um e-mail para [email protected]"
26+
author: ${{ github.event.issue.user.login }}

.github/workflows/lint.yml

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
name: Lint
3+
4+
on: # yamllint disable-line rule:truthy
5+
push: null
6+
pull_request: null
7+
8+
permissions: {}
9+
10+
jobs:
11+
build:
12+
name: Lint
13+
runs-on: ubuntu-latest
14+
15+
permissions:
16+
contents: read
17+
packages: read
18+
# To report GitHub Actions status checks
19+
statuses: write
20+
21+
steps:
22+
- name: Harden the runner (Audit all outbound calls)
23+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
24+
with:
25+
egress-policy: audit
26+
27+
- name: Checkout code
28+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
29+
with:
30+
# super-linter needs the full git history to get the
31+
# list of files that changed across commits
32+
fetch-depth: 0
33+
34+
- name: Super-linter
35+
uses: super-linter/super-linter@4e8a7c2bf106c4c766c816b35ec612638dc9b6b2 # v7.3.0
36+
env:
37+
# To report GitHub Actions status checks
38+
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

.github/workflows/osv-scanner.yml

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
# This workflow uses actions that are not certified by GitHub.
2+
# They are provided by a third-party and are governed by
3+
# separate terms of service, privacy policy, and support
4+
# documentation.
5+
6+
# A sample workflow which sets up periodic OSV-Scanner scanning for vulnerabilities,
7+
# in addition to a PR check which fails if new vulnerabilities are introduced.
8+
#
9+
# For more examples and options, including how to ignore specific vulnerabilities,
10+
# see https://google.github.io/osv-scanner/github-action/
11+
12+
name: OSV-Scanner
13+
14+
on:
15+
pull_request:
16+
branches: [ "main" ]
17+
merge_group:
18+
branches: [ "main" ]
19+
schedule:
20+
- cron: '0 13 * * *'
21+
push:
22+
branches: [ "main" ]
23+
24+
permissions:
25+
# Require writing security events to upload SARIF file to security tab
26+
security-events: write
27+
# Read commit contents
28+
contents: read
29+
30+
jobs:
31+
scan-scheduled:
32+
if: ${{ github.event_name == 'push' || github.event_name == 'schedule' }}
33+
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@6fc714450122bda9d00e4ad5d639ad6a39eedb1f" # v2.0.1
34+
with:
35+
# Example of specifying custom arguments
36+
scan-args: |-
37+
-r
38+
--skip-git
39+
./
40+
scan-pr:
41+
if: ${{ github.event_name == 'pull_request' || github.event_name == 'merge_group' }}
42+
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@6fc714450122bda9d00e4ad5d639ad6a39eedb1f" # v2.0.1
43+
with:
44+
# Example of specifying custom arguments
45+
scan-args: |-
46+
-r
47+
--skip-git
48+
./

0 commit comments

Comments
 (0)