Skip to content

Commit 5cedfbc

Browse files
PeterDaveHellojondot
authored andcommitted
Specify proper language in README.md code blocks
This will help improve the readability with syntax highlighting
1 parent de2bca8 commit 5cedfbc

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ RUN curl https://.. | preflight run <digest>
5353

5454
If you want to just get started quickly on your workstation, you can [download a release](https://github.com/spectralops/preflight/releases) or install `preflight` with homebrew:
5555

56-
```
56+
```bash
5757
$ brew tap spectralops/tap && brew install preflight
5858
````
5959

@@ -208,19 +208,19 @@ Istio 1.7.2 Download Complete!
208208
209209
When updating an old binary or script to a new updated version, there will be at least two (2) valid digests "live" and just replacing the single digest used will fail for the older runnable which may still be running somewhere.
210210
211-
```
211+
```bash
212212
$ preflight <hash list|https://url/to/hash-list>
213213
```
214214

215215
To support updates and rolling/auto updates of scripts and binaries we basically need to validate against `<old hash>` + `<new hash>` at all times, until everyone upgrades to the new script. Preflight validates against a `list of hashes` or better, give it a _live_ URL of `valid hashes` and it will validate against it.
216216

217217

218-
```
218+
```bash
219219
curl .. | ./ci/preflight run sha256=d6aa3207c4908d123bd8af62ec0538e3f2b9f257c3de62fad4e29cd3b59b41d9,sha256=<new hash>,...
220220
```
221221

222222
Or to a live URL:
223-
```
223+
```bash
224224
curl .. | ./ci/preflight run https://dl.example.com/hashes.txt
225225
```
226226

@@ -306,7 +306,7 @@ With this configured `preflight` will search for all digest types in this file b
306306

307307
Here is a full example for your CI, combining `preflight` with Malshare:
308308

309-
```
309+
```yaml
310310
env:
311311
PF_FILE_LOOKUP: malshare.current.sha256.txt
312312

@@ -317,7 +317,7 @@ steps:
317317
318318
**Result:**
319319
320-
```
320+
```bash
321321
$ PF_FILE_LOOKUP=malshare.current.sha256.txt preflight run fe6d02cf15642ff8d5f61cad6d636a62fd46a5e5a49c06733fece838f5fa9d85 test.sh
322322
⌛️ Preflight starting using file lookup: malshare.current.sha256.txt
323323
❌ Preflight failed: Digest matches but marked as vulnerable.
@@ -340,7 +340,7 @@ With this configured `preflight` will automatically create the VirusTotal lookup
340340

341341
Here is a full example for your CI, combining `preflight` with VirusTotal:
342342

343-
```
343+
```yaml
344344
env:
345345
PF_VT_TOKEN: {{secrets.PF_VT_TOKEN}}
346346

@@ -351,7 +351,7 @@ steps:
351351
352352
**Result:**
353353
354-
```
354+
```bash
355355
$ PF_VT_TOKEN=xxx preflight check e86d4eb1e888bd625389f2e50644be67a6bdbd77ff3bceaaf182d45860b88d80 kx-leecher.exe
356356
⌛️ Preflight starting using VirusTotal
357357
❌ Preflight failed: Digest matches but marked as vulnerable.

0 commit comments

Comments
 (0)