feat: Initialize Zastava Webhook service with TLS and Authority authentication
- Added Program.cs to set up the web application with Serilog for logging, health check endpoints, and a placeholder admission endpoint. - Configured Kestrel server to use TLS 1.3 and handle client certificates appropriately. - Created StellaOps.Zastava.Webhook.csproj with necessary dependencies including Serilog and Polly. - Documented tasks in TASKS.md for the Zastava Webhook project, outlining current work and exit criteria for each task.
This commit is contained in:
12
bench/Scanner.Analyzers/lang/README.md
Normal file
12
bench/Scanner.Analyzers/lang/README.md
Normal file
@@ -0,0 +1,12 @@
|
||||
# Scanner Language Analyzer Benchmarks
|
||||
|
||||
This directory will capture benchmark results for language analyzers (Node, Python, Go, .NET, Rust).
|
||||
|
||||
Pending tasks:
|
||||
- LA1: Node analyzer microbench CSV + flamegraph.
|
||||
- LA2: Python hash throughput CSV.
|
||||
- LA3: Go build info extraction benchmarks.
|
||||
- LA4: .NET RID dedupe performance matrix.
|
||||
- LA5: Rust heuristic coverage comparisons.
|
||||
|
||||
Results should be committed as deterministic CSV/JSON outputs with accompanying methodology notes.
|
||||
Reference in New Issue
Block a user