-
Notifications
You must be signed in to change notification settings - Fork 41
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
sec(release): release sboms and signatures in same repository as arte…
…fact (#640) * feat(helm): change cert-gen job image Signed-off-by: Oliver Bähler <[email protected]> * sec(release): release sboms and signatures in same repository as artefact Signed-off-by: Oliver Bähler <[email protected]> * ci(helm): update workflows and correct testing Signed-off-by: Oliver Bähler <[email protected]> * ci(helm): update workflows and correct testing Signed-off-by: Oliver Bähler <[email protected]> * ci(helm): update workflows and correct testing Signed-off-by: Oliver Bähler <[email protected]> * ci(test): fix helm testing and golint Signed-off-by: Oliver Bähler <[email protected]> * ci(test): fix helm testing and golint Signed-off-by: Oliver Bähler <[email protected]> --------- Signed-off-by: Oliver Bähler <[email protected]>
- Loading branch information
1 parent
cd47a88
commit afc390d
Showing
64 changed files
with
1,413 additions
and
487 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,86 @@ | ||
name: Coverage | ||
|
||
on: | ||
push: | ||
branches: | ||
- "main" | ||
pull_request: | ||
types: [opened, reopened, synchronize] | ||
branches: | ||
- "main" | ||
|
||
concurrency: | ||
group: ${{ github.workflow }}-${{ github.ref }} | ||
cancel-in-progress: true | ||
|
||
jobs: | ||
compliance: | ||
name: "License Compliance" | ||
runs-on: ubuntu-24.04 | ||
steps: | ||
- name: "Checkout Code" | ||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | ||
- name: Check secret | ||
id: checksecret | ||
uses: ./.github/actions/exists | ||
with: | ||
value: ${{ secrets.FOSSA_API_KEY }} | ||
- name: "Run FOSSA Scan" | ||
if: steps.checksecret.outputs.result == 'true' | ||
uses: fossas/fossa-action@93a52ecf7c3ac7eb40f5de77fd69b1a19524de94 # v1.5.0 | ||
with: | ||
api-key: ${{ secrets.FOSSA_API_KEY }} | ||
- name: "Run FOSSA Test" | ||
if: steps.checksecret.outputs.result == 'true' | ||
uses: fossas/fossa-action@93a52ecf7c3ac7eb40f5de77fd69b1a19524de94 # v1.5.0 | ||
with: | ||
api-key: ${{ secrets.FOSSA_API_KEY }} | ||
run-tests: true | ||
sast: | ||
name: "SAST" | ||
runs-on: ubuntu-24.04 | ||
env: | ||
GO111MODULE: on | ||
permissions: | ||
security-events: write | ||
actions: read | ||
contents: read | ||
steps: | ||
- name: Checkout Source | ||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | ||
- uses: actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3.0 | ||
with: | ||
go-version-file: 'go.mod' | ||
- name: Run Gosec Security Scanner | ||
uses: securego/gosec@e0cca6fe95306b7e7790d6f1bf6a7bec6d622459 # v2.22.0 | ||
with: | ||
args: '-no-fail -fmt sarif -out gosec.sarif ./...' | ||
- name: Upload SARIF file | ||
uses: github/codeql-action/upload-sarif@24e1c2d337459cce262cbca8d69998e56cd5eb8e | ||
with: | ||
sarif_file: gosec.sarif | ||
unit_tests: | ||
name: "Unit tests" | ||
runs-on: ubuntu-24.04 | ||
steps: | ||
- name: Checkout | ||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | ||
- uses: actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3.0 | ||
with: | ||
go-version-file: 'go.mod' | ||
- name: Unit Test | ||
run: make test | ||
- name: Check secret | ||
id: checksecret | ||
uses: ./.github/actions/exists | ||
with: | ||
value: ${{ secrets.CODECOV_TOKEN }} | ||
- name: Upload Report to Codecov | ||
if: ${{ steps.checksecret.outputs.result == 'true' }} | ||
uses: codecov/codecov-action@13ce06bfc6bbe3ecf90edbbf1bc32fe5978ca1d3 # v5.3.1 | ||
with: | ||
token: ${{ secrets.CODECOV_TOKEN }} | ||
slug: projectcapsule/capsule-proxy | ||
files: ./coverage.out | ||
fail_ci_if_error: true | ||
verbose: true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
name: Build images | ||
permissions: {} | ||
on: | ||
pull_request: | ||
branches: | ||
- "main" | ||
paths: | ||
- '.github/workflows/docker-*.yml' | ||
- 'api/**' | ||
- 'controllers/**' | ||
- 'pkg/**' | ||
- 'e2e/*' | ||
- '.ko.yaml' | ||
- 'go.*' | ||
- 'main.go' | ||
- 'Makefile' | ||
|
||
jobs: | ||
build-images: | ||
runs-on: ubuntu-latest | ||
permissions: | ||
security-events: write | ||
actions: read | ||
contents: read | ||
steps: | ||
- name: Checkout | ||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | ||
- name: ko build | ||
run: VERSION=${{ github.sha }} make ko-build-all | ||
- name: Trivy Scan Image | ||
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # v0.29.0 | ||
with: | ||
scan-type: 'fs' | ||
ignore-unfixed: true | ||
format: 'sarif' | ||
output: 'trivy-results.sarif' | ||
severity: 'CRITICAL,HIGH' | ||
env: | ||
# Trivy is returning TOOMANYREQUESTS | ||
# See: https://github.com/aquasecurity/trivy-action/issues/389#issuecomment-2385416577 | ||
TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2' | ||
- name: Upload Trivy scan results to GitHub Security tab | ||
uses: github/codeql-action/upload-sarif@24e1c2d337459cce262cbca8d69998e56cd5eb8e | ||
with: | ||
sarif_file: 'trivy-results.sarif' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.