Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
159 commits
Select commit Hold shift + click to select a range
ffe8fe8
chore: remove unused values from chart (#5334)
rkferreira Oct 17, 2025
3b222ff
feat(generators): add hex generator (#5314)
unique-jakub Oct 17, 2025
b574407
fix: use GetClientCertificate in Vault Auth (#5441)
shaxbee Oct 17, 2025
c96b449
feat(aws): add defining a resource policy via metadata for secretsman…
Skarlso Oct 17, 2025
2e5e73e
fix: Webhook provider PushSecret not working (#5445)
Skarlso Oct 17, 2025
3beac84
chore(deps): bump softprops/action-gh-release from 2.3.4 to 2.4.1 (#5…
dependabot[bot] Oct 19, 2025
0552b99
chore(deps): bump github/codeql-action from 4.30.8 to 4.30.9 (#5481)
dependabot[bot] Oct 20, 2025
42c46d9
fix: remove the finalizer on namespace deletion (#5473)
Skarlso Oct 20, 2025
6b9f3d0
chore(deps): bump sigstore/cosign-installer from 3.10.0 to 4.0.0 (#5480)
dependabot[bot] Oct 20, 2025
3cbd63e
chore(deps): bump anchore/sbom-action from 0.20.6 to 0.20.8 (#5483)
dependabot[bot] Oct 20, 2025
019c95b
update dependencies (#5487)
eso-service-account-app[bot] Oct 20, 2025
9f3627e
chore(deps): bump mkdocs-material in /hack/api-docs (#5485)
dependabot[bot] Oct 20, 2025
c33d9c2
chore(deps): bump charset-normalizer in /hack/api-docs (#5486)
dependabot[bot] Oct 20, 2025
daa15da
chore(deps): bump apache/skywalking-eyes from 0.7.0 to 0.8.0 (#5484)
dependabot[bot] Oct 21, 2025
0bee001
chore(deps): bump aws-actions/configure-aws-credentials (#5482)
dependabot[bot] Oct 21, 2025
0a3fdc3
fix: missing config-file for github action scanning (#5376)
Skarlso Oct 22, 2025
e5c5a0f
chore(build): Update ubi Docker builds to UBI9 (#5465)
IdanAdar Oct 22, 2025
37474b0
Fix typo in GitHub provider documentation (#5493)
gecube Oct 22, 2025
d13866d
fix(oracle): prevent TCP connections leakage (#5491)
adutchak Oct 23, 2025
b32aff0
Fix typo in controller-options documentation (#5496)
aslafy-z Oct 23, 2025
6f411f5
chore(linter): fix linter issue in `api` and `cmd` package (#5413)
Lumexralph Oct 24, 2025
9ee12d5
fix: remove extra json convert check (#5501)
Skarlso Oct 24, 2025
e594d36
chore: release helm chart for v0.20.4 (#5502)
Skarlso Oct 24, 2025
560fa94
chore(actions): fix security alerts for github actions (#5504)
Skarlso Oct 24, 2025
b983ac5
chore(deps): bump alpine from `4bcff63` to `4b7ce07` in /hack/api-doc…
dependabot[bot] Oct 24, 2025
dd53426
chore(deps): bump golang from 1.25.2 to 1.25.3 (#5506)
dependabot[bot] Oct 24, 2025
4392e89
chore(release): fix incorrect shas from security alert pinning (#5512)
jakobmoellerdev Oct 24, 2025
4d2d24b
chore(deps): bump golang from `aee43c3` to `aee43c3` (#5516)
dependabot[bot] Oct 27, 2025
c033201
chore(deps): bump golang from 1.25.2-bookworm to 1.25.3-bookworm in /…
dependabot[bot] Oct 27, 2025
cdf51fe
chore(deps): bump anchore/sbom-action from 0.20.8 to 0.20.9 (#5508)
dependabot[bot] Oct 27, 2025
1c4e38a
chore(deps): bump hashicorp/setup-terraform (#5510)
dependabot[bot] Oct 27, 2025
9fde0a2
chore(deps): bump actions/github-script from 7.0.1 to 8.0.0 (#5513)
dependabot[bot] Oct 27, 2025
fa37858
update dependencies (#5519)
eso-service-account-app[bot] Oct 28, 2025
d53d9e2
chore(deps): bump github/codeql-action from 4.30.9 to 4.31.0 (#5514)
dependabot[bot] Oct 28, 2025
69e36eb
chore(deps): bump actions/cache from 4.2.4 to 4.3.0 (#5511)
dependabot[bot] Oct 28, 2025
fde3047
chore(deps): bump regex from 2025.9.18 to 2025.10.23 in /hack/api-doc…
dependabot[bot] Oct 28, 2025
96b1dd5
chore(deps): bump mkdocs-macros-plugin in /hack/api-docs (#5518)
dependabot[bot] Oct 28, 2025
612d5db
chore(deps): bump termcolor from 3.1.0 to 3.2.0 in /hack/api-docs (#5…
dependabot[bot] Oct 28, 2025
0f7a6fe
fix: upgrade go version (#5529)
Skarlso Oct 31, 2025
02d1251
fix(charts): normalize certificate duration default value (#5497)
aslafy-z Oct 31, 2025
c639cc2
chore(revive-linter): add revive linter configuration (#5515)
Lumexralph Nov 1, 2025
a9b233b
feat: go module separation (#5498)
moolen Nov 3, 2025
08fa383
chore(deps): bump github/codeql-action from 4.31.0 to 4.31.2 (#5531)
dependabot[bot] Nov 3, 2025
a3dbcce
chore(deps): bump mkdocs-material in /hack/api-docs (#5533)
dependabot[bot] Nov 3, 2025
d92e5dd
fix: update deps script to reflect new go mod structure (#5532)
moolen Nov 3, 2025
194955a
fix: lint (#5536)
gusfcarvalho Nov 3, 2025
640d029
feat: dynamic target implementation for external secrets sources (#5…
Skarlso Nov 3, 2025
f947d83
fix: codeql should not rebuild the world on every one (#5540)
Skarlso Nov 4, 2025
4d2c8fd
fix(onepassword): Reduce API usage (#5410)
sondrelg Nov 4, 2025
580043f
feat(esoctl): adds bootstrap generator commands (#5539)
gusfcarvalho Nov 5, 2025
5746bb6
fix: adds missing externalsecret_type validation on generatorRef (#5547)
gusfcarvalho Nov 5, 2025
028f9ed
chore(docs): fix the generic resource doc using the incorrect switch …
Skarlso Nov 6, 2025
d75b9cb
chore(docs): add Topicus.Education to adopters list (#5551)
sboschman Nov 7, 2025
8dc6e63
fix(build): use more portable bash (#5537)
tiagolobocastro Nov 7, 2025
91f6f5b
chore(chart): release helm chart 1.0.0 (#5552)
Skarlso Nov 7, 2025
f280886
chore(deps): bump golang from 1.25.3 to 1.25.4 (#5560)
dependabot[bot] Nov 10, 2025
09ebe36
chore(deps): bump golang from 1.25.3-bookworm to 1.25.4-bookworm in /…
dependabot[bot] Nov 10, 2025
d39c6c0
feat: add support for ECDSA ssh keys (#5559)
bigjazzsound Nov 10, 2025
7599439
chore(deps): bump step-security/harden-runner from 2.13.1 to 2.13.2 (…
dependabot[bot] Nov 10, 2025
19d74b6
chore(deps): bump softprops/action-gh-release from 2.4.1 to 2.4.2 (#5…
dependabot[bot] Nov 10, 2025
2a82136
chore(deps): bump helm/chart-testing-action from 2.7.0 to 2.8.0 (#5565)
dependabot[bot] Nov 10, 2025
aad919a
chore(deps): bump aws-actions/configure-aws-credentials (#5562)
dependabot[bot] Nov 10, 2025
c12227d
chore(deps): bump helm/kind-action from 1.12.0 to 1.13.0 (#5563)
dependabot[bot] Nov 10, 2025
002213e
chore(deps): bump docker/setup-qemu-action from 3.6.0 to 3.7.0 (#5567)
dependabot[bot] Nov 10, 2025
cf45d20
chore(deps): bump regex from 2025.10.23 to 2025.11.3 in /hack/api-doc…
dependabot[bot] Nov 10, 2025
3cb6c0c
chore(deps): bump markdown from 3.9 to 3.10 in /hack/api-docs (#5569)
dependabot[bot] Nov 10, 2025
2c2dc04
chore(deps): bump hashicorp/setup-terraform (#5566)
dependabot[bot] Nov 10, 2025
a6d5a5d
fix(docs): minor typos KeeperSecurity docs (#5573)
mdjong1 Nov 11, 2025
579135b
feat(docs): using WorkloadIdentityFederation in non-GKE cluster (#5556)
jennweir Nov 12, 2025
8afd646
esoctl: add darwin_arm64 releases (#5583)
lbordowitz Nov 13, 2025
db0c841
feat: support override IAM endpoint in IBM provider for APIkey auth (…
fidel-ruiz Nov 14, 2025
fd4f915
feat(security): build tags for all the providers to disable them on d…
ShimonDarshan Nov 14, 2025
1b95bfd
fix: do not include the last element of the path in the iteration (#5…
Skarlso Nov 14, 2025
c71b15e
fix(k8s): support deleting whole secret (#5538)
tiagolobocastro Nov 14, 2025
d4d7734
fix(provider): configure TLS for secret server provider (#5558)
Lumexralph Nov 15, 2025
619b669
chore(aws): remove any usage of aws-sdk-v1 (#5590)
Skarlso Nov 15, 2025
a70586a
fix(gcp): check for secret version exists in PushSecret (#5593)
bpalko Nov 17, 2025
f734774
chore(deps): bump golang from `d3f0cf7` to `d3f0cf7` (#5595)
dependabot[bot] Nov 17, 2025
3cf57a1
chore(deps): bump github/codeql-action from 4.31.2 to 4.31.3 (#5596)
dependabot[bot] Nov 17, 2025
bbd7dda
chore(deps): bump click from 8.3.0 to 8.3.1 in /hack/api-docs (#5602)
dependabot[bot] Nov 17, 2025
a3df4e0
feat(vault): add GCP Workload Identity authentication support (#5356)
SamuelMolling Nov 17, 2025
119f3bf
chore: fix sonar cloud issues (#5405)
Skarlso Nov 17, 2025
bdc802c
chore(deps): bump ubi9/ubi from `dec374e` to `dcd8128` (#5594)
dependabot[bot] Nov 17, 2025
7d5e63f
chore(deps): bump aws-actions/configure-aws-credentials (#5597)
dependabot[bot] Nov 17, 2025
a231eb2
chore(deps): bump actions/dependency-review-action from 4.8.1 to 4.8.…
dependabot[bot] Nov 17, 2025
97cf12a
chore(aws-sdk-v2): update dependencies to accept new aws regions (#5577)
damienpuig Nov 17, 2025
86296a9
chore(deps): bump pymdown-extensions in /hack/api-docs (#5599)
dependabot[bot] Nov 17, 2025
c2a9bf4
chore(deps): bump certifi from 2025.10.5 to 2025.11.12 in /hack/api-d…
dependabot[bot] Nov 17, 2025
0e81875
chore(deps): bump mkdocs-material from 9.6.23 to 9.7.0 in /hack/api-d…
dependabot[bot] Nov 18, 2025
5b49a90
chore(deps): bump mkdocs-macros-plugin in /hack/api-docs (#5603)
dependabot[bot] Nov 18, 2025
cf5555e
chore: Use ghcr.io instead of our own domain (#5617)
evrardjp Nov 21, 2025
fe7f45c
chore(chart): release helm chart 1.1.0 (#5619)
Skarlso Nov 21, 2025
606e2ec
docs: improve spec.md by exporting generator types (#5624)
gusfcarvalho Nov 21, 2025
9d3975d
chore(deps): remove sprig fork (#5626)
Skarlso Nov 22, 2025
3e183ff
fix: report 404 secrets correctly in Gitlab provider (#5104)
alekc Nov 23, 2025
5492603
docs(secretserver): update documentation to include Platform compatib…
DelineaSahilWankhede Nov 24, 2025
f4014bb
chore(deps): bump golang from `d3f0cf7` to `d3f0cf7` (#5630)
dependabot[bot] Nov 24, 2025
28919c9
chore(deps): bump golang from `7419f54` to `e174196` in /e2e (#5638)
dependabot[bot] Nov 24, 2025
2ccaa3b
chore(deps): bump zizmorcore/zizmor-action from 0.2.0 to 0.3.0 (#5637)
dependabot[bot] Nov 24, 2025
2d64506
chore(deps): bump actions/setup-go from 6.0.0 to 6.1.0 (#5636)
dependabot[bot] Nov 24, 2025
b259304
chore(deps): bump anchore/sbom-action from 0.20.9 to 0.20.10 (#5635)
dependabot[bot] Nov 24, 2025
13ebac3
chore(deps): bump actions/create-github-app-token from 2.1.4 to 2.2.0…
dependabot[bot] Nov 24, 2025
e7cfc97
chore(deps): bump github/codeql-action from 4.31.3 to 4.31.4 (#5633)
dependabot[bot] Nov 24, 2025
42c1a0d
chore(deps): bump aws-actions/configure-aws-credentials (#5632)
dependabot[bot] Nov 24, 2025
5fe21b5
chore(deps): bump actions/checkout from 5.0.0 to 6.0.0 (#5631)
dependabot[bot] Nov 24, 2025
672c916
docs: add llm policy (#5649)
Skarlso Nov 27, 2025
e040e0f
chore(deps): bump pymdown-extensions in /hack/api-docs (#5660)
dependabot[bot] Dec 1, 2025
266d8d2
chore(deps): bump softprops/action-gh-release from 2.4.2 to 2.5.0 (#5…
dependabot[bot] Dec 1, 2025
d885ab0
chore(deps): bump actions/setup-python from 6.0.0 to 6.1.0 (#5657)
dependabot[bot] Dec 1, 2025
ab0e2ea
chore(deps): bump peter-evans/slash-command-dispatch from 4.0.0 to 5.…
dependabot[bot] Dec 1, 2025
b10d51c
fix: pass in the token to the build and publish container (#5651)
Skarlso Dec 1, 2025
a5238a4
test(secretserver): improve test coverage for SecretServer provider (…
DelineaSahilWankhede Dec 1, 2025
92cb53b
fix: docs pipeline (#5663)
rkferreira Dec 1, 2025
64dc681
fix: modify the url of the remote to include the token (#5664)
Skarlso Dec 1, 2025
52fb236
chore(deps): bump hashicorp/setup-terraform (#5659)
dependabot[bot] Dec 2, 2025
89fd81c
feat(helm): add dynamic labelSelector if not define in topologySpread…
fe80 Dec 2, 2025
ccaa461
feat: Support retry settings for Doppler provider (#5608)
maduonline Dec 2, 2025
06e184a
feat(beyondtrust): enable pushing secrets in BeyondTrust provider (#5…
btfhernandez Dec 2, 2025
f6729a7
fix: correctly merge map fields during templating (#5671)
Skarlso Dec 2, 2025
7f0ec4c
fix: use patch instead of update for finalizers addition and removal …
Skarlso Dec 3, 2025
710fc06
feat(oracle): implement SecretExists (#5672)
anders-swanson Dec 3, 2025
b4e8e89
fix(security): create provider for webhook & fake (#5628)
ShimonDarshan Dec 3, 2025
1df845d
fix: set client transport to use GitHub Enterprise URL (#5662)
fred-gagnon Dec 3, 2025
883162d
feat(generator): Password generator can generate and expose multiple …
Trojanekkk Dec 3, 2025
a060928
fix: run check diff on main (#5681)
Skarlso Dec 4, 2025
352d6fa
feat: `bitwardenServerSDKURL` is required for `bitwardensecretsmanage…
budimanjojo Dec 4, 2025
67931cb
fix: update the refreshInterval formatting _everywhere_ (#5680)
Skarlso Dec 4, 2025
6ee5ec0
Update conjur-api-go; Disable credential storage (#5648)
szh Dec 4, 2025
12833a4
fix: add live-reload to make docs.serve (#5676)
gusfcarvalho Dec 5, 2025
875594a
fix: remove cached artifacts after build (#5686)
gusfcarvalho Dec 5, 2025
ef209c5
fix(keepersecurity): properly handle fields key (#5674)
pepordev Dec 5, 2025
b2d5073
chore: bump 1.1.1 (#5687)
gusfcarvalho Dec 5, 2025
85bebde
chore: fix the argocd e2e test case (#5688)
Skarlso Dec 6, 2025
14d59bd
feat(provider): add Barbican provider support (#5398)
rkferreira Dec 7, 2025
480bc59
690995-promote secretserver to beta (#5668)
DelineaSahilWankhede Dec 8, 2025
fe3780f
chore(deps): bump golang from 1.25.4 to 1.25.5 (#5693)
dependabot[bot] Dec 8, 2025
ae23a1f
chore(deps): bump golang from 1.25.4-bookworm to 1.25.5-bookworm in /…
dependabot[bot] Dec 8, 2025
764d465
feat(controller): add flag to enable/disable secretstore reconcile (#…
Ilhan-Personal Dec 8, 2025
dd30a15
chore(deps): bump ubi9/ubi from `dcd8128` to `75937d9` (#5655)
dependabot[bot] Dec 8, 2025
4906ac6
chore(deps): bump peter-evans/slash-command-dispatch from 5.0.0 to 5.…
dependabot[bot] Dec 8, 2025
248ddf6
chore(deps): bump github/codeql-action from 4.31.5 to 4.31.7 (#5696)
dependabot[bot] Dec 8, 2025
9352648
chore(deps): bump actions/stale from 10.1.0 to 10.1.1 (#5697)
dependabot[bot] Dec 8, 2025
4c4e91e
chore(deps): bump actions/create-github-app-token from 2.2.0 to 2.2.1…
dependabot[bot] Dec 8, 2025
0ecb6dc
chore(deps): bump step-security/harden-runner from 2.13.2 to 2.13.3 (…
dependabot[bot] Dec 8, 2025
57378c0
chore(deps): bump actions/checkout from 6.0.0 to 6.0.1 (#5699)
dependabot[bot] Dec 8, 2025
658cc68
chore(deps): bump platformdirs from 4.5.0 to 4.5.1 in /hack/api-docs …
dependabot[bot] Dec 8, 2025
2d699c1
chore(deps): bump distroless/static from `87bce11` to `4b2a093` (#5692)
dependabot[bot] Dec 8, 2025
a09716e
chore(deps): bump alpine from 3.22 to 3.23 in /hack/api-docs (#5703)
dependabot[bot] Dec 8, 2025
f1fe381
chore(deps): bump urllib3 from 2.5.0 to 2.6.0 in /hack/api-docs (#5704)
dependabot[bot] Dec 9, 2025
bc5acf2
chore(deps): bump pymdown-extensions in /hack/api-docs (#5706)
dependabot[bot] Dec 9, 2025
50105c4
feat: add OIDC authentication API types for Doppler provider
mikesellitto Sep 7, 2025
266048f
feat: implement OIDC token manager for Doppler provider
mikesellitto Sep 7, 2025
7ecaa98
feat: integrate OIDC authentication into Doppler provider
mikesellitto Sep 7, 2025
77e1ea2
docs: add Doppler OIDC authentication documentation
mikesellitto Sep 7, 2025
860e21d
fix(aws-secrets-manager): Apply filtering based on both name and tags…
iypetrov Dec 10, 2025
35f235a
fix(gcpsm): SecretExists should check for regional secrets when store…
tokiwong Dec 10, 2025
1ee4572
feat: introduce store deprecation (#5711)
gusfcarvalho Dec 10, 2025
0e22d74
feat(charts): add global values for common deployment configurations …
Gabryel8818 Dec 11, 2025
0a8552c
Merge branch 'main' into doppler-oidc-auth
Skarlso Dec 11, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
10 changes: 6 additions & 4 deletions .github/actions/e2e/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ runs:
steps:

- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@v1
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v1
with:
role-to-assume: ${{ env.AWS_OIDC_ROLE_ARN }}
aws-region: ${{ env.AWS_REGION }}
Expand All @@ -31,22 +31,24 @@ runs:
restore-keys: ${{ runner.os }}-build-unit-tests-${{ github.sha }}-

- name: Cache Go Dependencies
uses: actions/cache@v3
uses: actions/cache@0400d5f644dc74513175e3cd8d07132dd4860809 # v4.2.4
with:
path: ${{ steps.go.outputs.mod-cache }}
key: ${{ runner.os }}-pkg-${{ github.sha }}-${{ hashFiles('**/go.sum') }}
restore-keys: ${{ runner.os }}-pkg-${{ github.sha }}-

- name: Setup kind
uses: engineerd/setup-kind@v0.5.0
# https://github.com/engineerd/setup-kind/releases/tag/v0.5.0
uses: engineerd/setup-kind@aa272fe2a7309878ffc2a81c56cfe3ef108ae7d0 # v0.5.0
with:
version: ${{ env.KIND_VERSION }}
wait: 10m
image: ${{ env.KIND_IMAGE }}
name: external-secrets

- name: Setup Docker Buildx
uses: docker/setup-buildx-action@v2
# https://github.com/docker/setup-buildx-action/releases/tag/v2.10.0
uses: docker/setup-buildx-action@885d1462b80bc1c1c7f0b00334ad271f09369c55 # v2.10.0
with:
version: ${{ env.DOCKER_BUILDX_VERSION }}
install: true
Expand Down
43 changes: 29 additions & 14 deletions .github/actions/sign/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,12 +18,14 @@ runs:
steps:

- name: Install cosign
uses: sigstore/cosign-installer@v2
# https://github.com/sigstore/cosign-installer/releases/tag/v2.8.1
uses: sigstore/cosign-installer@c85d0e205a72a294fe064f618a87dbac13084086 # v2.8.1
with:
cosign-release: v1.13.6

- name: Install Syft
uses: anchore/sbom-action/download-syft@v0.7.0
# https://github.com/anchore/sbom-action/releases/tag/v0.7.0
uses: anchore/sbom-action/download-syft@ce4a7cf05d7b684693d7b6bba97bfbee56806edb # v0.7.0

- name: Check Cosign install
shell: bash
Expand All @@ -48,33 +50,43 @@ runs:
- name: Get docker image tag
id: container_info
shell: bash
run: echo "digest=$(crane digest ${{ inputs.image-name }}:${{ inputs.image-tag }})" >> $GITHUB_OUTPUT
env:
IMAGE_NAME: ${{ inputs.image-name }}
IMAGE_TAG: ${{ inputs.image-tag }}
run: echo "digest=$(crane digest ${IMAGE_NAME}:${IMAGE_TAG})" >> $GITHUB_OUTPUT

- name: Sign image
shell: bash
env:
COSIGN_EXPERIMENTAL: "1"
run: cosign sign -a GITHUB_ACTOR=${{ github.triggering_actor }} "${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }}"
IMAGE_NAME: ${{ inputs.image-name }}
CONTAINER_DIGEST: ${{ steps.container_info.outputs.digest }}
GITHUB_TRIGGERING_ACTOR: ${{ github.triggering_actor }}
run: cosign sign -a GITHUB_ACTOR=${GITHUB_TRIGGERING_ACTOR} "${IMAGE_NAME}@${CONTAINER_DIGEST}"

- name: Attach SBOM to image
shell: bash
id: sbom
env:
COSIGN_EXPERIMENTAL: "1"
IMAGE_NAME: ${{ inputs.image-name }}
IMAGE_TAG: ${{ inputs.image-tag }}
CONTAINER_DIGEST: ${{ steps.container_info.outputs.digest }}
run: |
# Image SBOM (OS + application libs contained in the image)
syft "${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }}" -o spdx-json=sbom.${{ inputs.image-tag }}.spdx.json
cosign attest --predicate sbom.${{ inputs.image-tag }}.spdx.json --type spdx "${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }}"
cosign verify-attestation --type spdx ${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }} | jq '.payload |= @base64d | .payload | fromjson'
syft "${IMAGE_NAME}@${CONTAINER_DIGEST}" -o spdx-json=sbom.${IMAGE_TAG}.spdx.json
cosign attest --predicate sbom.${IMAGE_TAG}.spdx.json --type spdx "${IMAGE_NAME}@${CONTAINER_DIGEST}"
cosign verify-attestation --type spdx ${IMAGE_NAME}@${CONTAINER_DIGEST} | jq '.payload |= @base64d | .payload | fromjson'

# Go modules SBOM (dependencies from the source tree)
# Requires repository to be checked out before this composite action runs.
syft dir:. -o spdx-json=sbom.gomod.${{ inputs.image-tag }}.spdx.json
cosign attest --predicate sbom.gomod.${{ inputs.image-tag }}.spdx.json --type spdx "${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }}"
cosign verify-attestation --type spdx ${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }} | jq '.payload |= @base64d | .payload | fromjson'
syft dir:. -o spdx-json=sbom.gomod.${IMAGE_TAG}.spdx.json
cosign attest --predicate sbom.gomod.${IMAGE_TAG}.spdx.json --type spdx "${IMAGE_NAME}@${CONTAINER_DIGEST}"
cosign verify-attestation --type spdx ${IMAGE_NAME}@${CONTAINER_DIGEST} | jq '.payload |= @base64d | .payload | fromjson'

- name: Generate provenance
uses: philips-labs/slsa-provenance-action@v0.7.2
# https://github.com/philips-labs/slsa-provenance-action/releases/tag/v0.7.2
uses: philips-labs/slsa-provenance-action@dddb40e199ae28d4cd2f17bad7f31545556fdd3d # v0.7.2
with:
command: generate
subcommand: container
Expand All @@ -88,7 +100,10 @@ runs:
id: provenance
env:
COSIGN_EXPERIMENTAL: "1"
IMAGE_NAME: ${{ inputs.image-name }}
IMAGE_TAG: ${{ inputs.image-tag }}
CONTAINER_DIGEST: ${{ steps.container_info.outputs.digest }}
run: |
jq '.predicate' provenance.${{ inputs.image-tag }}.intoto.jsonl > provenance-predicate.att
cosign attest --predicate provenance-predicate.att --type slsaprovenance "${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }}"
cosign verify-attestation --type slsaprovenance ${{ inputs.image-name }}@${{ steps.container_info.outputs.digest }}
jq '.predicate' provenance.${IMAGE_TAG}.intoto.jsonl > provenance-predicate.att
cosign attest --predicate provenance-predicate.att --type slsaprovenance "${IMAGE_NAME}@${CONTAINER_DIGEST}"
cosign verify-attestation --type slsaprovenance ${IMAGE_NAME}@${CONTAINER_DIGEST}
88 changes: 88 additions & 0 deletions .github/config/codeql-config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,88 @@
name: "Synthetic Apps All Queries Config"

# expand thread model - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#extending-codeql-coverage-with-threat-models
threat-models: local

# start from scratch - https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning#disabling-the-default-queries
disable-default-queries: true

packs:
# All queries from the CodeQL Built in packs (including low/no precision queries)
- codeql/actions-queries:.
- codeql/go-queries:.
### GitHub Security Lab###
# Queries via Community Packs https://github.com/GitHubSecurityLab/CodeQL-Community-Packs (NOTE: the default suites do not include audit/debugging queries)
- githubsecuritylab/codeql-go-queries
- trailofbits/go-queries

# Start with Security Experimental (lightly documented: https://github.com/github/codeql/pull/11702) : https://github.com/github/codeql/blob/main/misc/suite-helpers/security-experimental-selectors.yml
# - precision ( low + Low or EXCLUDED precision)
# + problem.severity: recommendation
# - restriction of no experimental folder
# - restriction of audit/debugging queries from community packs
query-filters:
- include:
kind:
- problem
- path-problem
tags contain:
- security
- include:
kind:
- diagnostic
- include:
kind:
- metric
tags contain:
- summary
- exclude:
deprecated: //
- exclude:
query path:
# REMOVE exclude - OK even if they exist in experimental folder
#- /^experimental\/.*/
- Metrics/Summaries/FrameworkCoverage.ql
- /Diagnostics/Internal/.*/
- exclude:
tags contain:
- modeleditor
- modelgenerator
# Exclude audit queries from the CodeQL Built in packs
- exclude:
id:
- go/untrusted-data-to-external-api

# Remove debugging, and audit queries used by community packs (this is duplicative of the default suites from those community packs)
- exclude:
tags contain:
- debugging
- audit

#Additional extractor excludes: https://github.com/github/codeql/blob/768e5190a1c9d40a4acc7143c461c3b114e7fd59/javascript/extractor/src/com/semmle/js/extractor/AutoBuild.java#L421-L427C42
paths-ignore:
# Python
- "vendor/**"
- "examples/**"
- "tests/**"
- "test/**"
- "site-packages/**"

# JavaScript
- "node_modules"
- "**/*.test.js"
- "**/*.test.tsx"
- "**/*.spec.ts"
- "**/*.spec.tsx"
- "dist"
- "CoverageResults"
- "**/wwwroot/lib/**"
- "**/deps/**"
- "**/third_party/**"
- "**/wp-includes/**"
- "**/wp-admin/**"

# Ruby
- "**/gems/**"
- "**/spec/**/*_spec.rb"
- "**/test/**/*_test.rb"

5 changes: 5 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,23 +5,28 @@ updates:
directory: "/"
schedule:
interval: "weekly"
open-pull-requests-limit: 10

- package-ecosystem: "docker"
directory: "/"
schedule:
interval: "weekly"
open-pull-requests-limit: 10

- package-ecosystem: docker
directory: /e2e
schedule:
interval: weekly
open-pull-requests-limit: 10

- package-ecosystem: docker
directory: /hack/api-docs
schedule:
interval: weekly
open-pull-requests-limit: 10

- package-ecosystem: pip
directory: /hack/api-docs
schedule:
interval: weekly
open-pull-requests-limit: 10
36 changes: 16 additions & 20 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ jobs:
outputs:
noop: ${{ steps.noop.outputs.should_skip }}
steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- name: Detect No-op Changes
Expand All @@ -47,14 +47,14 @@ jobs:
if: needs.detect-noop.outputs.noop != 'true' && github.ref != 'refs/heads/main'

steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1

- name: Setup Go
uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
id: setup-go
with:
go-version-file: "go.mod"
Expand All @@ -63,12 +63,8 @@ jobs:
if: ${{ steps.setup-go.outputs.cache-hit != 'true' }}
run: go mod download

- name: Lint
uses: golangci/golangci-lint-action@4afd733a84b1f43292c63897423277bb7f4313a9 # v8.0.0
with:
version: ${{ env.GOLANGCI_VERSION }}
skip-pkg-cache: true
skip-build-cache: true
- name: Run lint
run: make lint

license-check:
permissions:
Expand All @@ -79,28 +75,28 @@ jobs:
if: needs.detect-noop.outputs.noop != 'true' && github.ref != 'refs/heads/main'

steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
- name: Check License Headers
uses: apache/skywalking-eyes/header@5c5b974209f0de5d905f37deb69369068ebfc15c # v0.7.0
uses: apache/skywalking-eyes/header@61275cc80d0798a405cb070f7d3a8aaf7cf2c2c1 # v0.8.0

check-diff:
runs-on: ubuntu-latest
needs: detect-noop
if: needs.detect-noop.outputs.noop != 'true' && github.ref != 'refs/heads/main'

steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
- uses: hashicorp/setup-terraform@c529327889820530c60b4ce5bbc8d6099e166666 # v3
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
- uses: hashicorp/setup-terraform@712b43959e9be7e82c34d18450fa5ec3237af3f1 # v3
- name: Setup Go
uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
id: setup-go
with:
go-version-file: "go.mod"
Expand All @@ -124,17 +120,17 @@ jobs:
if: needs.detect-noop.outputs.noop != 'true'

steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1

- name: Fetch History
run: git fetch --prune --unshallow

- name: Setup Go
uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
id: setup-go
with:
go-version-file: "go.mod"
Expand Down
13 changes: 8 additions & 5 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,17 +26,20 @@ jobs:
- language: actions
build-mode: none
steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- name: Checkout repository
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0

uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
# Without this, codeql scan builds databases separately for all modules during every run.
- name: Run go work
run: make go-work
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@f443b600d91635bebf5b0d9ebc620189c0d6fba5 # v3.29.5
uses: github/codeql-action/init@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v3.29.5
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
config-file: ./.github/config/codeql-config.yaml
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@f443b600d91635bebf5b0d9ebc620189c0d6fba5 # v3.29.5
uses: github/codeql-action/analyze@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v3.29.5
4 changes: 2 additions & 2 deletions .github/workflows/crds.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,11 +18,11 @@ jobs:
crd-tests:
runs-on: ubuntu-latest
steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
with:
fetch-depth: 0

Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/dependabot-approve.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,10 +12,10 @@ jobs:
# PRs but also ensures that it only does work for Dependabot PRs.
if: ${{ github.actor == 'dependabot[bot]' }}
steps:
- uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
- uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit
- uses: actions/create-github-app-token@67018539274d69449ef7c02e8e71183d1719ab42 # v2.1.4
- uses: actions/create-github-app-token@29824e69f54612133e76f7eaac726eef6c875baf # v2.2.1
id: app-token
with:
app-id: ${{ secrets.APP_ID }}
Expand Down
Loading