Skip to content

Commit

Permalink
Merge branch 'master' into fw/workloadscan
Browse files Browse the repository at this point in the history
Signed-off-by: David Wertenteil <dwertent@cyberarmor.io>
  • Loading branch information
dwertent committed May 27, 2024
2 parents 0cb3c1c + a6d3869 commit 59e62b5
Show file tree
Hide file tree
Showing 195 changed files with 6,284 additions and 1,650 deletions.
124 changes: 0 additions & 124 deletions .github/workflows/create-releas-without-tests.yaml

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
name: create release
name: 'Create and Publish Tags with Testing and Artifact Handling'

on:
workflow_dispatch:
inputs:
Expand All @@ -9,77 +10,67 @@ on:

push:
tags:
- 'v*.*.*-rc.*'
- 'v*.*.*-rc.*'


env:
REGO_ARTIFACT_KEY_NAME: rego_artifact
REGO_ARTIFACT_PATH: release

jobs:
# main job of testing and building the env.
test_pr_checks:
permissions:
pull-requests: write
uses: kubescape/workflows/.github/workflows/go-basic-tests.yaml@main
with:
GO_VERSION: '1.20'
GO_VERSION: '1.21'
BUILD_PATH: github.com/kubescape/regolibrary/gitregostore/...
secrets: inherit

# build regolibrary artifacts / test rego dependencies / test rego unit-tests
build-and-rego-test:
needs: [test_pr_checks]
name: Build and test rego artifacts
runs-on: ubuntu-latest
outputs:
NEW_TAG: ${{ steps.tag-calculator.outputs.NEW_TAG }}
REGO_ARTIFACT_KEY_NAME: ${{ steps.set_outputs.outputs.REGO_ARTIFACT_KEY_NAME }}
REGO_ARTIFACT_PATH: ${{ steps.set_outputs.outputs.REGO_ARTIFACT_PATH }}
steps:
- uses: actions/checkout@24cb9080177205b6e8c946b17badbe402adc938f
name: checkout repo content
with:
token: ${{ secrets.GH_PERSONAL_ACCESS_TOKEN }}
- uses: actions/checkout@v2
name: Checkout repo content

- id: tag-calculator
uses: kubescape/workflows/.github/actions/tag-action@main
- name: Set up Go 1.21
uses: actions/setup-go@v2
with:
ORIGINAL_TAG: ${{ inputs.TAG }}
SUB_STRING: "-rc"
go-version: 1.21

# Test using Golang OPA hot rule compilation
- name: Set up Go
uses: actions/setup-go@6edd4406fa81c3da01a34fa6f6343087c207a568
with:
go-version: '1.20'

- name: Test Regoes
- name: Test Regos (Golang OPA hot rule compilation)
working-directory: testrunner
run: |
apt update && apt install -y cmake
sudo apt update && sudo apt install -y cmake
GOPATH=$(go env GOPATH) make
- name: setup python
uses: actions/setup-python@75f3110429a8c05be0e1bf360334e4cced2b63fa
- name: Setup Python 3.10.6
uses: actions/setup-python@v2
with:
python-version: 3.10.6

# generating subsections ids
- name: Update frameworks subsections
- name: Install Python dependencies
run: |
python -m pip install --upgrade pip
pip install requests
- name: Update frameworks subsections (generating subsections ids)
run: python ./scripts/generate_subsections_ids.py

# validate control-ID duplications
- run: python ./scripts/validations.py
- name: Validate control-ID duplications
run: python ./scripts/validations.py

# run export script to generate regolibrary artifacts
- run: python ./scripts/export.py
- name: Generate RegoLibrary artifacts (run export script)
run: python ./scripts/export.py

# removing release artifacts file extensions
- name: Strip Metadata Files Extensions
run: |
cd release
find -type f -name '*.json' | while read f; do mv "$f" "${f%.json}"; done
find -type f -name '*.csv' | while read f; do mv "$f" "${f%.csv}"; done
find . -type f \( -name '*.json' -o -name '*.csv' \) | while read f; do mv "$f" "${f%.*}"; done
- run: ls -laR

Expand All @@ -89,8 +80,8 @@ jobs:
echo "REGO_ARTIFACT_KEY_NAME=${{ env.REGO_ARTIFACT_KEY_NAME }}" >> $GITHUB_OUTPUT
echo "REGO_ARTIFACT_PATH=${{ env.REGO_ARTIFACT_PATH }}" >> $GITHUB_OUTPUT
- uses: actions/upload-artifact@83fd05a356d7e2593de66fc9913b3002723633cb # ratchet:actions/upload-artifact@v3.1.1
name: Upload artifact
- name: Upload artifact
uses: actions/upload-artifact@v2
with:
name: ${{ env.REGO_ARTIFACT_KEY_NAME }}
path: ${{ env.REGO_ARTIFACT_PATH }}/
Expand Down Expand Up @@ -121,34 +112,66 @@ jobs:
secrets: inherit

# start release process
release:
create-new-tag-and-release:
needs: [ks-and-rego-test]
if: ${{ (always() && (contains(needs.*.result, 'success')) && !(contains(needs.*.result, 'skipped')) && !(contains(needs.*.result, 'failure')) && !(contains(needs.*.result, 'cancelled'))) }}
name: create release and upload assets
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
name: Checkout repository

- name: 'Generate Release Tag'
id: generate_tag
uses: kubescape/workflows/.github/actions/tag-action@main
with:
ORIGINAL_TAG: ${{ github.ref_name }}
SUB_STRING: "-rc."

# Create and push the full version tag (e.g., v2.0.1)
- name: Create and Push Full Tag
uses: rickstaa/action-create-tag@v1
with:
tag: ${{ steps.generate_tag.outputs.NEW_TAG }}
force_push_tag: false
github_token: ${{ secrets.GITHUB_TOKEN }}

- name: Generate Short Tag
id: short_tag
run: |
SHORT_TAG=$(echo "${{ steps.generate_tag.outputs.NEW_TAG }}" | grep -oP '^v\d+')
echo "Short tag: $SHORT_TAG"
echo "SHORT_TAG=$SHORT_TAG" >> $GITHUB_ENV
- name: Force Push Short Tag
uses: rickstaa/action-create-tag@v1
with:
tag: ${{ env.SHORT_TAG }}
force_push_tag: true
github_token: ${{ secrets.GITHUB_TOKEN }}

- uses: actions/download-artifact@9bc31d5ccc31df68ecc42ccf4149144866c47d8a # ratchet:actions/download-artifact@v3.0.2
id: download-artifact
with:
name: ${{ env.REGO_ARTIFACT_KEY_NAME }}
path: ${{ env.REGO_ARTIFACT_PATH }}

- name: Create Release and upload assets
id: create_release_upload_assets
uses: softprops/action-gh-release@de2c0eb89ae2a093876385947365aca7b0e5f844
- name: Create or Update Release and Upload Assets
uses: softprops/action-gh-release@v2
with:
token: ${{ secrets.GH_PERSONAL_ACCESS_TOKEN }}
name: Release ${{ needs.build-and-rego-test.outputs.NEW_TAG }}
tag_name: ${{ needs.build-and-rego-test.outputs.NEW_TAG }}
body: ${{ github.event.pull_request.body }}
token: ${{ secrets.GITHUB_TOKEN }}
tag_name: ${{ env.SHORT_TAG }}
name: ${{ env.SHORT_TAG }}
body: "Automated release for ${{ env.SHORT_TAG}}"
files: ${{ env.REGO_ARTIFACT_PATH }}/*
draft: false
fail_on_unmatched_files: true
prerelease: false
files: '${{ env.REGO_ARTIFACT_PATH }}/*'
make_latest: "false"

# Update regolibrary documentation with latest controls and rules.
update-documentation:
needs: [release]
needs: [create-new-tag-and-release]
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # ratchet:actions/checkout@v3.5.2
Expand Down
9 changes: 7 additions & 2 deletions .github/workflows/pr-tests.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ jobs:
pull-requests: write
uses: kubescape/workflows/.github/workflows/go-basic-tests.yaml@main
with:
GO_VERSION: '1.20'
GO_VERSION: '1.21'
BUILD_PATH: github.com/kubescape/regolibrary/gitregostore/...
secrets: inherit

Expand All @@ -47,7 +47,7 @@ jobs:
- name: Set up Go
uses: actions/setup-go@v4
with:
go-version: '1.20'
go-version: '1.21'

# testing rego library
- name: Test Regoes
Expand All @@ -74,6 +74,11 @@ jobs:
uses: actions/setup-python@v4
with:
python-version: 3.10.6
- name: Install dependencies
run: |
python -m pip install --upgrade pip
pip install requests
# validate control-ID duplications
- run: python ./scripts/validations.py
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/push-releasedev-updates.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ on:
branches: [master]

env:
GH_ACCESS_TOKEN: ${{ secrets.GH_PERSONAL_ACCESS_TOKEN }}
GH_ACCESS_TOKEN: ${{ secrets.ARMOSEC_ACCESS_KEY }}

jobs:
build:
Expand All @@ -19,7 +19,7 @@ jobs:

- run: git config --global url.https://${{ env.GH_ACCESS_TOKEN }}@github.com/armosec/.insteadOf https://github.com/armosec/
- run: git config --global url.https://${{ env.GH_ACCESS_TOKEN }}@github.com/kubescape/.insteadOf https://github.com/kubescape/

- name: Run export script
run: |
OUTPUT=pre-release python ./scripts/export.py
Expand Down
20 changes: 20 additions & 0 deletions attack-tracks/external-wl-unauthenticated.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
{
"apiVersion": "regolibrary.kubescape/v1alpha1",
"kind": "AttackTrack",
"metadata": {
"name": "external-database-without-authentication"
},
"spec": {
"version": "1.0",
"data": {
"name": "Initial Access",
"description": "An attacker can access the Kubernetes environment.",
"subSteps": [
{
"name": "Unauthenticated Access",
"description": "An unauthenticated attacker can access resources."
}
]
}
}
}
Loading

0 comments on commit 59e62b5

Please sign in to comment.