DevSecOps for Air Gap & Limited-Connection Systems. https://zarf.dev/
-
Updated
Jul 25, 2024 - Go
DevSecOps for Air Gap & Limited-Connection Systems. https://zarf.dev/
An admission controller that integrates Container Image Signature Verification into a Kubernetes cluster
Compage - Low-Code Framework to develop Rest API, gRPC, dRPC, GraphQL, WebAssembly, microservices, FaaS, Temporal workloads, IoT and edge services, K8s controllers, K8s CRDs, K8s custom APIs, K8s Operators, K8s hooks, etc. with minimal coding and by automatically applying best practice methods like software supply chain security measures, SBOM, …
This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)
Example goreleaser + github actions config with keyless signing and SBOM generation
Remove all the resources from an AWS account
Integrates Spiffe and Vault to have secretless authentication
Sign your artifacts, source code or container images using Sigstore tools, Save the Signatures you want to use, and Validate & Control the deployments to allow only the known Sources based on Signatures, Maintainers & other payloads automatically.
Demo to showcase how to build a golang application using ko. Sign and push the image to the container registry using https://sigstore.dev. Apply policy controller on Kubernetes to allow only signed images.
Kubernetes admission webhook that uses cosign tools Container Sign Verify
Stream, Mutate and Sign Images with AWS Lambda and ECR
Kubernetes Validation Admission Controller to verify Cosign signatures
Sample Go application project with supply chain security workflows conforms to the SLSA Build Level 3 specification
(landing area for upstream contributions and carried patches)
A demonstration of how GoReleaser can help us to make software supply chain more secure by using bunch of tools such as cosign, syft, grype, slsa-provenance
Example of GitHub Actions, goreleaser and cosign to release a Go based CLI program.
Add a description, image, and links to the cosign topic page so that developers can more easily learn about it.
To associate your repository with the cosign topic, visit your repo's landing page and select "manage topics."