-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhance artifact pull and push commands #112
Conversation
…oci://' prefix - Users can now pass Registry Tokens as credential while using pull/push commands. - OCI URLs need to provided prefixed with 'oci://' to differenciate between HTTP and OCI operations. - Implementation of exponential retry logic while pulling and pushing from registries. - Update OCI urls for pulling deault policies for Rego validation. Signed-off-by: Santosh <ksantosh@intelops.dev>
Signed-off-by: Santosh <ksantosh@intelops.dev>
…tries Signed-off-by: Santosh <ksantosh@intelops.dev>
Signed-off-by: santoshkal <ksantosh@intelops.dev>
Signed-off-by: santoshkal <ksantosh@intelops.dev>
Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.
Note 🟢 Risk threshold not exceeded. Change Summary (click to expand)The following is a summary of changes in this pull request made by me, your security buddy 🤖. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. Summary: The changes in this pull request focus on enhancing the security and functionality of the Genval application, a configuration management tool for generating and validating Infrastructure as Code (IaC) files. The key improvements include:
Overall, these changes demonstrate a strong focus on improving the security and reliability of the Genval application, which is crucial for managing the security of infrastructure-as-code deployments. Files Changed:
Powered by DryRun Security |
Signed-off-by: santoshkal <ksantosh@intelops.dev>
Signed-off-by: santoshkal <ksantosh@intelops.dev>
…istries for dockerfile command Signed-off-by: santoshkal <ksantosh@intelops.dev>
…olicies from OCI registries for all Rego commands Signed-off-by: santoshkal <ksantosh@intelops.dev>
- Move out auth related logic to its own GetCreds(). - Now, users can pass creds through --credentials flag - accepts auth in <$USER:$PAT> or <$TOKEN> format - If none provided falls back to /home/santosh/.docker/config.json - Updated examples for all commands for using default policies and policies from OCI registries Signed-off-by: santoshkal <ksantosh@intelops.dev>
…v file This behaviour is for testing the commands and would be updated to read the URLs for all commands from a .env file stored in a repo Signed-off-by: santoshkal <ksantosh@intelops.dev>
…rregistry Signed-off-by: santoshkal <ksantosh@intelops.dev>
… and policies from OCI registries Signed-off-by: santoshkal <ksantosh@intelops.dev>
Signed-off-by: santoshkal <ksantosh@intelops.dev>
Signed-off-by: santoshkal <ksantosh@intelops.dev>
This PR enhances artifact pull and push commands by implementing an incremental retry in case of failures while pulling and pushing artifacts. Additionally, references to OCI registries must now be prefixed with
oci://
to differentiate between HTTP and OCI operations.Moreover, users can provide rego policies packaged and stored in an OCI-compatible registry.
Dockerfile policies from OCI registry:
Infrafile policies from registries:
Generating Dockerfiles and validating with policies stored in OCI registries:
Closes: #96 #103