Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
44 changes: 44 additions & 0 deletions .github/dependabot.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
version: 2
updates:
- package-ecosystem: github-actions
commit-message:
prefix: chore
include: scope
directory: /
schedule:
interval: monthly
groups:
github-actions:
patterns:
- "*"
update-types:
- "minor"
- "patch"
- package-ecosystem: docker
commit-message:
prefix: chore
include: scope
directory: /
schedule:
interval: monthly
groups:
docker:
patterns:
- "*"
update-types:
- "minor"
- "patch"
- package-ecosystem: npm
commit-message:
prefix: chore
include: scope
directory: /
schedule:
interval: monthly
groups:
npm:
patterns:
- "*"
update-types:
- "minor"
- "patch"
24 changes: 24 additions & 0 deletions .github/dependency-review-config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
# https://github.com/cncf/foundation/blob/main/policies-guidance/allowed-third-party-license-policy.md
allow-licenses:
# default allowed
- 'Apache-2.0'
# explicit CNCF allowlist
- '0BSD'
- 'BSD-2-Clause'
- 'BSD-2-Clause-FreeBSD'
- 'BSD-3-Clause'
- 'ISC'
- 'MIT'
- 'MIT-0'
- 'OpenSSL'
- 'OpenSSL-standalone'
- 'PSF-2.0'
- 'PostgreSQL'
- 'Python-2.0'
- 'Python-2.0.1'
- 'SSLeay-standalone'
- 'UPL-1.0'
- 'X11'
- 'Zlib'
# Google's patent licence for Go
- 'LicenseRef-scancode-google-patent-license-golang'
19 changes: 19 additions & 0 deletions .github/workflows/dependency-review.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
name: dependency review
on:
pull_request:
branches:
- main
merge_group:
types:
- checks_requested
permissions: {}
jobs:
dependency-review:
permissions:
contents: read
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
- uses: actions/dependency-review-action@3c4e3dcb1aa7874d2c16be7d79418e9b7efd6261 # v4.8.2
with:
config-file: .github/dependency-review-config.yaml
10 changes: 10 additions & 0 deletions .github/workflows/docker-image.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -94,6 +94,7 @@ jobs:
-
name: Build and push
uses: docker/build-push-action@v5
id: build-and-push
with:
context: .
platforms: linux/amd64,linux/arm64
Expand All @@ -104,3 +105,12 @@ jobs:
push: true
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
sbom: true
-
name: Attest tagged ghcr images
uses: actions/attest-build-provenance@00014ed6ed5efc5b1ab7f7f34a39eb55d41aa4f8 # v3.1.0
if: github.ref_type == 'tag'
with:
subject-digest: ${{ steps.build-and-push.outputs.digest }}
subject-name: ghcr.io/${{ github.repository_owner }}/ui
push-to-registry: true
10 changes: 10 additions & 0 deletions .github/workflows/lagoon-core-docker-image.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,7 @@ jobs:
-
name: Build and push
uses: docker/build-push-action@v5
id: build-and-push
with:
context: .
platforms: linux/amd64,linux/arm64
Expand All @@ -72,3 +73,12 @@ jobs:
push: true
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
sbom: true
-
name: Attest tagged ghcr images
uses: actions/attest-build-provenance@00014ed6ed5efc5b1ab7f7f34a39eb55d41aa4f8 # v3.1.0
if: github.ref_type == 'tag'
with:
subject-digest: ${{ steps.build-and-push.outputs.digest }}
subject-name: ghcr.io/${{ github.repository_owner }}/ui
push-to-registry: true
31 changes: 31 additions & 0 deletions .github/workflows/ossf-analysis.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
name: OSSF scorecard
on:
push:
branches:
- main
permissions: {}
jobs:
ossf-scorecard-analysis:
runs-on: ubuntu-latest
permissions:
contents: read
# Needed if using Code scanning alerts
security-events: write
# Needed for GitHub OIDC token if publish_results is true
id-token: write
steps:
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
- name: Run analysis
uses: ossf/scorecard-action@4eaacf0543bb3f2c246792bd56e8cdeffafb205a # v2.4.3
with:
results_file: results.sarif
results_format: sarif
# Publish the results for public repositories to enable scorecard badges. For more details, see
# https://github.com/ossf/scorecard-action#publishing-results.
# For private repositories, `publish_results` will automatically be set to `false`, regardless
# of the value entered here.
publish_results: true
- name: Upload SARIF results to code scanning
uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5
with:
sarif_file: results.sarif
3 changes: 3 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,8 @@
## Lagoon UI

[![OpenSSF Best Practices](https://www.bestpractices.dev/projects/11770/badge)](https://www.bestpractices.dev/projects/11770)
[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/uselagoon/lagoon-ui/badge)](https://securityscorecards.dev/viewer/?uri=github.com/uselagoon/lagoon-ui)

The main user interface and dashboard for [Lagoon](https://github.com/uselagoon/lagoon).

## Build
Expand Down
Loading