-
Notifications
You must be signed in to change notification settings - Fork 5.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bring CLOMonitor score to 100% #10852
Comments
I've merged the token permissions PR, so hopefully that'll get marked as done soon. We do have SBOMs, and the CLOMonitor page reflects that, so I think we can mark that done. |
Perfect, checked SBOM as done ✅ Regarding the token permissions, I think we're going to have a headache with that... OpenSSF frowns heavily on using github actions that require write permissions. 😓 |
I find that really odd. I'm just trying to think of how folks are expected to automate without having GitHub actions with write permissions. Is there some better way of automating that I'm unaware of? 0_o |
AFAIK the current process is to only approve actions in the github/ library. Discussion on the linked issue seems to be in the direction of allowing any github actions so long as the permissions are assigned on a granular basis (implying user awareness). |
Gotcha. Maybe there are opportunities to use the github/ library which we are currently missing. |
We push seven binaries and two source code archives. I wonder if all nice of those artifacts need to be signed. 0_o I also question the utility of signing those, when the most important artifact is the container image. |
From what I can tell, its just looking for one signature per release https://github.com/ossf/scorecard/blob/main/docs/checks.md#signed-releases |
Looks like flux signs a checksum file which contains checksums for all the artifacts. I like that, nice and compact. https://github.com/fluxcd/flux2/releases |
@crenshaw-dev would you also like me to make all the checksums into one file and have that signed as well? Not sure if folks have built any automation around the way we currently release the checksums. Personally I do like the more compact format. |
@34fathombelow I think that would be great! |
@eddie-knight According to the OpenSFF documentation on token permissions for We also have all top level permissions set to read-only. I feel that we have meet all the required criteria for token permissions. |
There is an issue open to improve the check, but the expected behavior currently is to just use permissions:write on a job if it uses an action published by github. The release workflow in this repo has permissions:write on a job that uses a third party action, causing the check to fail 😓 |
Mentioned this on slack, but dropping it here also for reference. The OpenSSF Scorecard issue is being actioned to resolve the Token-Permissions issue with limited disruption to existing workflows. |
The only thing pending on this checklist is the License Scanner. Not a security issue, but it'll be good to have regardless. FOSSA will likely be the best tool to implement for this. |
@eddie-knight I just requested Argoproj access from FOSSA. |
Gonna close out this issue as all the checks from last year were completed. All non-security checks are still 100%. I would propose improvements to those be opened in new issues for better history etc (e.g. totally new thread) |
Per discussion in slack, this issue is to track the efforts necessary to bring argo-cd CLOMonitor score to 100%
Updating to use the new auto-generated CLOMonitor checklist:
CLOMonitor report
Summary
Repository: argo-cd
URL: https://github.com/argoproj/argo-cd
Checks sets:
CODE
Score: 88
Checks passed per category
Checks
Documentation [100%]
License [75%]
Best Practices [100%]
EXEMPT
Security [80%]
For more information about the checks sets available and how each of the checks work, please see the CLOMonitor's documentation.
The text was updated successfully, but these errors were encountered: