Skip to content

Conversation

@karlhaworth
Copy link
Contributor

@karlhaworth karlhaworth commented Nov 4, 2024

feat: parent trust policy at org root

ensures that users within an org cannot commit unsafe trust files according to enterprise policies.

Another try at #469.

Similar to org wide trust policies living at https://github.com/chainguard-dev/.github/tree/main/.github/chainguard, this would allow a parent level trust policy at the org root.

https://github.com/TestOrg/.github/blob/master/.github/chainguard/org.sts.yaml

Content of .github/chainguard/org.sts.yaml

issuer: https://token.actions.githubusercontent.com
subject_pattern: repo:TestOrg/.*:ref:refs/.*

Logic could be improved to work without the ORG_TRUST_POLICY env var. I introduced this to force the ORG_TRUST_POLICY behavior.

Simple approach, but happy for feedback either way.

Signed-off-by: Karl Haworth <[email protected]>
Signed-off-by: Karl Haworth <[email protected]>
Signed-off-by: Karl Haworth <[email protected]>
Signed-off-by: Karl Haworth <[email protected]>
Signed-off-by: Karl Haworth <[email protected]>
Signed-off-by: Karl Haworth <[email protected]>
Signed-off-by: Karl Haworth <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants