Skip to content

Pre-Release Testing 0.6.0#2

Open
jamie-steele wants to merge 267 commits intostagingfrom
js/dev
Open

Pre-Release Testing 0.6.0#2
jamie-steele wants to merge 267 commits intostagingfrom
js/dev

Conversation

@jamie-steele
Copy link
Copy Markdown
Owner

No description provided.

@github-advanced-security
Copy link
Copy Markdown

You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool.

What Enabling Code Scanning Means:

  • The 'Security' tab will display more code scanning analysis results (e.g., for the default branch).
  • Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results.
  • You will be able to see the analysis results for the pull request's branch on this overview once the scans have completed and the checks have passed.

For more information about GitHub Code Scanning, check out the documentation.

Jamie Steele added 30 commits April 23, 2026 09:16
- Added `security` field to workflow YAML to define container security policies, including network, filesystem, and process settings.
- Updated onboarding and package model documentation to reflect new security policy structure.
- Modified runtime artifact compilation to incorporate security profiles and sources.
- Enhanced validation logic to reject unknown security profiles and enforce rules for allowlist and offline modes.
- Updated tests to cover new security policy features and ensure correct behavior.
…handling

- Refactor `writeCompiledWorkflowRuntimeArtifacts` to include step artifacts and handle their writing.
- Introduce `compiledStepRuntimeArtifacts` type to manage step-specific runtime artifacts.
- Update `compileWorkflowRuntimeArtifacts` to return step artifacts alongside the main runtime manifest and image artifact.
- Implement `compileStepRuntimeArtifacts` and `compileStepRuntimeManifest` for detailed step-level artifact compilation.
- Modify `maybeSkipDockerBuildForStep` and related functions to accommodate step-specific policy fingerprints.
- Add functions to load compiled runtime and image artifacts for individual steps.
- Enhance proxy policy handling in `applyCompiledProxyNetworkPolicy` to include tokenized proxy URLs.
- Introduce a new policy proxy server script to enforce network policies based on compiled proxy configurations.
- Update tests to reflect changes in function signatures and ensure proper handling of step artifacts and proxy policies.
- Introduced `image` field in package metadata to specify OCI image references.
- Updated compilation process to handle image metadata and integrate it into runtime manifests.
- Implemented logic to pull images based on defined pull policies.
- Enhanced validation for image metadata in package manifests.
- Added tests to ensure correct handling of image references and pulling behavior.
…st fingerprint and enhancing image selection logic
- Updated documentation to reflect the new package layout under 'bin/.dockpipe/internal/' instead of '.dockpipe/internal/'.
- Modified code in various files to ensure paths point to the new directory structure for compiled packages, workflows, and internal state.
- Adjusted tests to verify that the new directory structure is correctly utilized in the application.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants