This repository provides a suite of language/framework examples that implement end-to-end software supply chain security (SSCS).
The examples contain an advanced continuous integration pipeline covering building, CVE scanning, security scanning, signatures, attestations, SLSA provenance and SBOM along with Gitops-based continuous deployment.
Software Template authors and IDP builders can take these samples to create their own SSCS based starters.
To import these templates, register a component in on the golden path template page:
Import https://github.com/redhat-appstudio/tssc-sample-templates/blob/main/all.yaml
Add the following to your app-config.yaml
file in your backstage configuration:
- type: url
target: https://github.com/redhat-appstudio/tssc-sample-templates/blob/main/all.yaml
rules:
- allow: [Location, Template]
This will add the samples into a set of backstage templates.
You need to ensure the on-prem host is being configured in app-config.yaml
file in your backstage/RHDH configuration.
properties file holds the default host for GitHub, GitLab and Quay.
Modify the value and run ./generate.sh
will generate new templates with customized default value.
On Application Repository Information
Page, provide your Git host in the Repository Server
Note: Please Ensure the correct Host Type
is selected
On Deployment information
Page, provide your Quay host in the Image Registry
:
The templates are found in ./templates
and reference reusable content in ./skeleton
.
The pipelines are maintained externally to allow standalone use outside of software templates, as well as evolution of the pipelines in one of more software templates.
Due to differences between Linux and MacOS, the GNU version of sed
is required to be installed.
brew install gnu-sed
After this, alter PATH. For example, add the following line to your ~/.bash_profile
:
export PATH="/opt/homebrew/opt/gnu-sed/libexec/gnubin:$PATH"