Skip to content

chore: update AMPEL policy and schedule compliance checks#98

Draft
marcusburghardt wants to merge 2 commits intocomplytime:mainfrom
marcusburghardt:update_ampel
Draft

chore: update AMPEL policy and schedule compliance checks#98
marcusburghardt wants to merge 2 commits intocomplytime:mainfrom
marcusburghardt:update_ampel

Conversation

@marcusburghardt
Copy link
Copy Markdown
Contributor

Summary

Reviewed and updated Ampel policy for branch protection rules.
This PR also enables a scheduled job to check the branch protection rules and save the results as attestation artifact.

Related Issues

  • Brings visibility and traceability for branch protection rules.

Review Hints

actions: read
id-token: write
attestations: write
uses: complytime/org-infra/.github/workflows/reusable_compliance.yml@main

Check warning

Code scanning / Scorecard

Pinned-Dependencies Medium

score is 6: third-party GitHubAction not pinned by hash
Click Remediation section below to solve this issue
@marcusburghardt marcusburghardt changed the title Update AMPEL policy and schedule compliance checks chore: update AMPEL policy and schedule compliance checks Feb 13, 2026
Signed-off-by: Marcus Burghardt <maburgha@redhat.com>
Signed-off-by: Marcus Burghardt <maburgha@redhat.com>
@marcusburghardt
Copy link
Copy Markdown
Contributor Author

Rebased.

"controls": [ { "framework": "MYORG", "class": "ORG", "id": "02" } ]
"description": "Validate admin bypass prevention is enabled via GitHub API or GitLab API",
"controls": [
{ "framework": "SC", "class": "SC-CODE", "id": "03" },
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@marcusburghardt Should the SC-CODE be "04" instead?

"guidance": "Create a branch ruleset protecting your default branch and enable \"Require signed commits\""
"message": "Force pushes can be sent to main branch",
"guidance": "Create a branch ruleset protecting your default branch and enable \"Block force pushes\""
}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@marcusburghardt The tenets messages are same for both "SC-CODE-03.01" and "SC-CODE-04.01".

"meta": {
"description": "Require signed commits before merging",
"controls": [ { "framework": "MYORG", "class": "ORG", "id": "02" } ]
"description": "Validate admin bypass prevention is enabled via GitHub API or GitLab API",
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@marcusburghardt My question is do we need "SC-CODE-04.01"? To properly support SC-CODE-04.01, we would need to contribute a new spec with "rulesets" to snappy. The data needed for admin bypass validation (bypass_actors, enforcement) as per Github API.

Copy link
Copy Markdown
Contributor

@sonupreetam sonupreetam left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@marcusburghardt I have added few comments to the branch protection rules.

name: Compliance Evaluation
permissions:
contents: read
actions: read
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@marcusburghardt The "actions: read" not required by the reusable_compliance workflow, may be we dont need it.

@marcusburghardt marcusburghardt marked this pull request as draft March 2, 2026 14:34
@marcusburghardt
Copy link
Copy Markdown
Contributor Author

After working on complytime/complyctl#380 I noticed upcoming changes for this PR, so it is no longer time-sensitive. Therefore I am moving it to draft until other related activities are progressing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants