10 Commits

Author SHA1 Message Date
Gyuho Lee
b6562a24b6 .github: rename "master" branch references to "main"
Signed-off-by: Gyuho Lee <leegyuho@amazon.com>
2021-05-12 10:41:24 -07:00
Marek Siarkowicz
c868bb97a9 github actions: Switch CI to use newest available 1.16 version 2021-05-12 15:25:16 +02:00
Marek Siarkowicz
f908e423bc github actions: Move e2e to separate workflow and remove semaphoreci 2021-05-12 14:17:17 +02:00
Marek Siarkowicz
f48609ae52 github actions: Run e2e tests 2021-05-11 14:20:46 +02:00
Marek Siarkowicz
da33b4034f github actions: Make github actions go1.16.3 tests blocking and remove them from travis
* Leave Go tip tests and coverage in travis as one is not yet supported
2021-05-10 15:19:09 +02:00
Marek Siarkowicz
f1082eec86 Trigger unit test workflow on pull_requests 2021-05-10 09:46:42 +02:00
Gyuho Lee
3a04b2b61f github action: add ARM64 test with README
README for self-hosted-linux-arm64-graviton2-tests.yml

Signed-off-by: Gyuho Lee <leegyuho@amazon.com>
2021-05-10 00:28:41 -07:00
Marek Siarkowicz
e818f21790 Migrate PR testing from travis to GitHub actions 2021-05-06 17:06:57 +02:00
Chris Aniszczyk
c0d44ec4b7
Add CodeQL Security Scanning
Signed-off-by: Chris Aniszczyk <caniszczyk@gmail.com>
2020-12-02 10:37:09 -08:00
Brandon Philips
142358c13d github: workflows: add asset-transparency release action
From etcd-dev discussion:
https://groups.google.com/u/2/g/etcd-dev/c/oMGSBqs_7sc

I have been working on this system called Asset Transparency[1] which
helps users verify they have received the correct contents from a URL.
If you are familiar with the "download a file, download a SHA256SUM
file, run `sha256sum -c`, etc" process? This tool helps to automate
that for users into something like this[2]:

$ tl get https://github.com/etcd-io/etcd/releases/download/v3.4.12/etcd-v3.4.12-darwin-amd64.zip

And a best practice for this Asset Transparency system is that URLs
are registered with the log as soon as possible. Why? Well, the sooner
a URL is entered the longer it can protect people consuming a URL from
unexpected content modification from say a GitHub credential
compromise.

To that end I have written a GitHub Action[3] that will automatically
do that on every release. It is easy to activate and should be hands
free after installation. So, before I enable it I want to see if there
are any concerns from maintainers. The only change to our repo will be
a new file in .github/workflows.

[1] https://www.transparencylog.com
[2] https://github.com/transparencylog/tl
[3] https://github.com/transparencylog/publish-releases-asset-transparency-action
2020-08-20 11:32:36 -07:00