Configuring your GitHub repository
The Git Repos and Issue Tracking tool integration is based on Github, which is a web-based hosting service for Git repositories (repos). You can have both local and remote copies of your repos. To learn more, see Git Repos and Issue Tracking{: external}.
Branch protection policies enforce security, collaboration, and helps ensure that your team adheres to code quality and change management standards. This topic helps you set and manage branch policies. DevSecOps requires you to configure the branch protection rules of your GitHub repository.
Benefits of Branch Protection
-
Improved Code Quality and Collaboration: Requiring pull requests and approvals through branch protection enhances code quality and collaboration. This ensures code consistency and adherence to the team's coding standards. Changes undergo review and helps catch bugs and errors early on, resulting in more reliable and maintainable code.
-
Increased Visibility of Changes: Requiring pull requests provides increased visibility into code changes. This step simplifies tracking modifications and identifying potential issues.
-
Ensuring Code Integrity: Pull request status-checks validate the code by running automated tests against predefined standards and linters before a pull request can be merged. This step maintains code integrity by catching bugs and other issues early in the development cycle.
Configuring Branch Protection Rules in GitHub
To configure branch protection rules in GitHub for your repository, follow these steps:
Accessing Branch Protection Settings
- Navigate to the Settings tab of your repository on GitHub.
- In the left sidebar, click Branches to access the branch settings page.
- Scroll down to the Branch protection rules section.
- Locate the branch that you want to configure (typically the "main" branch).
- Select the Edit button next to the branch name to modify its protection rules.
Adding Branch Protection Rules
If no existing rules are set up, click on the Add rule button and enter the corresponding branch name in the **Branch name pattern**
field. Then, proceed with the following steps:
- Enable the Require a pull request before merging option.
- Enable the Require approvals option and set the Required number of approvals before merging set to atleast
1
or the number of required approvals in your team. - Enable the option Dismiss stale pull request approvals when new commits are pushed to review all the latest changes before it can be merged onto another branch.
Pull Requests must be approved before merging them into the master branch. This rule ensures that changes undergo review and scrutiny by team members, promotes collaboration, code quality, and adherence to project standards.
Configuring Status Checks
Status checks are required in DevSecOps to enforce a comprehensive set of quality and security measures on the code. This ensures that code changes are safe and reliable before they are merged into a protected branch. By requiring status checks to pass before merging, you can prevent broken or untested code from being deployed to production.
When a pull request is submitted, the PR/CI pipeline automatically triggers a series of tests, validations, and other checks to verify the proposed changes.
Only when all the required status checks pass successfully will the pull request be considered eligible for merging into the protected branch.
By leveraging status checks within DevSecOps, you can maintain code quality, adhere to coding standards, and ensure the absence of vulnerabilities or critical flaws before incorporating changes into your project's protected branch.
For more information on configuring status checks, refer to the Configuring Status Checks Only (Status Checks Configuration) section for a reference implementation.
- Enable the
Require status checks to pass before merging
option.
In order to be able to set them as required status checks, first you need to trigger a PR/CI pipeline beforehand (only existing status checks are listed on the UI).
After enabling the Require status checks to pass before merging
option, you need to configure the specific status checks that must pass before merging a pull request.
- In the list of available status checks, enable the following options for checks:
tekton/code-branch-protection
tekton/code-cis-check
tekton/code-detect-secrets
tekton/code-unit-tests
tekton/code-vulnerability-scan
The status checks shown must pass before merging a pull request.
The above checks are the default expected pull request status checks in pipeline.
Setting customized list of compliance checks
You may also bring in your own list of status checks to be validated against by the pipeline. To achieve this, first set your list of required status checks in the repo, and also set the branch-protection-rules-path
value setting
it's path to a JSON file containing the same list status checks, that is relative to your app repository.
|branch-protection-rules-path
|text |Set the path to a JSON file containing the customized list of the required compliance checks, relative to the integrated app repository. |Optional |
The JSON file is of this format
[{
"type": "branch-protection",
"name": "code-review",
"params": {
"checks": [
"tekton/code-branch-protection",
"tekton/code-unit-tests",
"tekton/code-cis-check",
"tekton/code-vulnerability-scan",
"tekton/code-detect-secrets"
]
}
}]
Note : DevSecOps by default will base the outcome of branch protection checks depending on the results of status checks that have the tekton/
prefix.
Setting Customized Prefix for Compliance Checks
If you wish to change the tekton
prefix to something else in GitHub, you should set a value for branch-protection-status-check-prefix
environment property in your pipeline.
|branch-protection-status-check-prefix
|text |The prefix text for branch protection status check (Defaults to tekton
) |Optional |
Once you have configured branch protection settings, any attempt to merge a pull request to the protected branch will be rejected unless the required conditions are met.
Optional Settings
In addition to the above settings, you have the option to configure the following additional settings for branch protection rules. Please note that the status checks provided by DevSecOps will not validate or enforce these settings.
-
Require signed commits: This setting requires that all commits to the protected branch be signed, preventing malicious changes from being made to the code.
-
Require linear history: This setting requires that all commits to the protected branch have a linear history. This means that any pull requests merged into the protected branch must use a squash merge or a rebase merge. A strictly linear commit history can help teams reverse changes more easily.
These additional settings are optional and can be customized based on your specific requirements and preferences.
Setting Branch Protection Rules via CURL Command
Adding All Branch Protection Rules (Complete Configuration)
Branch protection rules could also be set by the following curl command, after replacing the $GH_TOKEN
, $OWNER
, $APP_API_URL
$REPO
, $BRANCH
variables.
curl -u ":$GH_TOKEN" $APP_API_URL/repos/$OWNER/$REPO/branches/$BRANCH/protection -XPUT -d '{"required_pull_request_reviews":{"dismiss_stale_reviews":true},"required_status_checks":{"strict":true,"contexts":["tekton/code-branch-protection","tekton/code-unit-tests","tekton/code-cis-check","tekton/code-vulnerability-scan","tekton/code-detect-secrets"]},"enforce_admins":null,"restrictions":null}'
This CURL command sets up both the required status checks and pull request review settings.
Once these settings have been configured, any attempt to merge a pull request to the $BRANCH
will be rejected unless the pull request has been approved by at least one other user.
Configuring Status Checks Only (Status Checks Configuration)
If you only want to configure the required status checks, you can use the following CURL command as a reference:
curl -H "Authorization: Bearer $(cat ${APP_TOKEN_PATH})" "${APP_API_URL}/repos/${APP_REPO_OWNER}/${APP_REPO_NAME}/branches/master/protection" \
-XPUT -d '{"required_pull_request_reviews":{"dismiss_stale_reviews":true},"required_status_checks":{"strict":true,"contexts":["tekton/code-branch-protection","tekton/code-unit-tests","tekton/code-cis-check","tekton/code-vulnerability-scan","tekton/code-detect-secrets"]},"enforce_admins":null,"restrictions":null}'
In our reference implementation, we have already provided a sample configuration for the hello-compliance-app repository, so you can use it as a starting point and customize it according to your needs.
Follow the earlier example to ensure code quality and adherence to security measures for your repository. To ensure this happens, configure the necessary branch protection rules and status checks.