-
Notifications
You must be signed in to change notification settings - Fork 58
Release Chef Integration v1.0.0 #877
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
stas-schaller
wants to merge
30
commits into
master
Choose a base branch
from
release/integration/chef/v1.0.0
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Adding Keeper-Chef Integration
Added ruby to resuable sbom, updated secrets, updated knife commands …
We're phasing out reliance on the sbom so this is a commit that should be squashed
Adds Keeper Secrets Manager Chef integration with cookbook, resources, recipes, and tests. Resolved conflicts: - .github/workflows/reusable.sbom.workflow.yml: Kept production version
integration/keeper_secrets_manager_chef/cookbooks/keeper_secrets_manager/files/default/ksm.py
Dismissed
Show dismissed
Hide dismissed
integration/keeper_secrets_manager_chef/cookbooks/keeper_secrets_manager/files/default/ksm.py
Dismissed
Show dismissed
Hide dismissed
|
Review the following changes in direct dependencies. Learn more about Socket for GitHub.
|
… workflow - Remove dependency on reusable.sbom.workflow.yml - Add inline SBOM generation using Syft v1.18.1 and Manifest CLI v0.18.3 - Add build-only mode with publish input (default: true) - When publish=false, runs tests and SBOM generation without publishing - Matches pattern used in Ruby SDK and .NET workflows
Configure knife with credentials from KSM vault: - Retrieve Chef username from login field - Download client key file (keepersecurity.pem) as attachment - Retrieve Chef server URL from custom field - Create ~/.chef/config.rb with authentication details - Set secure permissions (600) on private key file KSM record contains: - login: Hosted Chef username (keepersecurity) - file attachment: keepersecurity.pem (RSA private key) - custom_field/server_url: Chef server URL Tested locally with keeper CLI - all secrets retrieve correctly.
…0, 151)
Add permissions: {contents: read} to all workflow jobs:
- get-version job (alert 113)
- generate-sbom job (alert 150)
- publish-chef-supermarket job (alert 151)
Follows GitHub Actions security best practice for principle of least privilege.
Alert #116 audit: All log_message() calls audited - no secret values logged.
Alert #117: Dismissed (intentional functionality for secret injection).
Remove Ruby-specific additions to reusable.sbom.workflow.yml: - Remove Ruby from project-type description - Remove Ruby setup step - Remove detect_ruby_version() function - Remove Ruby case from version detection Chef integration now uses inline SBOM scanning instead of reusable workflow. Reverts to master's version of this file.
Update version in: - metadata.rb: 0.1.0 -> 1.0.0 - CHANGELOG.md: 0.1.0 -> 1.0.0 - README.md: Badge and footer (0.1.0 -> 1.0.0) Add to metadata.rb: - issues_url: Link to GitHub issues - source_url: Link to source code in monorepo
…on-windows Fix chef cookbook execution on windows
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
This PR adds the Keeper Secrets Manager Chef Integration v1.0.0 to the monorepo, enabling Chef Infra users to securely manage and inject secrets into their infrastructure automation workflows.
What is Chef Infra?
Chef Infra is a powerful automation platform that transforms infrastructure into code. This integration allows Chef-managed nodes to retrieve secrets from Keeper Secrets Manager during Chef runs, eliminating hardcoded credentials and improving security posture.
Integration Components
Chef Cookbook
Location:
integration/keeper_secrets_manager_chef/cookbooks/keeper_secrets_manager/Version: 1.0.0
License: Apache-2.0
Chef Version: >= 16.0
Custom Resources
ksm_install- Installs Keeper Secrets Manager componentspython_sdk,cli_tool,user_install,base_dirksm_fetch- Retrieves secrets from Keeper vaultinput_path,timeout,deploy_pathRecipes
default- Empty entry point recipeinstall- Installs KSM with default settingsfetch- Demonstrates secret retrievalHelper Script
ksm.py- Python wrapper for KSM SDKTesting Suite
Unit Tests (RSpec)
Integration Tests (Test Kitchen + InSpec)
Python Tests (pytest)
Test Script:
run_all_tests.sh- Runs all test suitesPublishing Workflow
File:
.github/workflows/publish.chefsupermaket.ymlFeatures
workflow_dispatchwith publish inputpublish=falseto test without publishingWorkflow Jobs
1. get-version
metadata.rbcontents: read2. generate-sbom
contents: read3. publish-chef-supermarket (conditional on
publish=true)contents: readprodAuthentication Setup
The workflow uses KSM to retrieve Hosted Chef credentials:
KSM Record (UID:
b9vSxs5Dn-yJTPYr7Yvfmg):keepersecurity.pem(Chef client private key)server_url: Chef server URL (e.g.,https://api.chef.io/organizations/keeper)The workflow creates
~/.chef/config.rbwith knife authentication and secures the private key withchmod 600.SBOM Configuration
Usage Example
Documentation
integration/keeper_secrets_manager_chef/cookbooks/keeper_secrets_manager/README.mdintegration/keeper_secrets_manager_chef/cookbooks/README.mdintegration/keeper_secrets_manager_chef/cookbooks/keeper_secrets_manager/CHANGELOG.md