Skip to content

skygenesisenterprise/enterprise-action

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

15 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

πŸ›‘οΈ Sky Genesis Enterprise CI

License GitHub release GitHub marketplace Go Docker

πŸ”₯ Enterprise-Grade GitHub CI Orchestrator - Security, Governance & DevOps Standardization

A comprehensive CI/CD orchestrator written in Go that enforces enterprise standards while maintaining flexibility for diverse development workflows. Built with security-first principles and complete compliance reporting.

πŸš€ Quick Start β€’ πŸ“‹ Current Status β€’ πŸ› οΈ Tech Stack β€’ πŸ“ Architecture β€’ 🀝 Contributing

GitHub stars GitHub forks GitHub issues


🌟 What is Sky Genesis Enterprise CI?

Sky Genesis Enterprise CI is a comprehensive GitHub Action written in Go that provides enterprise-grade CI/CD pipeline orchestration with built-in security scanning, governance enforcement, and compliance reporting. Designed for professional teams and enterprises that need standardized, secure, and auditable CI/CD processes.

🎯 Our Vision

  • Security-First Design - Built-in vulnerability scanning and secret detection
  • Governance Enforcement - Automated policy compliance and standards enforcement
  • Language-Aware CI - Intelligent pipeline adaptation for different programming languages
  • Enterprise Reporting - Comprehensive compliance reports with SARIF integration
  • Minimal Permissions - Principle of least privilege with transparent operations
  • Marketplace Ready - GitHub Marketplace compatible with enterprise standards

πŸ“‹ Current Status

βœ… Production Ready: Complete Go implementation with security scanning, governance checks, and compliance reporting.

βœ… Currently Implemented

  • Complete Go Application - Enterprise CI binary with modular architecture
  • Security Module - Dependency vulnerability scanning with govulncheck, npm audit, safety, pip-audit
  • Secret Detection System - Advanced pattern matching for API keys, tokens, credentials
  • Governance Enforcement - Branch naming, commit format, version compliance checks
  • Language-Aware CI - Go, JavaScript/TypeScript, Python, Java, C#, Ruby support
  • Compliance Reporting - JSON reports, SARIF security reports, human-readable summaries
  • Enterprise Configuration - Comprehensive .enterprise-ci.yml with environment overrides
  • GitHub Integration - SARIF uploads, artifacts export, status checks
  • Docker Support - Multi-stage Dockerfile for containerized deployment
  • Docker Package Management - Automated Docker image building and publishing
  • Modular Architecture - Clean separation with orchestrator, security, governance, compliance modules

πŸ”„ Advanced Features

  • Multi-Language Support - Auto-detection and language-specific tool integration
  • Enterprise Policies - Configurable strict/relaxed modes with customizable thresholds
  • Security Scoring - Comprehensive scoring system with critical issue tracking
  • Governance Scoring - Policy compliance metrics with detailed violation reporting
  • Performance Optimization - Parallel execution, caching, timeout management
  • Debug Capabilities - Comprehensive logging and troubleshooting features
  • Docker Multi-Platform Support - Build for linux/amd64 and linux/arm64

πŸ“‹ Integration Ready

  • GitHub Security Tab - SARIF report integration
  • GitHub Advanced Security - Enterprise security features
  • CI/CD Pipelines - Seamless integration with existing workflows
  • Enterprise Monitoring - Audit trails and compliance documentation
  • Multi-Environment Support - Development, staging, production configurations
  • Container Registry Integration - Automated Docker image publishing

πŸš€ Quick Start

πŸ“‹ Prerequisites

  • GitHub Repository - Public or private repository
  • GitHub Actions - Enabled for your repository
  • Basic CI/CD Knowledge - Understanding of workflows and pipelines

πŸ”§ Installation & Setup

  1. Add to your workflow
name: Sky Genesis Enterprise CI
on: [push, pull_request]

jobs:
  enterprise-ci:
    runs-on: ubuntu-latest
    permissions:
      contents: read
      security-events: write
      pull-requests: write
    steps:
      - uses: actions/checkout@v4
      
      - name: Run Sky Genesis Enterprise CI
        uses: skygenesisenterprise/enterprise-action@v1
        with:
          mode: strict
          security-scan: true
          governance-checks: true
  1. Create configuration file
# .enterprise-ci.yml
mode: strict
language: auto

security:
  enabled: true
  secret_scan: true
  fail_on_critical: true

governance:
  enabled: true
  branch_policies:
    allowed_patterns:
      - "main"
      - "feature/.*"
      - "hotfix/.*"
  commit_policies:
    allowed_patterns:
      - "^(feat|fix|docs|style|refactor|test|chore)(\\(.+\\))?: .+"

compliance:
  reports: true
  export_artifacts: true
  thresholds:
    min_security_score: 80
    min_governance_score: 80
  1. Run your first pipeline

Commit and push to see Sky Genesis Enterprise CI in action!

🌐 Access Points

Once running, you can access:

  • Pipeline Results: GitHub Actions workflow logs
  • Security Reports: GitHub Security tab (SARIF integration)
  • Compliance Artifacts: GitHub Actions artifacts download
  • Status Checks: Pull request and commit status checks
  • Docker Images: Container registry (if Docker publishing enabled)

🎯 Essential Configuration Options

# Basic security focus
- name: Security Scan
  uses: skygenesisenterprise/enterprise-action@v1
  with:
    mode: strict
    security-scan: true
    secret-scan: true
    governance-checks: false

# Governance focus
- name: Governance Check
  uses: skygenesisenterprise/enterprise-action@v1
  with:
    mode: strict
    security-scan: false
    governance-checks: true

# Full enterprise compliance
- name: Enterprise Compliance
  uses: skygenesisenterprise/enterprise-action@v1
  with:
    mode: strict
    security-scan: true
    governance-checks: true
    compliance-report: true
    artifact-export: true

πŸ› οΈ Tech Stack

🎨 Core Technologies

Sky Genesis Enterprise CI v1.0.0
 β”œβ”€β”€ πŸ”§ Go 1.21+ (Core Implementation)
 β”œβ”€β”€ πŸ“¦ GitHub Action (Distribution)
 β”œβ”€β”€ 🐳 Docker Support (Containerization)
 β”œβ”€β”€ πŸ“¦ Docker Package Management (Multi-platform builds)
 β”œβ”€β”€ πŸ”’ Security Tools Integration
 β”‚   β”œβ”€β”€ govulncheck (Go vulnerabilities)
 β”‚   β”œβ”€β”€ npm audit (Node.js dependencies)
 β”‚   β”œβ”€β”€ safety (Python packages)
 β”‚   └── pip-audit (Python security)
 β”œβ”€β”€ πŸ›οΈ Governance Engine
 β”‚   β”œβ”€β”€ Branch Policy Enforcement
 β”‚   β”œβ”€β”€ Commit Message Validation
 β”‚   β”œβ”€β”€ Semantic Versioning Checks
 β”‚   └── Repository Standards
 β”œβ”€β”€ πŸ“Š Reporting System
 β”‚   β”œβ”€β”€ JSON Compliance Reports
 β”‚   β”œβ”€β”€ SARIF Security Reports
 β”‚   β”œβ”€β”€ Human-Readable Summaries
 β”‚   └── GitHub Artifacts Export
 └── πŸ”§ Configuration Management
      β”œβ”€β”€ YAML Configuration Parser
      β”œβ”€β”€ Environment-Specific Overrides
      └── Default Policy Templates

πŸ—„οΈ Security Integration

Security Scanning Architecture
 β”œβ”€β”€ πŸ“¦ Dependency Vulnerability Scanning
 β”‚   β”œβ”€β”€ Go Modules (govulncheck)
 β”‚   β”œβ”€β”€ npm Packages (npm audit)
 β”‚   β”œβ”€β”€ Python Packages (safety, pip-audit)
 β”‚   β”œβ”€β”€ Java Dependencies (Maven/Gradle)
 β”‚   └── C# Packages (NuGet)
 β”œβ”€β”€ πŸ” Secret Detection
 β”‚   β”œβ”€β”€ API Keys Pattern Matching
 β”‚   β”œβ”€β”€ Token Detection
 β”‚   β”œβ”€β”€ Credential Scanning
 β”‚   └── Custom Pattern Support
 β”œβ”€β”€ πŸ“Š Security Scoring
 β”‚   β”œβ”€β”€ Critical Issue Tracking
 β”‚   β”œβ”€β”€ Vulnerability Classification
 β”‚   β”œβ”€β”€ Risk Assessment
 β”‚   └── Trend Analysis
 └── πŸ›‘οΈ SARIF Integration
      β”œβ”€β”€ GitHub Security Tab
      β”œβ”€β”€ Advanced Security
      β”œβ”€β”€ Third-party Tools
      └── Compliance Reporting

πŸ›οΈ Governance Framework

Governance Enforcement System
 β”œβ”€β”€ 🌿 Branch Naming Policies
 β”‚   β”œβ”€β”€ Pattern Validation
 β”‚   β”œβ”€β”€ Exempt Branches
 β”‚   β”œβ”€β”€ Custom Rules
 β”‚   └── Team Conventions
 β”œβ”€β”€ πŸ“ Commit Message Standards
 β”‚   β”œβ”€β”€ Conventional Commits
 β”‚   β”œβ”€β”€ Custom Patterns
 β”‚   β”œβ”€β”€ Merge Commit Handling
 β”‚   └── Validation Rules
 β”œβ”€β”€ 🏷️ Version Compliance
 β”‚   β”œβ”€β”€ Semantic Versioning
 β”‚   β”œβ”€β”€ Pre-release Support
 β”‚   β”œβ”€β”€ Version File Detection
 β”‚   └── Format Validation
 β”œβ”€β”€ πŸ“ File Policies
 β”‚   β”œβ”€β”€ Prohibited Patterns
 β”‚   β”œβ”€β”€ Size Limits
 β”‚   β”œβ”€β”€ Required Files
 β”‚   └── Language Standards
 └── πŸ“‹ Repository Standards
      β”œβ”€β”€ License Requirements
      β”œβ”€β”€ Documentation Standards
      β”œβ”€β”€ .gitignore Validation
      └── Security Files

🐳 Docker Package Management

Docker Build & Publish System
 β”œβ”€β”€ πŸ—οΈ Multi-Platform Builds
 β”‚   β”œβ”€β”€ linux/amd64 (Intel/AMD)
 β”‚   β”œβ”€β”€ linux/arm64 (ARM64)
 β”‚   └── Platform-specific optimizations
 β”œβ”€β”€ πŸ“¦ Container Registry Integration
 β”‚   β”œβ”€β”€ GitHub Container Registry (ghcr.io)
 β”‚   β”œβ”€β”€ Docker Hub
 β”‚   └── Custom registries
 β”œβ”€β”€ πŸ”’ Security Scanning
 β”‚   β”œβ”€β”€ Trivy vulnerability scanning
 β”‚   β”œβ”€β”€ SARIF report generation
 β”‚   └── GitHub Security integration
 β”œβ”€β”€ 🧹 Resource Management
 β”‚   β”œβ”€β”€ Image cleanup
 β”‚   β”œβ”€β”€ Build cache management
 β”‚   └── Storage optimization
 β”” πŸ“‹ Automated Workflows
      β”œβ”€β”€ Release triggers
      β”œβ”€β”€ Version tagging
      └── Rollback capabilities

πŸ“ Architecture

πŸ—οΈ Go Application Structure

enterprise-action/
β”œβ”€β”€ action.yml                    # GitHub Action metadata
β”œβ”€β”€ Dockerfile                    # Multi-stage Docker build
β”œβ”€β”€ README.md                     # Comprehensive documentation
β”œβ”€β”€ LICENSE                       # MIT license
β”œβ”€β”€ go.mod                        # Go module definition
β”œβ”€β”€ go.sum                        # Go dependencies checksum
β”œβ”€β”€ .enterprise-ci.yml           # Example configuration
β”œβ”€β”€ cmd/                          # Command-line interface
β”‚   └── enterprise-ci/
β”‚       └── main.go              # Main application entry point
β”œβ”€β”€ app/                          # Core application modules
β”‚   β”œβ”€β”€ config/                   # Configuration management
β”‚   β”‚   └── config.go
β”‚   β”œβ”€β”€ core/                     # Core orchestration logic
β”‚   β”‚   └── engine.go
β”‚   β”œβ”€β”€ docker/                   # Docker integration
β”‚   β”‚   └── builder.go           # Docker package management
β”‚   β”œβ”€β”€ logging/                  # Logging system
β”‚   β”‚   └── github.go
β”‚   └── modules/                  # Feature modules
β”‚       β”œβ”€β”€ governance/
β”‚       β”‚   └── module.go
β”‚       β”œβ”€β”€ security/
β”‚       β”‚   └── module.go
β”‚       └── registry.go
β”œβ”€β”€ pkg/                          # Public packages
β”‚   β”œβ”€β”€ interfaces/               # Interface definitions
β”‚   β”‚   └── module.go
β”‚   └── types/                    # Type definitions
β”‚       └── common.go
β”œβ”€β”€ docs/                         # Documentation and guides
β”‚   β”œβ”€β”€ security.md              # Security configuration guide
β”‚   β”œβ”€β”€ governance.md            # Governance configuration guide
β”‚   └── examples/                # Language-specific examples
β”‚       β”œβ”€β”€ go-project.md        # Go project example
β”‚       └── governance.md        # Governance example
β”œβ”€β”€ .github/                      # GitHub-specific files
β”‚   β”œβ”€β”€ ISSUE_TEMPLATE/          # Issue templates
β”‚   β”œβ”€β”€ workflows/               # Development workflows
β”‚   β”‚   └── release.yml          # Release workflow with Docker builds
β”‚   └── PULL_REQUEST_TEMPLATE.md # PR template
└── build-and-push.sh            # Docker build script

πŸ”„ Pipeline Flow Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   GitHub Action β”‚    β”‚   Go Application β”‚    β”‚   Security Scan  β”‚
β”‚   (Entry Point) │◄──►│   (Main Logic)   │◄──►│   (Vulnerabilities)β”‚
β”‚  action.yml      β”‚    β”‚   cmd/main.go    β”‚    β”‚  security/module β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
          β”‚                       β”‚                       β”‚
          β–Ό                       β–Ό                       β–Ό
    Configuration           Language Detection        Secret Detection
    Validation              CI Execution              Score Calculation
          β”‚                       β”‚                       β”‚
          β–Ό                       β–Ό                       β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Governance Checkβ”‚    β”‚   Compliance     β”‚    β”‚   Reports Export β”‚
β”‚ (Policy Enforcement)│◄──►│   (Score Calc)   │◄──►│   (Artifacts)    β”‚
β”‚ governance/module β”‚    β”‚ compliance/moduleβ”‚    β”‚ GitHub Artifacts β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
          β”‚                       β”‚                       β”‚
          β–Ό                       β–Ό                       β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   Docker Build   β”‚    β”‚   Docker Publish  β”‚    β”‚   Security Scan  β”‚
β”‚ (Multi-platform) │◄──►│   (Registry Push)│◄──►│   (Trivy Scan)   β”‚
β”‚ docker/builder   β”‚    β”‚ docker/builder   β”‚    β”‚ docker/builder   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

🎯 Data Flow & Processing

Input Processing
β”œβ”€β”€ πŸ“‹ Configuration Parsing (.enterprise-ci.yml)
β”œβ”€β”€ πŸ” Language Detection (auto or explicit)
β”œβ”€β”€ 🌍 Environment Analysis (GitHub context)
└── βš™οΈ Policy Loading (defaults + overrides)

Security Processing
β”œβ”€β”€ πŸ“¦ Dependency Scanning (language-specific tools)
β”œβ”€β”€ πŸ” Secret Detection (pattern matching)
β”œβ”€β”€ πŸ“Š Vulnerability Classification (critical/high/medium/low)
└── πŸ›‘οΈ Risk Assessment (scoring algorithm)

Governance Processing
β”œβ”€β”€ 🌿 Branch Validation (naming patterns)
β”œβ”€β”€ πŸ“ Commit Validation (message format)
β”œβ”€β”€ 🏷️ Version Validation (semantic versioning)
β”œβ”€β”€ πŸ“ File Validation (policies and requirements)
└── πŸ“‹ Repository Validation (standards compliance)

Docker Processing
β”œβ”€β”€ 🐳 Multi-Platform Build (amd64/arm64)
β”œβ”€β”€ πŸ“¦ Registry Publishing (ghcr.io, Docker Hub)
β”œβ”€β”€ πŸ”’ Image Security Scanning (Trivy)
β”œβ”€β”€ 🧹 Resource Cleanup (cache, old images)
└── πŸ“‹ Automated Release (versioning, tagging)

Compliance Processing
β”œβ”€β”€ πŸ“Š Score Calculation (security + governance)
β”œβ”€β”€ πŸ“„ Report Generation (JSON + SARIF + summary)
β”œβ”€β”€ πŸ“€ Artifact Export (GitHub artifacts)
β”œβ”€β”€ 🐳 Docker Image Export (container registry)
└── πŸ” Status Reporting (GitHub checks)

πŸ—ΊοΈ Development Roadmap

🎯 Phase 1: Foundation (βœ… Complete - v1.0.0)

  • βœ… Go Application Core - Complete pipeline orchestration in Go
  • βœ… Security Module - Dependency scanning and secret detection
  • βœ… Governance Module - Policy enforcement and compliance checks
  • βœ… Compliance Module - Reporting and artifact export
  • βœ… Language Support - Go, JavaScript/TypeScript, Python, Java, C#, Ruby
  • βœ… Configuration System - Comprehensive YAML configuration
  • βœ… GitHub Integration - SARIF uploads and status checks
  • βœ… Docker Support - Multi-stage Dockerfile for containerization
  • βœ… Docker Package Management - Automated multi-platform builds
  • βœ… Documentation - Complete guides and examples

πŸš€ Phase 2: Enhanced Features (v1.1.0 - Q2 2025)

  • πŸ”„ Advanced Security - OWASP dependency check integration
  • πŸ”„ Custom Policies - User-defined governance rules
  • πŸ”„ Performance Optimization - Caching and parallel execution
  • πŸ”„ Extended Language Support - Rust, PHP, Swift, Kotlin
  • πŸ”„ Integration Templates - Pre-built workflow templates
  • πŸ”„ Monitoring Dashboard - Real-time compliance metrics
  • πŸ”„ Enhanced Docker Features - Custom base images, build caching

βš™οΈ Phase 3: Enterprise Features (v1.2.0 - Q3 2025)

  • πŸ“‹ SLA Integration - Service level agreement monitoring
  • πŸ“‹ Multi-Repo Support - Organization-wide governance
  • πŸ“‹ Advanced Reporting - Custom report templates
  • πŸ“‹ API Access - RESTful API for integration
  • πŸ“‹ Webhook Support - Real-time notifications
  • πŸ“‹ Role-Based Access - Team-specific policies
  • πŸ“‹ Container Registry Integration - Multiple registry support

🌟 Phase 4: Cloud Integration (v2.0.0 - Q4 2025)

  • πŸ“‹ Cloud Provider Support - AWS, Azure, GCP integration
  • πŸ“‹ Kubernetes Support - Native K8s deployment
  • πŸ“‹ Enterprise SSO - SAML/OIDC authentication
  • πŸ“‹ Compliance Frameworks - SOC 2, ISO 27001, PCI DSS
  • πŸ“‹ Advanced Analytics - ML-powered insights
  • πŸ“‹ Marketplace Expansion - Additional platform support

πŸ’» Usage Examples

🎯 Go Project Configuration

# .enterprise-ci.yml
language: go

go:
  build:
    flags: ["-v", "-race"]
  test:
    flags: ["-v", "-race", "-cover"]
    coverage_threshold: 85
  lint:
    go_vet: true
    gofmt_check: true

security:
  tools:
    go:
      govulncheck: true

governance:
  branch_policies:
    allowed_patterns:
      - "main"
      - "develop"
      - "feature/.*"

compliance:
  thresholds:
    min_security_score: 90

🎯 JavaScript/TypeScript Project

# .enterprise-ci.yml
language: typescript

javascript:
  build:
    script: "build"
    production: true
  test:
    script: "test"
    coverage: true
  lint:
    script: "lint"
    eslint: true
    prettier: true

security:
  tools:
    javascript:
      npm_audit: true
      yarn_audit: true

compliance:
  thresholds:
    min_security_score: 85

🎯 Python Project

# .enterprise-ci.yml
language: python

python:
  venv:
    create: true
    version: "3"
  test:
    framework: "pytest"
    coverage: true
  lint:
    flake8: true
    black: true

security:
  tools:
    python:
      safety: true
      pip_audit: true

🎯 Enterprise Multi-Language Project

# .enterprise-ci.yml
mode: strict
language: auto

security:
  enabled: true
  fail_on_critical: true
  secret_scan: true
  tools:
    go:
      govulncheck: true
    javascript:
      npm_audit: true
    python:
      safety: true
      pip_audit: true

governance:
  enabled: true
  branch_policies:
    allowed_patterns:
      - "main"
      - "master"
      - "develop"
      - "feature/.*"
      - "hotfix/.*"
      - "release/.*"
  commit_policies:
    allowed_patterns:
      - "^(feat|fix|docs|style|refactor|test|chore)(\\(.+\\))?: .+"
  version_policies:
    require_semver: true
  repository_policies:
    required_files:
      - "LICENSE"
      - "README.md"
      - ".gitignore"
      - "SECURITY.md"

compliance:
  reports: true
  export_artifacts: true
  thresholds:
    min_security_score: 85
    min_governance_score: 90
    max_critical_issues: 0

environments:
  production:
    mode: "strict"
    compliance:
      thresholds:
        min_security_score: 95
        min_governance_score: 95

🎯 Docker Package Management

# .github/workflows/release.yml
name: Release

on:
  push:
    tags:
      - 'v*'

env:
  REGISTRY: ghcr.io
  IMAGE_NAME: ${{ github.repository }}

jobs:
  build-and-publish:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      
      - name: Set up Go
        uses: actions/setup-go@v5
        with:
          go-version: '1.21'
      
      - name: Build Go binary
        run: |
          go build -o enterprise-ci ./cmd/enterprise-ci
      
      - name: Build and publish Docker images
        env:
          VERSION: ${{ github.ref_name }}
        run: |
          # Use the Docker builder from app/docker/builder.go
          go run ./cmd/enterprise-ci docker build --publish

πŸ” Security & Permissions

πŸ›‘οΈ Security-First Design

Sky Genesis Enterprise CI follows the principle of least privilege:

# Recommended permissions
permissions:
  contents: read         # Access repository contents
  actions: read          # Read workflow information
  security-events: write # Upload SARIF reports
  pull-requests: write   # Set status checks
  packages: write        # Publish Docker packages (if needed)

πŸ”’ Security Features

  • No External Network Calls - Except for package manager operations
  • No Hardcoded Credentials - All secrets handled via GitHub context
  • Minimal Dependencies - Reduced attack surface with Go implementation
  • Auditable Code - Transparent operations with comprehensive logging
  • Secure File Handling - Proper temporary file cleanup
  • Input Validation - All inputs validated and sanitized
  • Docker Security - Multi-stage builds, minimal base images, vulnerability scanning

πŸ›‘οΈ Enterprise Security Standards

  • SOC 2 Compliance - Security monitoring and vulnerability management
  • ISO 27001 - Information security management systems
  • PCI DSS - Payment card industry security standards
  • GDPR - Data protection and privacy compliance

πŸ“Š Reports & Integration

πŸ“‹ Compliance Reports

Sky Genesis Enterprise CI generates comprehensive reports:

JSON Compliance Report

{
  "compliance": {
    "version": "1.0.0",
    "timestamp": "2025-01-20T10:00:00Z",
    "results": {
      "status": "success",
      "security_score": 92,
      "governance_score": 88,
      "critical_issues": 0,
      "warnings": 3
    },
    "security": {
      "vulnerabilities": 2,
      "critical_vulnerabilities": 0,
      "secrets_detected": 0
    },
    "governance": {
      "branch_violations": 0,
      "commit_violations": 1,
      "version_violations": 0
    },
    "docker": {
      "images_built": 2,
      "images_published": 2,
      "security_scan_passed": true
    }
  }
}

SARIF Security Report

{
  "$schema": "https://json.schemastore.org/sarif-2.1.0",
  "version": "2.1.0",
  "runs": [{
    "tool": {
      "driver": {
        "name": "Sky Genesis Enterprise CI Security Scanner",
        "version": "1.0.0"
      }
    },
    "results": [
      // Security findings in SARIF format
    ]
  }]
}

πŸ”— GitHub Integration

  • Security Tab Integration - SARIF reports appear in GitHub Security
  • Status Checks - Real-time status updates on commits and PRs
  • Artifact Export - Downloadable reports for audit trails
  • Pull Request Comments - Automated comments with findings summary
  • Docker Registry Integration - Automated image publishing to ghcr.io

πŸ“ˆ Enterprise Monitoring

  • Trend Analysis - Track security and governance scores over time
  • Compliance Dashboards - Visual metrics and KPIs
  • Audit Trails - Complete history of all scans and checks
  • Alert Integration - Custom notifications for critical issues
  • Docker Metrics - Image size, security scan results, build performance

🀝 Contributing

We're looking for contributors to help enhance this enterprise CI/CD orchestrator! Whether you're experienced with DevOps, security, or governance automation, there's a place for you.

🎯 How to Get Started

  1. Fork the repository and create a feature branch
  2. Check the issues for tasks that need help
  3. Join discussions about architecture and features
  4. Start small - Documentation, tests, or minor features
  5. Follow our code standards and commit guidelines

πŸ—οΈ Areas Needing Help

  • Go Developers - Core application development and optimization
  • Security Experts - Additional vulnerability scanners, threat detection
  • DevOps Engineers - Cloud provider integrations, Kubernetes support
  • Docker Experts - Container optimization, multi-platform builds
  • Governance Specialists - Policy templates, compliance frameworks
  • Language Experts - Extended language support and tool integration
  • Documentation Writers - Guides, tutorials, best practices
  • QA Engineers - Test suites, validation, performance testing

πŸ“ Contribution Process

  1. Choose an issue or create a new one with your proposal
  2. Create a branch with a descriptive name
  3. Implement your changes following our guidelines
  4. Test thoroughly in various environments
  5. Submit a pull request with clear description
  6. Address feedback from maintainers and community

πŸ“ž Support & Community

πŸ’¬ Get Help

πŸ› Reporting Issues

When reporting bugs, please include:

  • Clear description of the problem
  • Steps to reproduce
  • Configuration file (.enterprise-ci.yml)
  • Environment information (GitHub context, language)
  • Error logs or screenshots
  • Expected vs actual behavior

πŸ“š Additional Resources


πŸ“Š Project Status

Component Status Notes
Go Application Core βœ… Working Complete pipeline logic in Go
Security Module βœ… Working Vulnerability scanning + secret detection
Governance Module βœ… Working Policy enforcement + compliance
Compliance Module βœ… Working JSON/SARIF reports + artifacts
Language Support βœ… Working Go, JS/TS, Python, Java, C#, Ruby
Configuration System βœ… Working YAML config + environment overrides
GitHub Integration βœ… Working SARIF uploads + status checks
Docker Support βœ… Working Multi-stage Dockerfile
Docker Package Management βœ… Working Multi-platform builds + publishing
Documentation βœ… Working Complete guides + examples
Testing Suite πŸ“‹ Planned Unit and integration tests
Advanced Security πŸ“‹ Planned OWASP integration + custom policies
Cloud Integration πŸ“‹ Planned AWS, Azure, GCP support

πŸ† Sponsors & Partners

Development led by Sky Genesis Enterprise

We're looking for sponsors and partners to help accelerate development of this open-source enterprise CI/CD orchestrator.

🀝 Become a Sponsor


πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

MIT License

Copyright (c) 2025 Sky Genesis Enterprise

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

πŸ™ Acknowledgments

  • Sky Genesis Enterprise - Project leadership and development
  • GitHub Actions Team - Excellent CI/CD platform
  • Go Community - Excellent language and ecosystem
  • Docker Community - Container platform and tools
  • Security Community - Vulnerability scanning tools and best practices
  • Open Source Contributors - Tools, libraries, and inspiration
  • Enterprise Users - Feedback and requirements gathering
  • DevOps Community - Standards, patterns, and methodologies

πŸš€ Join Us in Building the Future of Enterprise CI/CD!

⭐ Star This Repo β€’ πŸ› Report Issues β€’ πŸ’‘ Start a Discussion


πŸ›‘οΈ Production Ready - Sky Genesis Enterprise CI v1.0.0!

Built with Go, Docker, and ❀️ by the Sky Genesis Enterprise team

Building enterprise-grade CI/CD orchestration with security, governance, compliance, and container management

About

An Enterprise GitHub CI Orchestrator for Security, Governance & DevOps

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Sponsor this project

Packages

 
 
 

Contributors 2

  •  
  •  

Languages