Skip to content

Feature/policy store#656

Merged
varunsh-coder merged 6 commits intomainfrom
feature/policy-store
Apr 9, 2026
Merged

Feature/policy store#656
varunsh-coder merged 6 commits intomainfrom
feature/policy-store

Conversation

@varunsh-coder
Copy link
Copy Markdown
Member

No description provided.

Adds use-policy-store and api-key inputs to allow fetching policies
from the StepSecurity policy store. Defaults to audit mode when no
policy is found. Includes unit tests with 100% coverage.
Use /actions/policies/workflow-policy with query params (workflow,
run_id, correlationId) and vm-api-key auth header to match the
existing backend API. Update action.yml descriptions to clarify
policy store is the preferred method.
API returns 200 with empty policy (no egress_policy, no endpoints)
when no policy exists for a repo. Treat this as no policy found and
default to audit mode. Update action.yml descriptions for policy store.
@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 8, 2026

Test Results

21 tests  +15   21 ✅ +15   34s ⏱️ +14s
 4 suites ± 0    0 💤 ± 0 
 1 files   ± 0    0 ❌ ± 0 

Results for commit 289f73e. ± Comparison against base commit fe10465.

♻️ This comment has been updated with latest results.

Use GITHUB_WORKFLOW_REF to extract the workflow filename instead of
GITHUB_WORKFLOW which gives the workflow display name. The policy
store API expects the filename (e.g. ci.yml) to match workflow-level
policies.
The Go agent uses api_key for self-hosted authentication. Passing
the policy store api_key into agent.json caused the agent to use
self-hosted upload paths, resulting in missing process and file events.
@varunsh-coder varunsh-coder merged commit f808768 into main Apr 9, 2026
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants