- Add ConsoleSessionStore for managing console session state including tenants, profile, and token information. - Create OperatorContextService to manage operator context for orchestrator actions. - Implement OperatorMetadataInterceptor to enrich HTTP requests with operator context metadata. - Develop ConsoleProfileComponent to display user profile and session details, including tenant information and access tokens. - Add corresponding HTML and SCSS for ConsoleProfileComponent to enhance UI presentation. - Write unit tests for ConsoleProfileComponent to ensure correct rendering and functionality.
354 lines
15 KiB
Markdown
Executable File
354 lines
15 KiB
Markdown
Executable File
# Stella Ops CI Recipes — (2025‑08‑04)
|
||
|
||
## 0 · Key variables (export these once)
|
||
|
||
| Variable | Meaning | Typical value |
|
||
| ------------- | --------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------- |
|
||
| `STELLA_URL` | Host that: ① stores the **CLI** & **SBOM‑builder** images under `/registry` **and** ② receives API calls at `https://$STELLA_URL` | `stella-ops.ci.acme.example` |
|
||
| `DOCKER_HOST` | How containers reach your Docker daemon (because we no longer mount `/var/run/docker.sock`) | `tcp://docker:2375` |
|
||
| `WORKSPACE` | Directory where the pipeline stores artefacts (SBOM file) | `$(pwd)` |
|
||
| `IMAGE` | The image you are building & scanning | `acme/backend:sha-${COMMIT_SHA}` |
|
||
| `SBOM_FILE` | Immutable SBOM name – `<image-ref>‑YYYYMMDDThhmmssZ.sbom.json` | `acme_backend_sha‑abc123‑20250804T153050Z.sbom.json` |
|
||
|
||
> **Authority graph scopes note (2025-10-27):** CI stages that spin up the Authority compose profile now rely on the checked-in `etc/authority.yaml`. Before running integration smoke jobs, inject real secrets for every `etc/secrets/*.secret` file (Cartographer, Graph API, Policy Engine, Concelier, Excititor). The repository defaults contain `*-change-me` placeholders and Authority will reject tokens if those secrets are not overridden. Reissue CI tokens that previously used `policy:write`/`policy:submit`/`policy:edit` scopes—new bundles must request `policy:read`, `policy:author`, `policy:review`, `policy:simulate`, and (`policy:approve`/`policy:operate`/`policy:activate` when pipelines promote policies).
|
||
|
||
```bash
|
||
export STELLA_URL="stella-ops.ci.acme.example"
|
||
export DOCKER_HOST="tcp://docker:2375" # Jenkins/Circle often expose it like this
|
||
export WORKSPACE="$(pwd)"
|
||
export IMAGE="acme/backend:sha-${COMMIT_SHA}"
|
||
export SBOM_FILE="$(echo "${IMAGE}" | tr '/:+' '__')-$(date -u +%Y%m%dT%H%M%SZ).sbom.json"
|
||
```
|
||
|
||
---
|
||
|
||
## 1 · SBOM creation strategies
|
||
|
||
### Option A – **Buildx attested SBOM** (preferred if you can use BuildKit)
|
||
|
||
You pass **two build args** so the Dockerfile can run the builder and copy the result out of the build context.
|
||
|
||
```bash
|
||
docker buildx build \
|
||
--build-arg STELLA_SBOM_BUILDER="$STELLA_URL/registry/stella-sbom-builder:latest" \
|
||
--provenance=true --sbom=true \
|
||
--build-arg SBOM_FILE="$SBOM_FILE" \
|
||
-t "$IMAGE" .
|
||
```
|
||
|
||
**If you **cannot** use Buildx, use Option B below.** The older “run a builder stage inside the Dockerfile” pattern is unreliable for producing an SBOM of the final image.
|
||
|
||
```Dockerfile
|
||
|
||
ARG STELLA_SBOM_BUILDER
|
||
ARG SBOM_FILE
|
||
|
||
FROM $STELLA_SBOM_BUILDER as sbom
|
||
ARG IMAGE
|
||
ARG SBOM_FILE
|
||
RUN $STELLA_SBOM_BUILDER build --image $IMAGE --output /out/$SBOM_FILE
|
||
|
||
# ---- actual build stages … ----
|
||
FROM alpine:3.20
|
||
COPY --from=sbom /out/$SBOM_FILE / # (optional) keep or discard
|
||
|
||
# (rest of your Dockerfile)
|
||
```
|
||
|
||
### Option B – **External builder step** (works everywhere; recommended baseline if Buildx isn’t available)
|
||
|
||
*(keep this block if your pipeline already has an image‑build step that you can’t modify)*
|
||
|
||
```bash
|
||
docker run --rm \
|
||
-e DOCKER_HOST="$DOCKER_HOST" \ # let builder reach the daemon remotely
|
||
-v "$WORKSPACE:/workspace" \ # place SBOM beside the source code
|
||
"$STELLA_URL/registry/stella-sbom-builder:latest" \
|
||
build --image "$IMAGE" --output "/workspace/${SBOM_FILE}"
|
||
```
|
||
|
||
---
|
||
|
||
## 2 · Scan the image & upload results
|
||
|
||
```bash
|
||
docker run --rm \
|
||
-e DOCKER_HOST="$DOCKER_HOST" \ # remote‑daemon pointer
|
||
-v "$WORKSPACE/${SBOM_FILE}:/${SBOM_FILE}:ro" \ # mount SBOM under same name at container root
|
||
-e STELLA_OPS_URL="https://${STELLA_URL}" \ # where the CLI posts findings
|
||
"$STELLA_URL/registry/stella-cli:latest" \
|
||
scan --sbom "/${SBOM_FILE}" "$IMAGE"
|
||
```
|
||
|
||
The CLI returns **exit 0** if policies pass, **>0** if blocked — perfect for failing the job.
|
||
|
||
---
|
||
|
||
## 3 · CI templates
|
||
|
||
Below are minimal, cut‑and‑paste snippets.
|
||
**Feel free to delete Option B** if you adopt Option A.
|
||
|
||
### 3.1 Jenkins (Declarative Pipeline)
|
||
|
||
```groovy
|
||
pipeline {
|
||
agent { docker { image 'docker:25' args '--privileged' } } // gives us /usr/bin/docker
|
||
environment {
|
||
STELLA_URL = 'stella-ops.ci.acme.example'
|
||
DOCKER_HOST = 'tcp://docker:2375'
|
||
IMAGE = "acme/backend:${env.BUILD_NUMBER}"
|
||
SBOM_FILE = "acme_backend_${env.BUILD_NUMBER}-${new Date().format('yyyyMMdd\'T\'HHmmss\'Z\'', TimeZone.getTimeZone('UTC'))}.sbom.json"
|
||
}
|
||
stages {
|
||
stage('Build image + SBOM (Option A)') {
|
||
steps {
|
||
sh '''
|
||
docker build \
|
||
--build-arg STELLA_SBOM_BUILDER="$STELLA_URL/registry/stella-sbom-builder:latest" \
|
||
--build-arg SBOM_FILE="$SBOM_FILE" \
|
||
-t "$IMAGE" .
|
||
'''
|
||
}
|
||
}
|
||
/* ---------- Option B fallback (when you must keep the existing build step as‑is) ----------
|
||
stage('SBOM builder (Option B)') {
|
||
steps {
|
||
sh '''
|
||
docker run --rm -e DOCKER_HOST="$DOCKER_HOST" \
|
||
-v "$WORKSPACE:/workspace" \
|
||
"$STELLA_URL/registry/stella-sbom-builder:latest" \
|
||
build --image "$IMAGE" --output "/workspace/${SBOM_FILE}"
|
||
'''
|
||
}
|
||
}
|
||
------------------------------------------------------------------------------------------ */
|
||
stage('Scan & upload') {
|
||
steps {
|
||
sh '''
|
||
docker run --rm -e DOCKER_HOST="$DOCKER_HOST" \
|
||
-v "$WORKSPACE/${SBOM_FILE}:/${SBOM_FILE}:ro" \
|
||
-e STELLA_OPS_URL="https://$STELLA_URL" \
|
||
"$STELLA_URL/registry/stella-cli:latest" \
|
||
scan --sbom "/${SBOM_FILE}" "$IMAGE"
|
||
'''
|
||
}
|
||
}
|
||
}
|
||
}
|
||
```
|
||
|
||
---
|
||
|
||
### 3.2 CircleCI `.circleci/config.yml`
|
||
|
||
```yaml
|
||
version: 2.1
|
||
jobs:
|
||
stella_scan:
|
||
docker:
|
||
- image: cimg/base:stable # baremetal image with Docker CLI
|
||
environment:
|
||
STELLA_URL: stella-ops.ci.acme.example
|
||
DOCKER_HOST: tcp://docker:2375 # Circle’s “remote Docker” socket
|
||
steps:
|
||
- checkout
|
||
|
||
- run:
|
||
name: Compute vars
|
||
command: |
|
||
echo 'export IMAGE="acme/backend:${CIRCLE_SHA1}"' >> $BASH_ENV
|
||
echo 'export SBOM_FILE="$(echo acme/backend:${CIRCLE_SHA1} | tr "/:+" "__")-$(date -u +%Y%m%dT%H%M%SZ).sbom.json"' >> $BASH_ENV
|
||
- run:
|
||
name: Build image + SBOM (Option A)
|
||
command: |
|
||
docker build \
|
||
--build-arg STELLA_SBOM_BUILDER="$STELLA_URL/registry/stella-sbom-builder:latest" \
|
||
--build-arg SBOM_FILE="$SBOM_FILE" \
|
||
-t "$IMAGE" .
|
||
# --- Option B fallback (when you must keep the existing build step as‑is) ---
|
||
#- run:
|
||
# name: SBOM builder (Option B)
|
||
# command: |
|
||
# docker run --rm -e DOCKER_HOST="$DOCKER_HOST" \
|
||
# -v "$PWD:/workspace" \
|
||
# "$STELLA_URL/registry/stella-sbom-builder:latest" \
|
||
# build --image "$IMAGE" --output "/workspace/${SBOM_FILE}"
|
||
- run:
|
||
name: Scan
|
||
command: |
|
||
docker run --rm -e DOCKER_HOST="$DOCKER_HOST" \
|
||
-v "$PWD/${SBOM_FILE}:/${SBOM_FILE}:ro" \
|
||
-e STELLA_OPS_URL="https://$STELLA_URL" \
|
||
"$STELLA_URL/registry/stella-cli:latest" \
|
||
scan --sbom "/${SBOM_FILE}" "$IMAGE"
|
||
workflows:
|
||
stella:
|
||
jobs: [stella_scan]
|
||
```
|
||
|
||
---
|
||
|
||
### 3.3 Gitea Actions `.gitea/workflows/stella.yml`
|
||
|
||
*(Gitea 1.22+ ships native Actions compatible with GitHub syntax)*
|
||
|
||
```yaml
|
||
name: Stella Scan
|
||
on: [push]
|
||
|
||
jobs:
|
||
stella:
|
||
runs-on: ubuntu-latest
|
||
env:
|
||
STELLA_URL: ${{ secrets.STELLA_URL }}
|
||
DOCKER_HOST: tcp://docker:2375 # provided by the docker:dind service
|
||
services:
|
||
docker:
|
||
image: docker:dind
|
||
options: >-
|
||
--privileged
|
||
steps:
|
||
- uses: actions/checkout@v4
|
||
|
||
- name: Compute vars
|
||
id: vars
|
||
run: |
|
||
echo "IMAGE=ghcr.io/${{ gitea.repository }}:${{ gitea.sha }}" >> $GITEA_OUTPUT
|
||
echo "SBOM_FILE=$(echo ghcr.io/${{ gitea.repository }}:${{ gitea.sha }} | tr '/:+' '__')-$(date -u +%Y%m%dT%H%M%SZ).sbom.json" >> $GITEA_OUTPUT
|
||
|
||
- name: Build image + SBOM (Option A)
|
||
run: |
|
||
docker build \
|
||
--build-arg STELLA_SBOM_BUILDER="${STELLA_URL}/registry/stella-sbom-builder:latest" \
|
||
--build-arg SBOM_FILE="${{ steps.vars.outputs.SBOM_FILE }}" \
|
||
-t "${{ steps.vars.outputs.IMAGE }}" .
|
||
|
||
# --- Option B fallback (when you must keep the existing build step as‑is) ---
|
||
#- name: SBOM builder (Option B)
|
||
# run: |
|
||
# docker run --rm -e DOCKER_HOST="$DOCKER_HOST" \
|
||
# -v "$(pwd):/workspace" \
|
||
# "${STELLA_URL}/registry/stella-sbom-builder:latest" \
|
||
# build --image "${{ steps.vars.outputs.IMAGE }}" --output "/workspace/${{ steps.vars.outputs.SBOM_FILE }}"
|
||
|
||
- name: Scan
|
||
run: |
|
||
docker run --rm -e DOCKER_HOST="$DOCKER_HOST" \
|
||
-v "$(pwd)/${{ steps.vars.outputs.SBOM_FILE }}:/${{ steps.vars.outputs.SBOM_FILE }}:ro" \
|
||
-e STELLA_OPS_URL="https://${STELLA_URL}" \
|
||
"${STELLA_URL}/registry/stella-cli:latest" \
|
||
scan --sbom "/${{ steps.vars.outputs.SBOM_FILE }}" "${{ steps.vars.outputs.IMAGE }}"
|
||
```
|
||
|
||
---
|
||
|
||
## 4 · Docs CI (Gitea Actions & Offline Mirror)
|
||
|
||
StellaOps ships a dedicated Docs workflow at `.gitea/workflows/docs.yml`. When mirroring the pipeline offline or running it locally, install the same toolchain so markdown linting, schema validation, and HTML preview stay deterministic.
|
||
|
||
### 4.1 Toolchain bootstrap
|
||
|
||
```bash
|
||
# Node.js 20.x is required; install once per runner
|
||
npm install --no-save \
|
||
markdown-link-check \
|
||
remark-cli \
|
||
remark-preset-lint-recommended \
|
||
ajv \
|
||
ajv-cli \
|
||
ajv-formats
|
||
|
||
# Python 3.11+ powers the preview renderer
|
||
python -m pip install --upgrade pip
|
||
python -m pip install markdown pygments
|
||
```
|
||
|
||
> **No `pip` available?** Some hardened Python builds (including the repo’s `tmp/docenv`
|
||
> interpreter) ship without `pip`/`ensurepip`. In that case download the pure‑Python
|
||
> sdists (e.g. `Markdown-3.x.tar.gz`, `pygments-2.x.tar.gz`) and extract their
|
||
> packages directly into the virtualenv’s `lib/python*/site-packages/` folder.
|
||
> This keeps the renderer working even when package managers are disabled.
|
||
|
||
**Offline tip.** Add the packages above to your artifact mirror (for example `ops/devops/offline-kit.json`) so runners can install them via `npm --offline` / `pip --no-index`.
|
||
|
||
### 4.2 Schema validation step
|
||
|
||
Ajv compiles every event schema to guard against syntax or format regressions. The workflow uses `ajv-formats` for UUID/date-time support.
|
||
|
||
```bash
|
||
for schema in docs/events/*.json; do
|
||
npx ajv compile -c ajv-formats -s "$schema"
|
||
done
|
||
```
|
||
|
||
Run this loop before committing schema changes. For new references, append `-r additional-file.json` so CI and local runs stay aligned.
|
||
|
||
### 4.3 Preview build
|
||
|
||
```bash
|
||
python scripts/render_docs.py --source docs --output artifacts/docs-preview --clean
|
||
```
|
||
|
||
Host the resulting bundle via any static file server for review (for example `python -m http.server`).
|
||
|
||
### 4.4 Publishing checklist
|
||
|
||
- [ ] Toolchain installs succeed without hitting the public internet (mirror or cached tarballs).
|
||
- [ ] Ajv validation passes for `scanner.report.ready@1`, `scheduler.rescan.delta@1`, `attestor.logged@1`.
|
||
- [ ] Markdown link check (`npx markdown-link-check`) reports no broken references.
|
||
- [ ] Preview bundle archived (or attached) for stakeholders.
|
||
|
||
### 4.5 Policy DSL lint stage
|
||
|
||
Policy Engine v2 pipelines now fail fast if policy documents are malformed. After checkout and dotnet restore, run:
|
||
|
||
```bash
|
||
dotnet run \
|
||
--project tools/PolicyDslValidator/PolicyDslValidator.csproj \
|
||
-- \
|
||
--strict docs/examples/policies/*.yaml
|
||
```
|
||
|
||
- `--strict` treats warnings as errors so missing metadata doesn’t slip through.
|
||
- The validator accepts globs, so you can point it at tenant policy directories later (`policies/**/*.yaml`).
|
||
- Exit codes follow UNIX conventions: `0` success, `1` parse/errors, `2` warnings when `--strict` is set, `64` usage mistakes.
|
||
|
||
Capture the validator output as part of your build logs; Support uses it when triaging policy rollout issues.
|
||
|
||
### 4.6 Policy simulation smoke
|
||
|
||
Catch unexpected policy regressions by exercising a small set of golden SBOM findings via the simulation smoke tool:
|
||
|
||
```bash
|
||
dotnet run \
|
||
--project tools/PolicySimulationSmoke/PolicySimulationSmoke.csproj \
|
||
-- \
|
||
--scenario-root samples/policy/simulations \
|
||
--output artifacts/policy-simulations
|
||
```
|
||
|
||
- The tool loads each `scenario.json` under `samples/policy/simulations`, evaluates the referenced policy, and fails the build if projected verdicts change.
|
||
- In CI the command runs twice (to `run1/` and `run2/`) and `diff -u` compares the summaries—any mismatch signals a determinism regression.
|
||
- Artifacts land in `artifacts/policy-simulations/policy-simulation-summary.json`; upload them for later inspection (see CI workflow).
|
||
- Expand scenarios by copying real-world findings into the samples directory—ensure expected statuses are recorded so regressions trip the pipeline.
|
||
|
||
---
|
||
|
||
## 5 · Troubleshooting cheat‑sheet
|
||
|
||
| Symptom | Root cause | First things to try |
|
||
| ------------------------------------- | --------------------------- | --------------------------------------------------------------- |
|
||
| `no such host $STELLA_URL` | DNS typo or VPN outage | `ping $STELLA_URL` from runner |
|
||
| `connection refused` when CLI uploads | Port 443 blocked | open firewall / check ingress |
|
||
| `failed to stat /<sbom>.json` | SBOM wasn’t produced | Did Option A actually run builder? If not, enable Option B |
|
||
| `registry unauthorized` | Runner lacks registry creds | `docker login $STELLA_URL/registry` (store creds in CI secrets) |
|
||
| Non‑zero scan exit | Blocking vuln/licence | Open project in Ops UI → triage or waive |
|
||
|
||
---
|
||
|
||
### Change log
|
||
|
||
* **2025‑10‑18** – Documented Docs CI toolchain (Ajv validation, static preview) and offline checklist.
|
||
* **2025‑08‑04** – Variable clean‑up, removed Docker‑socket & cache mounts, added Jenkins / CircleCI / Gitea examples, clarified Option B comment.
|