{"id":15191989,"url":"https://github.com/codeviewbr/kube-devops-ci","last_synced_at":"2026-03-05T01:04:22.483Z","repository":{"id":49134736,"uuid":"367753230","full_name":"codeviewbr/kube-devops-ci","owner":"codeviewbr","description":"Run the main commands to deploy or build services like kubernetes and aws using CLI.","archived":false,"fork":false,"pushed_at":"2022-07-25T11:17:50.000Z","size":65,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-02-11T18:47:32.210Z","etag":null,"topics":["aws","devops","helm","k8s","kubernetes"],"latest_commit_sha":null,"homepage":"","language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/codeviewbr.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2021-05-16T00:12:42.000Z","updated_at":"2022-07-25T11:07:17.000Z","dependencies_parsed_at":"2023-01-11T17:23:06.545Z","dependency_job_id":null,"html_url":"https://github.com/codeviewbr/kube-devops-ci","commit_stats":{"total_commits":102,"total_committers":3,"mean_commits":34.0,"dds":"0.48039215686274506","last_synced_commit":"67043aeb45805cb1377a8b92dc95c4861650b098"},"previous_names":[],"tags_count":80,"template":false,"template_full_name":null,"purl":"pkg:github/codeviewbr/kube-devops-ci","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/codeviewbr%2Fkube-devops-ci","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/codeviewbr%2Fkube-devops-ci/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/codeviewbr%2Fkube-devops-ci/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/codeviewbr%2Fkube-devops-ci/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/codeviewbr","download_url":"https://codeload.github.com/codeviewbr/kube-devops-ci/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/codeviewbr%2Fkube-devops-ci/sbom","scorecard":{"id":297928,"data":{"date":"2025-08-11","repo":{"name":"github.com/codeviewbr/kube-devops-ci","commit":"67043aeb45805cb1377a8b92dc95c4861650b098"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":3.4,"checks":[{"name":"Code-Review","score":0,"reason":"Found 0/30 approved changesets -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/docker-ci-test.yml:1","Warn: no topLevel permission defined: .github/workflows/docker-ci.yml:1","Warn: no topLevel permission defined: .github/workflows/test-action.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"SAST","score":0,"reason":"no SAST tool detected","details":["Warn: no pull requests merged into dev branch"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Vulnerabilities","score":10,"reason":"0 existing vulnerabilities detected","details":null,"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"License","score":0,"reason":"license file not detected","details":["Warn: project does not have a license file"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-ci-test.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci-test.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:38: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:44: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:47: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-ci.yml:53: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/docker-ci.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test-action.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/test-action.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/test-action.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/codeviewbr/kube-devops-ci/test-action.yml/main?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating codeviewbr/kube-devops-ci-base:v0.0.2 to codeviewbr/kube-devops-ci-base:v0.0.2@sha256:9ff2a35118bac132ec6465577f7ea5d56ed2e5d4747389c8865d503603bad10c","Info:   0 out of   5 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   6 third-party GitHubAction dependencies pinned","Info:   0 out of   1 containerImage dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}}]},"last_synced_at":"2025-08-17T19:59:17.451Z","repository_id":49134736,"created_at":"2025-08-17T19:59:17.451Z","updated_at":"2025-08-17T19:59:17.451Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30104218,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-05T00:38:46.881Z","status":"ssl_error","status_checked_at":"2026-03-05T00:38:45.829Z","response_time":59,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["aws","devops","helm","k8s","kubernetes"],"created_at":"2024-09-27T21:02:35.526Z","updated_at":"2026-03-05T01:04:17.471Z","avatar_url":"https://github.com/codeviewbr.png","language":"Shell","readme":"# Kube DevOps CI\n  [![Production](https://github.com/codeviewbr/kube-devops-ci/actions/workflows/docker-ci.yml/badge.svg)](https://github.com/codeviewbr/kube-devops-ci/actions/workflows/docker-ci.yml)\n   \nRun the main commands to deploy or build services like kubernetes and aws using CLI.\n\n## DevOps Tools\n- KUBECTL=1.22.12\n- KUSTOMIZE=4.5.4\n- HELM_V2=2.17.0\n- HELM_V3=3.9.2\n- KUBEVAL=0.16.1\n- KUBEAUDIT=0.19.0\n- KUBESEAL=0.18.1\n- CONFTEST=0.33.2\n- KOPS=1.18.3\n- TERRAFORM=1.2.5\n- AWSCLI=1.25.36\n\n  \n\n## Variables\n\n**Kube/config**\n```yaml\nCA=\"\"\nSERVER=\"\"\nCONTEXT=\"\"\nCLUSTER=\"\"\nNAMESPACE=\"\"\nUSERNAME=\"\"\nTOKEN=\"\"\n```\n\n**AWS CLI**\n```yaml\nAWS_REGION=\"\"\nAWS_ACCESS_KEY=\"\"\nAWS_SECRET_KEY=\"\"\n```\n\n**KOPS Admin**\n```yaml\nCLUSTER_NAME=\"\"\nKOPS_STATE_STORE=\"\"\n```\n\n## Usage\n\n```yaml\n- name: aws-cli-get-instances\n  uses: codeviewbr/kube-devops-ci@v0.2.62\n  id: get-ec2\n  env: \n\tAWS_REGION: \"us-east-1\"\n\tAWS_ACCESS_KEY: ${{ secrets.AWS_ACCESS_KEY }}\n\tAWS_SECRET_KEY: ${{ secrets.AWS_SECRET_KEY }}  \n  with:\n    command: aws ec2 describe-instances --instance-ids i-1234567890abcdef0\n```\n\u003e Save as secrets in Github Actions Environments Settings your repository","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcodeviewbr%2Fkube-devops-ci","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcodeviewbr%2Fkube-devops-ci","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcodeviewbr%2Fkube-devops-ci/lists"}