Skip to content

Commit

Permalink
Add vulnerability scanning (#18)
Browse files Browse the repository at this point in the history
* Add vulnerability scanning

* Add category and permissions

* Fix typo
  • Loading branch information
gcotelli authored Apr 26, 2024
1 parent ca755bf commit 2a50895
Show file tree
Hide file tree
Showing 3 changed files with 74 additions and 2 deletions.
37 changes: 37 additions & 0 deletions .github/workflows/docker-build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,11 +11,15 @@ on:

jobs:
build_and_publish:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
runs-on: ubuntu-latest
name: Build and Publish Docker images
steps:
- name: Checkout
uses: actions/checkout@v4
# Build and publish runtime image
- name: Docker meta
id: docker_meta_runtime
uses: docker/metadata-action@v5
Expand All @@ -39,6 +43,23 @@ jobs:
tags: ${{ steps.docker_meta_runtime.outputs.tags }}
labels: ${{ steps.docker_meta_runtime.outputs.labels }}
secrets: GIT_AUTH_TOKEN=${{ secrets.DOCKER_REGISTRY_TOKEN }}
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
if: ${{ github.event_name != 'pull_request' }}
with:
image-ref: ghcr.io/${{ github.repository_owner }}/pharo:${{ github.ref_name }}
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
limit-severities-for-sarif: true
ignore-unfixed: true
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
if: ${{ github.event_name != 'pull_request' }}
with:
sarif_file: 'trivy-results.sarif'
category: ghcr.io/${{ github.repository_owner }}/pharo:${{ github.ref_name }}
# Build and publish loader image
- name: Docker meta loader
id: docker_meta_loader
uses: docker/metadata-action@v5
Expand All @@ -55,3 +76,19 @@ jobs:
tags: ${{ steps.docker_meta_loader.outputs.tags }}
labels: ${{ steps.docker_meta_loader.outputs.labels }}
secrets: GIT_AUTH_TOKEN=${{ secrets.DOCKER_REGISTRY_TOKEN }}
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
if: ${{ github.event_name != 'pull_request' }}
with:
image-ref: ghcr.io/${{ github.repository_owner }}/pharo-loader:${{ github.ref_name }}
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
limit-severities-for-sarif: true
ignore-unfixed: true
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
if: ${{ github.event_name != 'pull_request' }}
with:
sarif_file: 'trivy-results.sarif'
category: ghcr.io/${{ github.repository_owner }}/pharo-loader:${{ github.ref_name }}
3 changes: 1 addition & 2 deletions .github/workflows/notify.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,7 @@
name: Release Notifications

on:
release:
types: [published]
workflow_dispatch:

jobs:
notify:
Expand Down
36 changes: 36 additions & 0 deletions .github/workflows/scheduled-security-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
name: Scheduled vulnerabiltiy scanning

on:
schedule:
- cron: '35 6 * * 2'
workflow_dispatch:

jobs:
vulnerability-scan:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
strategy:
fail-fast: false
matrix:
version:
- latest
- v11.0.0
name: Scheduled scan for vulnerabilities ${{ matrix.version }}
runs-on: ubuntu-latest
steps:
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: 'ghcr.io/ba-st/pharo:${{ matrix.version }}'
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
limit-severities-for-sarif: true
ignore-unfixed: true

- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
category: 'ghcr.io/ba-st/pharo:${{ matrix.version }}'

0 comments on commit 2a50895

Please sign in to comment.