Security checks #247
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Security checks | |
permissions: | |
contents: read | |
security-events: write | |
on: # yamllint disable-line rule:truthy | |
pull_request: | |
paths-ignore: | |
- "docs/**" | |
- "*.md" | |
- "DCO" | |
- "LICENSE" | |
- "OWNERS" | |
- "PROJECT" | |
push: | |
branches: [main] | |
schedule: | |
- cron: '0 0 * * *' # run at midnight daily | |
concurrency: | |
group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }} | |
cancel-in-progress: true | |
jobs: | |
gosec: | |
name: Gosec | |
runs-on: ubuntu-20.04 | |
steps: | |
- name: Checkout Git Repository | |
uses: actions/checkout@v3 | |
- name: Run gosec | |
uses: securego/[email protected] | |
with: | |
args: '-no-fail -fmt sarif -out gosec.sarif ./...' | |
- name: Upload scan results | |
uses: github/codeql-action/upload-sarif@v2 | |
with: | |
sarif_file: gosec.sarif | |
trivy: | |
name: Trivy | |
runs-on: ubuntu-20.04 | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@v3 | |
- name: Run Trivy vulnerability scanner in repo mode | |
uses: aquasecurity/trivy-action@master | |
with: | |
scan-type: 'fs' | |
ignore-unfixed: true | |
format: 'sarif' | |
output: 'trivy-results.sarif' | |
severity: 'CRITICAL,HIGH' | |
- name: Upload Trivy scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@v2 | |
with: | |
sarif_file: 'trivy-results.sarif' |