-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'main' into dependabot/go_modules/golang.org/x/net-0.17.0
- Loading branch information
Showing
3 changed files
with
162 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
# To get started with Dependabot version updates, you'll need to specify which | ||
# package ecosystems to update and where the package manifests are located. | ||
# Please see the documentation for all configuration options: | ||
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates | ||
|
||
version: 2 | ||
updates: | ||
- package-ecosystem: "gomod" # See documentation for possible values | ||
directory: "/" # Location of package manifests | ||
schedule: | ||
interval: "weekly" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,72 @@ | ||
# This workflow uses actions that are not certified by GitHub. They are provided | ||
# by a third-party and are governed by separate terms of service, privacy | ||
# policy, and support documentation. | ||
|
||
name: Scorecard supply-chain security | ||
on: | ||
# For Branch-Protection check. Only the default branch is supported. See | ||
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection | ||
branch_protection_rule: | ||
# To guarantee Maintained check is occasionally updated. See | ||
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained | ||
schedule: | ||
- cron: '40 8 * * 5' | ||
push: | ||
branches: [ "main" ] | ||
|
||
# Declare default permissions as read only. | ||
permissions: read-all | ||
|
||
jobs: | ||
analysis: | ||
name: Scorecard analysis | ||
runs-on: ubuntu-latest | ||
permissions: | ||
# Needed to upload the results to code-scanning dashboard. | ||
security-events: write | ||
# Needed to publish results and get a badge (see publish_results below). | ||
id-token: write | ||
# Uncomment the permissions below if installing in a private repository. | ||
# contents: read | ||
# actions: read | ||
|
||
steps: | ||
- name: "Checkout code" | ||
uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3.1.0 | ||
with: | ||
persist-credentials: false | ||
|
||
- name: "Run analysis" | ||
uses: ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2 | ||
with: | ||
results_file: results.sarif | ||
results_format: sarif | ||
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if: | ||
# - you want to enable the Branch-Protection check on a *public* repository, or | ||
# - you are installing Scorecard on a *private* repository | ||
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat. | ||
# repo_token: ${{ secrets.SCORECARD_TOKEN }} | ||
|
||
# Public repositories: | ||
# - Publish results to OpenSSF REST API for easy access by consumers | ||
# - Allows the repository to include the Scorecard badge. | ||
# - See https://github.com/ossf/scorecard-action#publishing-results. | ||
# For private repositories: | ||
# - `publish_results` will always be set to `false`, regardless | ||
# of the value entered here. | ||
publish_results: true | ||
|
||
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF | ||
# format to the repository Actions tab. | ||
- name: "Upload artifact" | ||
uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0 | ||
with: | ||
name: SARIF file | ||
path: results.sarif | ||
retention-days: 5 | ||
|
||
# Upload the results to GitHub's code scanning dashboard. | ||
- name: "Upload to code-scanning" | ||
uses: github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4 | ||
with: | ||
sarif_file: results.sarif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,79 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
# A sample workflow which sets up Snyk to analyze the full Snyk platform (Snyk Open Source, Snyk Code, | ||
# Snyk Container and Snyk Infrastructure as Code) | ||
# The setup installs the Snyk CLI - for more details on the possible commands | ||
# check https://docs.snyk.io/snyk-cli/cli-reference | ||
# The results of Snyk Code are then uploaded to GitHub Security Code Scanning | ||
# | ||
# In order to use the Snyk Action you will need to have a Snyk API token. | ||
# More details in https://github.com/snyk/actions#getting-your-snyk-token | ||
# or you can signup for free at https://snyk.io/login | ||
# | ||
# For more examples, including how to limit scans to only high-severity issues | ||
# and fail PR checks, see https://github.com/snyk/actions/ | ||
|
||
name: Snyk Security | ||
|
||
on: | ||
push: | ||
branches: ["main" ] | ||
pull_request: | ||
branches: ["main"] | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
snyk: | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status | ||
runs-on: ubuntu-latest | ||
steps: | ||
- uses: actions/checkout@v3 | ||
- name: Set up Snyk CLI to check for security issues | ||
# Snyk can be used to break the build when it detects security issues. | ||
# In this case we want to upload the SAST issues to GitHub Code Scanning | ||
uses: snyk/actions/setup@806182742461562b67788a64410098c9d9b96adb | ||
|
||
# For Snyk Open Source you must first set up the development environment for your application's dependencies | ||
# For example for Node | ||
- uses: actions/setup-node@v3 | ||
with: | ||
node-version: 20 | ||
|
||
env: | ||
# This is where you will need to introduce the Snyk API token created with your Snyk account | ||
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} | ||
|
||
# Runs Snyk Code (SAST) analysis and uploads result into GitHub. | ||
# Use || true to not fail the pipeline | ||
- name: Snyk Code test | ||
run: snyk code test --sarif > snyk-code.sarif # || true | ||
|
||
# Runs Snyk Open Source (SCA) analysis and uploads result to Snyk. | ||
- name: Snyk Open Source monitor | ||
run: snyk monitor --all-projects | ||
|
||
# Runs Snyk Infrastructure as Code (IaC) analysis and uploads result to Snyk. | ||
# Use || true to not fail the pipeline. | ||
- name: Snyk IaC test and report | ||
run: snyk iac test --report # || true | ||
|
||
# Build the docker image for testing | ||
- name: Build a Docker image | ||
run: docker build -t your/image-to-test . | ||
# Runs Snyk Container (Container and SCA) analysis and uploads result to Snyk. | ||
- name: Snyk Container monitor | ||
run: snyk container monitor your/image-to-test --file=Dockerfile | ||
|
||
# Push the Snyk Code results into GitHub Code Scanning tab | ||
- name: Upload result to GitHub Code Scanning | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: snyk-code.sarif |