| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192 |
- name: "security"
- on:
- pull_request:
- push:
- branches: [main]
- schedule:
- - cron: "0 2 * * *"
- permissions:
- contents: read
- concurrency:
- group: security-${{ github.event.pull_request.number || github.ref }}
- cancel-in-progress: true
- jobs:
- codeql:
- runs-on: ubuntu-latest
- strategy:
- fail-fast: false
- matrix:
- language: ["go", "actions"]
- permissions:
- actions: read
- contents: read
- pull-requests: read
- security-events: write
- steps:
- - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
- with:
- persist-credentials: false
- - uses: github/codeql-action/init@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
- with:
- languages: ${{ matrix.language }}
- - uses: github/codeql-action/autobuild@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
- - uses: github/codeql-action/analyze@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
- grype:
- runs-on: ubuntu-latest
- permissions:
- security-events: write
- actions: read
- contents: read
- steps:
- - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
- with:
- persist-credentials: false
- - uses: anchore/scan-action@7037fa011853d5a11690026fb85feee79f4c946c # v7.3.2
- id: scan
- with:
- path: "."
- fail-build: true
- severity-cutoff: critical
- - uses: github/codeql-action/upload-sarif@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
- with:
- sarif_file: ${{ steps.scan.outputs.sarif }}
- govulncheck:
- runs-on: ubuntu-latest
- permissions:
- security-events: write
- contents: read
- steps:
- - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
- with:
- persist-credentials: false
- - uses: actions/setup-go@7a3fe6cf4cb3a834922a1244abfce67bcef6a0c5 # v6.2.0
- with:
- go-version: 1.26.0-rc.1 # change to "stable" once Go 1.26 is released
- - name: Install govulncheck
- run: go install golang.org/x/vuln/cmd/govulncheck@latest
- - name: Run govulncheck
- run: |
- govulncheck -C . -format sarif ./... > results.sarif
- - uses: github/codeql-action/upload-sarif@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
- with:
- sarif_file: results.sarif
- dependency-review:
- runs-on: ubuntu-latest
- if: github.event_name == 'pull_request'
- permissions:
- contents: read
- steps:
- - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
- with:
- persist-credentials: false
- - uses: actions/dependency-review-action@3c4e3dcb1aa7874d2c16be7d79418e9b7efd6261 # v4.8.2
- with:
- fail-on-severity: critical
- allow-licenses: BSD-2-Clause, BSD-3-Clause, MIT, Apache-2.0, MPL-2.0, ISC, LicenseRef-scancode-google-patent-license-golang
|