-
Notifications
You must be signed in to change notification settings - Fork 37
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Use reusable vulnerability check workflow (#2288)
- Loading branch information
Showing
4 changed files
with
11 additions
and
248 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -17,103 +17,16 @@ on: | |
CR_PAT: | ||
required: true | ||
SLACK_SECURITY_WEBHOOK_URL: | ||
required: true | ||
required: false | ||
|
||
env: | ||
TERM: dumb | ||
jobs: | ||
docker: | ||
runs-on: ubuntu-latest | ||
|
||
env: | ||
GH_TOKEN: ${{ secrets.CR_PAT }} | ||
|
||
steps: | ||
# This first checkout is needed to use `ci/vuln-check/*` | ||
- uses: actions/checkout@v4 | ||
|
||
- id: prepare-target-ref | ||
name: Prepare target-ref | ||
run: | | ||
# Find the latest release name if `find-latest-release` is set to true. Use the value of `target-ref` as is otherwise. | ||
if [[ ${{ inputs.find-latest-release }} = 'true' ]]; then | ||
releases=$(ci/vuln-check/fetch_gh_releases "${{ github.event.repository.owner.login }}" "${{ github.event.repository.name }}") | ||
echo ------------- | ||
echo "releases: $releases" | ||
echo ------------- | ||
target_release='' | ||
if [[ -n $releases ]]; then | ||
target_release=$(ci/vuln-check/find_latest_release "${{ inputs.target-ref }}" $releases) | ||
fi | ||
if [[ -z $target_release ]]; then | ||
echo "Can't find a target release" | ||
exit 1 | ||
fi | ||
echo $target_release | ||
echo "target-ref=$target_release" >> $GITHUB_OUTPUT | ||
else | ||
echo "target-ref=${{ inputs.target-ref }}" >> $GITHUB_OUTPUT | ||
fi | ||
- uses: actions/checkout@v4 | ||
with: | ||
ref: ${{ steps.prepare-target-ref.outputs.target-ref }} | ||
|
||
- name: Set up JDK 8 | ||
uses: actions/setup-java@v4 | ||
with: | ||
java-version: '8' | ||
distribution: 'temurin' | ||
|
||
- name: Login to GitHub Container Registry | ||
if: always() | ||
uses: docker/login-action@v3 | ||
with: | ||
registry: ghcr.io | ||
username: ${{ github.repository_owner }} | ||
password: ${{ secrets.CR_PAT }} | ||
|
||
- name: Setup Gradle | ||
uses: gradle/actions/setup-gradle@v4 | ||
|
||
- name: Docker build | ||
if: always() | ||
run: ./gradlew docker | ||
|
||
- name: Set version | ||
if: always() | ||
id: version | ||
run: | | ||
VERSION=$(./gradlew :core:properties -q | grep "version:" | awk '{print $2}') | ||
echo "version=${VERSION}" >> $GITHUB_OUTPUT | ||
- name: Run Trivy vulnerability scanner for ScalarDB Schema Loader | ||
if: always() | ||
uses: aquasecurity/trivy-action@master | ||
with: | ||
image-ref: ghcr.io/scalar-labs/scalardb-schema-loader:${{ steps.version.outputs.version }} | ||
format: 'table' | ||
exit-code: '1' | ||
ignore-unfixed: true | ||
severity: 'CRITICAL,HIGH' | ||
timeout: '60m' | ||
|
||
- name: Post Trivy vulnerability check failure for ScalarDB Schema Loader to Slack | ||
if: failure() | ||
uses: slackapi/[email protected] | ||
with: | ||
payload: | | ||
{ | ||
"blocks": [ | ||
{ | ||
"type": "section", | ||
"text": { | ||
"type": "mrkdwn", | ||
"text": ":octagonal_sign: The vulnerability check for ScalarDB Schema Loader on `${{ github.repository }}` <${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|failed> with `${{ steps.prepare-target-ref.outputs.target-ref }}`" | ||
} | ||
} | ||
] | ||
} | ||
env: | ||
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_SECURITY_WEBHOOK_URL }} | ||
SLACK_WEBHOOK_TYPE: INCOMING_WEBHOOK | ||
call-vuln-check: | ||
uses: scalar-labs/actions/.github/workflows/vuln-check-reusable.yaml@main | ||
with: | ||
target-ref: ${{ inputs.target-ref }} | ||
find-latest-release: ${{ inputs.find-latest-release }} | ||
images: '[["ScalarDB Schema Loader", "scalardb-schema-loader"]]' | ||
version-command: "./gradlew :core:properties -q | grep version: | awk '{print $2}'" | ||
secrets: | ||
CR_PAT: ${{ secrets.CR_PAT }} | ||
SLACK_SECURITY_WEBHOOK_URL: ${{ secrets.SLACK_SECURITY_WEBHOOK_URL }} |
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.