mirror of https://github.com/hyperledger/besu
Add container security scanning (#7216)
Container security scanning workflow added. This runs on schedule everyday. Also possible to run on-demand for a given image tag Signed-off-by: Chaminda Divitotawela <cdivitotawela@gmail.com> Co-authored-by: Sally MacFarlane <macfarla.github@gmail.com> Co-authored-by: Justin Florentine <justin+github@florentine.us>pull/7228/head
parent
1ee35a3dea
commit
884834f352
@ -0,0 +1,44 @@ |
||||
name: container security scan |
||||
|
||||
on: |
||||
workflow_dispatch: |
||||
inputs: |
||||
tag: |
||||
description: 'Container image tag' |
||||
required: false |
||||
default: 'develop' |
||||
schedule: |
||||
# Start of the hour is the busy time. Scheule it to run 8:17am UTC |
||||
- cron: '17 8 * * *' |
||||
|
||||
jobs: |
||||
scan-sarif: |
||||
runs-on: ubuntu-latest |
||||
|
||||
steps: |
||||
- name: Checkout |
||||
uses: actions/checkout@v4 |
||||
|
||||
# Shell parameter expansion does not support directly on a step |
||||
# Adding a separate step to set the image tag. This allows running |
||||
# this workflow with a schedule as well as manual |
||||
- name: Set image tag |
||||
id: tag |
||||
run: | |
||||
echo "TAG=${INPUT_TAG:-develop}" >> "$GITHUB_OUTPUT" |
||||
env: |
||||
INPUT_TAG: ${{ inputs.tag }} |
||||
|
||||
- name: Vulnerability scanner |
||||
id: trivy |
||||
uses: aquasecurity/trivy-action@0.22.0 |
||||
with: |
||||
image-ref: hyperledger/besu:${{ steps.tag.outputs.TAG }} |
||||
format: sarif |
||||
output: 'trivy-results.sarif' |
||||
|
||||
# Check the vulnerabilities via GitHub security tab |
||||
- name: Upload results |
||||
uses: github/codeql-action/upload-sarif@v3 |
||||
with: |
||||
sarif_file: 'trivy-results.sarif' |
Loading…
Reference in new issue