Skip to content

chore(deps): update golang:1.23.4 docker digest to 7003184 #2489

chore(deps): update golang:1.23.4 docker digest to 7003184

chore(deps): update golang:1.23.4 docker digest to 7003184 #2489

Workflow file for this run

name: Security
on:
workflow_dispatch:
schedule:
- cron: '0 12 * * *'
push:
branches:
- 'main'
- 'renovate/**'
tags:
- 'v*.*.*'
pull_request:
branches:
- 'main'
permissions:
contents: read
jobs:
govulncheck:
name: Govulncheck
runs-on: ubuntu-latest
steps:
- name: Checkout GitHub Repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Analyze source code
uses: golang/govulncheck-action@b625fbe08f3bccbe446d94fbf87fcc875a4f50ee # v1.0.4
with:
go-version-file: './go.mod'
repo-checkout: false
trivy:
name: Trivy
if: ${{ github.event.schedule || (github.event_name == 'push' && github.ref_name == 'main') }}
runs-on: ubuntu-latest
permissions:
# For actions/checkout to fetch code
contents: read
# For github/codeql-action/upload-sarif to upload SARIF results
security-events: write
steps:
- name: Checkout GitHub Repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Build image from Dockerfile
run: |
docker build --tag juanjjaramillo/testbed:${{ github.sha }} .
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
with:
image-ref: 'juanjjaramillo/testbed:${{ github.sha }}'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@48ab28a6f5dbc2a99bf1e0131198dd8f1df78169 # v3.28.0
with:
sarif_file: 'trivy-results.sarif'
openssf:
name: OpenSSF Scorecard
if: ${{ github.event.schedule || (github.event_name == 'push' && github.ref_name == 'main') }}
runs-on: ubuntu-latest
permissions:
# Needed to publish results and get a badge (see publish_results below)
id-token: write
# For actions/checkout to fetch code
contents: read
# For github/codeql-action/upload-sarif to upload SARIF results
security-events: write
steps:
- name: Checkout GitHub Repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
persist-credentials: false
- name: Run analysis
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
with:
results_file: results.sarif
results_format: sarif
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
# - you want to enable the Branch-Protection check on a *public* repository, or
# - you are installing Scorecard on a *private* repository
# To create the PAT, follow the steps in
# https://github.com/ossf/scorecard-action#authentication-with-pat
repo_token: ${{ secrets.SCORECARD_TOKEN }}
# Public repositories:
# - Publish results to OpenSSF REST API for easy access by consumers
# - Allows the repository to include the Scorecard badge.
# - See https://github.com/ossf/scorecard-action#publishing-results
# For private repositories:
# - `publish_results` will always be set to `false`, regardless
# of the value entered here
publish_results: true
- name: Upload artifact
uses: actions/upload-artifact@6f51ac03b9356f520e9adb1b1b7802705f340c2b # v4.5.0
with:
name: SARIF file
path: results.sarif
retention-days: 5
- name: Upload OSSF Scorecard scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@48ab28a6f5dbc2a99bf1e0131198dd8f1df78169 # v3.28.0
with:
sarif_file: results.sarif