forked from solacecommunity/solace-prometheus-exporter
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Automated vulnerability scan with Prisma
- Loading branch information
1 parent
1e1e255
commit 429325c
Showing
2 changed files
with
131 additions
and
9 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,121 @@ | ||
name: Vuln check | ||
on: | ||
schedule: | ||
- cron: '0 */6 * * *' | ||
|
||
permissions: | ||
contents: read | ||
security-events: write | ||
|
||
jobs: | ||
vuln-check: | ||
runs-on: ubuntu-latest | ||
permissions: | ||
contents: 'write' | ||
id-token: 'write' | ||
env: | ||
IMAGE_NAME: pubsubplus-prometheus-exporter | ||
VERSION: v1.0.2-dev | ||
VAULT_ADDR: https://vault.maas-vault-prod.solace.cloud:8200 | ||
GCLOUD_PROJECT_ID_DEV: stellar-arcadia-205014 | ||
GCLOUD_PROJECT_ID_STAGING: gcp-maas-staging | ||
GCLOUD_PROJECT_ID_PROD: gcp-maas-prod | ||
|
||
steps: | ||
- name: Set up Go | ||
uses: actions/setup-go@v3 | ||
with: | ||
go-version: "1.20" | ||
|
||
- name: Check out code | ||
uses: actions/checkout@v2 | ||
|
||
- name: Run Whitesource Action | ||
uses: SolaceDev/[email protected] | ||
with: | ||
wssURL: https://saas.whitesourcesoftware.com/agent | ||
apiKey: ${{ secrets.WSS_API_KEY }} | ||
productName: '${{ env.IMAGE_NAME }}' | ||
projectName: '${{ env.IMAGE_NAME }}' | ||
configFile: 'ci/whitesource/whitesource-agent.config' | ||
|
||
- name: Set up Docker Buildx | ||
id: buildx | ||
uses: docker/setup-buildx-action@v2 | ||
|
||
- name: Checkout SolaceDev/maas-build-actions | ||
uses: actions/checkout@v2 | ||
with: | ||
repository: SolaceDev/maas-build-actions | ||
ref: refs/heads/master | ||
token: ${{ secrets.RELEASE_GITHUB_TOKEN }} | ||
persist-credentials: false | ||
path: maas-build-actions | ||
|
||
- name: Retrieve google container registry secrets | ||
id: docker_registry_secrets | ||
uses: hashicorp/[email protected] | ||
with: | ||
url: "${{ env.VAULT_ADDR }}" | ||
role: github-docker-secrets-read-role | ||
method: jwt | ||
path: jwt-github | ||
jwtGithubAudience: https://github.com/SolaceDev | ||
exportToken: true | ||
secrets: | | ||
secret/data/development/gcp-gcr GCP_SERVICE_ACCOUNT | GCP_DEV_SERVICE_ACCOUNT; | ||
secret/data/staging/gcp-gcr GCP_SERVICE_ACCOUNT | GCP_STAGE_SERVICE_ACCOUNT; | ||
secret/data/production/gcp-gcr GCP_SERVICE_ACCOUNT | GCP_PROD_SERVICE_ACCOUNT | ||
- name: Log in to gcr development docker registry | ||
uses: docker/login-action@f054a8b539a109f9f41c372932f1ae047eff08c9 | ||
with: | ||
registry: gcr.io | ||
username: _json_key | ||
password: ${{ steps.docker_registry_secrets.outputs.GCP_DEV_SERVICE_ACCOUNT }} | ||
|
||
- name: Build image and push Google Container Registry | ||
uses: docker/build-push-action@v2 | ||
with: | ||
context: ./ | ||
tags: | | ||
gcr.io/${{ env.GCLOUD_PROJECT_ID_DEV }}/${{ env.IMAGE_NAME }}:${{ github.event.inputs.release_tag }} | ||
push: true | ||
|
||
- name: Run Prisma Vulnerability Checker Action | ||
uses: ./maas-build-actions/.github/actions/prisma-vulnerability-checker | ||
with: | ||
docker_image_to_check: gcr.io/${{ env.GCLOUD_PROJECT_ID_DEV }}/${{ env.IMAGE_NAME }}:${{ env.VERSION }} | ||
prisma_repository_name: "${{ env.GCLOUD_PROJECT_ID_DEV }}/${{ env.IMAGE_NAME }}" | ||
project_squad: "mission-control" | ||
prisma_jira_check: "False" | ||
|
||
- name: Run Trivy vulnerability scanner | ||
uses: aquasecurity/trivy-action@master | ||
with: | ||
image-ref: ghcr.io/solacedev/${{ env.IMAGE_NAME }}:${{ github.event.inputs.release_tag }} | ||
format: 'sarif' | ||
severity: 'CRITICAL,HIGH' | ||
output: 'trivy-results.sarif' | ||
|
||
- name: Uploads Trivy Scan Reports | ||
if: ${{ !startsWith(github.ref_name, '1.') }} | ||
uses: actions/upload-artifact@v2 | ||
with: | ||
path: | | ||
trivy-results.sarif | ||
- name: Login to Github Packages | ||
uses: docker/login-action@v2 | ||
with: | ||
registry: ghcr.io | ||
username: ${{ github.actor }} | ||
password: ${{ secrets.RELEASE_GITHUB_TOKEN }} | ||
|
||
- name: Build image and push GitHub Container Registry | ||
uses: docker/build-push-action@v2 | ||
with: | ||
context: ./ | ||
tags: | | ||
ghcr.io/solacedev/${{ env.IMAGE_NAME }}:${{ github.event.inputs.release_tag }} | ||
push: true |