Skip to content

Commit cb6476b

Browse files
committed
CI: code analysis and vulnerability check
Signed-off-by: adityajoshi12 <[email protected]>
1 parent f678258 commit cb6476b

File tree

3 files changed

+78
-0
lines changed

3 files changed

+78
-0
lines changed

Diff for: .github/dependabot.yml

+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# To get started with Dependabot version updates, you'll need to specify which
2+
# package ecosystems to update and where the package manifests are located.
3+
# Please see the documentation for all configuration options:
4+
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
5+
6+
version: 2
7+
updates:
8+
- package-ecosystem: "github-actions" # See documentation for possible values
9+
directory: "/" # Location of package manifests
10+
schedule:
11+
interval: "weekly"

Diff for: .github/workflows/codeql.yml

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
name: "Code Scanning - Analysis"
2+
3+
on:
4+
pull_request:
5+
branches:
6+
- main
7+
push:
8+
branches:
9+
- main
10+
11+
jobs:
12+
CodeQL-Build:
13+
runs-on: ubuntu-latest
14+
15+
permissions:
16+
security-events: write
17+
18+
steps:
19+
- name: Checkout repository
20+
uses: actions/checkout@v3
21+
22+
- name: Setup Java
23+
uses: actions/setup-java@v3
24+
with:
25+
distribution: 'adopt-openj9'
26+
java-version: '11'
27+
check-latest: true
28+
29+
- name: Initialize CodeQL
30+
uses: github/codeql-action/init@v2
31+
with:
32+
languages: java
33+
34+
- name: Autobuild
35+
uses: github/codeql-action/autobuild@v2
36+
37+
- name: Perform CodeQL Analysis
38+
uses: github/codeql-action/analyze@v2

Diff for: .github/workflows/scan.yml

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
name: "Code Scan - Security"
2+
on:
3+
pull_request:
4+
branches:
5+
- main
6+
push:
7+
branches:
8+
- main
9+
jobs:
10+
build:
11+
name: Build
12+
runs-on: ubuntu-20.04
13+
steps:
14+
- name: Checkout code
15+
uses: actions/checkout@v3
16+
17+
- name: Run Trivy vulnerability scanner in repo mode
18+
uses: aquasecurity/trivy-action@master
19+
with:
20+
scan-type: 'fs'
21+
ignore-unfixed: true
22+
format: 'sarif'
23+
output: 'trivy-results.sarif'
24+
severity: 'CRITICAL'
25+
26+
- name: Upload Trivy scan results to GitHub Security tab
27+
uses: github/codeql-action/upload-sarif@v2
28+
with:
29+
sarif_file: 'trivy-results.sarif'

0 commit comments

Comments
 (0)