Skip to content
This repository has been archived by the owner on Oct 3, 2024. It is now read-only.

Commit

Permalink
Upadte CI
Browse files Browse the repository at this point in the history
Signed-off-by: bytemare <[email protected]>
  • Loading branch information
bytemare committed Jul 7, 2024
1 parent 8592b9b commit 58a7a92
Show file tree
Hide file tree
Showing 9 changed files with 98 additions and 283 deletions.
27 changes: 0 additions & 27 deletions .github/dependency-review.yml

This file was deleted.

8 changes: 8 additions & 0 deletions .github/sonar-project.properties
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
sonar.organization=bytemare
sonar.projectKey=crypto
sonar.sources=.
sonar.tests=tests/
sonar.test.exclusions=tests/**
sonar.verbose=true
sonar.coverage.exclusions=tests/**
sonar.go.coverage.reportPaths=coverage.out
130 changes: 0 additions & 130 deletions .github/workflows/ci.yml

This file was deleted.

36 changes: 36 additions & 0 deletions .github/workflows/code-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
name: Code Scan

on:
push:
branches:
- main
pull_request:
branches:
- main
schedule:
# random HH:MM to avoid a load spike on GitHub Actions at 00:00
- cron: '4 1 * * *'

permissions: {}

jobs:
Lint:
permissions:
contents: read
uses: bytemare/workflows/.github/workflows/golangci-lint.yml@488639cc8162524432d0c8257cd1adf7d05b90c9
with:
config-path: ./.github/.golangci.yml
scope: ./...

Analyze:
permissions:
contents: read
uses: bytemare/workflows/.github/workflows/scan-go.yml@488639cc8162524432d0c8257cd1adf7d05b90c9
with:
sonar-configuration: .github/sonar-project.properties
coverage-output-file: coverage.out
secrets:
github: ${{ secrets.GITHUB_TOKEN }}
sonar: ${{ secrets.SONAR_TOKEN }}
codecov: ${{ secrets.CODECOV_TOKEN }}
semgrep: ${{ secrets.SEMGREP_APP_TOKEN }}
34 changes: 5 additions & 29 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,38 +10,14 @@ on:
schedule:
- cron: '31 10 * * 0'

permissions:
contents: read
permissions: {}

jobs:
codeql:
name: CodeQL
runs-on: ubuntu-latest
CodeQL:
permissions:
actions: read
contents: read
security-events: write

strategy:
fail-fast: false

steps:
- uses: step-security/harden-runner@6d3c2fe731c8f225990c8018cb71c337c0d9dfcd
with:
disable-sudo: true
egress-policy: audit

- name: Checkout repository
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@bd2ebac9380cbba2fb338fab55bf29a2a18fd436
with:
languages: go

- name: Autobuild
uses: github/codeql-action/autobuild@bd2ebac9380cbba2fb338fab55bf29a2a18fd436

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@bd2ebac9380cbba2fb338fab55bf29a2a18fd436
uses: bytemare/workflows/.github/workflows/codeql.yml@488639cc8162524432d0c8257cd1adf7d05b90c9
with:
language: go
87 changes: 26 additions & 61 deletions .github/workflows/scorecards.yml
Original file line number Diff line number Diff line change
@@ -1,74 +1,39 @@
name: Scorecard analysis workflow
name: Scorecard Analysis Workflow

on:
# Only the default branch is supported.
branch_protection_rule:
push:
branches:
- main
pull_request:
branches:
- main
schedule:
# Weekly on Saturdays.
- cron: '30 1 * * 6'
push:
branches: [ main ]

# Declare default permissions as read only.
permissions: read-all
permissions: {}

jobs:
analysis:
name: Scorecard analysis
runs-on: ubuntu-latest
permissions:
# Needed if using Code scanning alerts
security-events: write
# Needed for GitHub OIDC token if publish_results is true
id-token: write

steps:
- uses: step-security/harden-runner@6d3c2fe731c8f225990c8018cb71c337c0d9dfcd
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
api.osv.dev:443
api.securityscorecards.dev:443
fulcio.sigstore.dev:443
github.com:443
oss-fuzz-build-logs.storage.googleapis.com:443
rekor.sigstore.dev:443
tuf-repo-cdn.sigstore.dev:443
www.bestpractices.dev:443
- name: "Checkout code"
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
with:
persist-credentials: false

- name: "Run analysis"
uses: ossf/scorecard-action@0a8153a7e8d76932ff5903ccdbed894237ef223d
with:
results_file: results.sarif
results_format: sarif
# (Optional) fine-grained personal access token. Uncomment the `repo_token` line below if:
# - you want to enable the Branch-Protection check on a *public* repository, or
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-fine-grained-pat-optional.
repo_token: ${{ secrets.SCORECARD_TOKEN }}

# Publish the results for public repositories to enable scorecard badges. For more details, see
# https://github.com/ossf/scorecard-action#publishing-results.
# For private repositories, `publish_results` will automatically be set to `false`, regardless
# of the value entered here.
publish_results: true

# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
uses: actions/upload-artifact@552bf3722c16e81001aea7db72d8cedf64eb5f68
with:
name: SARIF file
path: results.sarif
retention-days: 5

# required for Code scanning alerts
- name: "Upload SARIF results to code scanning"
uses: github/codeql-action/upload-sarif@bd2ebac9380cbba2fb338fab55bf29a2a18fd436
with:
sarif_file: results.sarif
# Needed for nested workflow
actions: read
attestations: read
checks: read
contents: read
deployments: read
issues: read
discussions: read
packages: read
pages: read
pull-requests: read
repository-projects: read
statuses: read

uses: bytemare/workflows/.github/workflows/scorecard.yml@488639cc8162524432d0c8257cd1adf7d05b90c9
secrets:
token: ${{ secrets.SCORECARD_TOKEN }}
35 changes: 0 additions & 35 deletions .github/workflows/snyk.yml

This file was deleted.

Loading

0 comments on commit 58a7a92

Please sign in to comment.