From 9abc170cfe6e23dec635f3be41376f1c9013ea39 Mon Sep 17 00:00:00 2001 From: rugk Date: Sat, 5 Jun 2021 00:15:24 +0200 Subject: [PATCH] Add Anchor security scan The tool seems to cover JS, which is useful for us and standard container dependencies. https://github.com/anchore/grype --- .github/workflows/anchore-analysis.yml | 34 ++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 .github/workflows/anchore-analysis.yml diff --git a/.github/workflows/anchore-analysis.yml b/.github/workflows/anchore-analysis.yml new file mode 100644 index 0000000..03a623b --- /dev/null +++ b/.github/workflows/anchore-analysis.yml @@ -0,0 +1,34 @@ +# This workflow checks out code, builds an image, performs a container image +# vulnerability scan with Anchore's Grype tool, and integrates the results with GitHub Advanced Security +# code scanning feature. For more information on the Anchore scan action usage +# and parameters, see https://github.com/anchore/scan-action. For more +# information on Anchore's container image scanning tool Grype, see +# https://github.com/anchore/grype +name: Anchore Container Scan + +on: + push: + branches: [ master ] + pull_request: + # The branches below must be a subset of the branches above + branches: [ master ] + schedule: + - cron: '42 22 * * 5' + +jobs: + Anchore-Build-Scan: + runs-on: ubuntu-latest + steps: + - name: Checkout the code + uses: actions/checkout@v2 + - name: Build the Docker image + run: docker build . --file Dockerfile --tag privatebin/nginx-fpm-alpine:latest + - name: Run the Anchore scan action itself with GitHub Advanced Security code scanning integration enabled + uses: anchore/scan-action@main + with: + image: "privatebin/nginx-fpm-alpine:latest" + acs-report-enable: true + - name: Upload Anchore Scan Report + uses: github/codeql-action/upload-sarif@v1 + with: + sarif_file: results.sarif