diff --git a/.github/workflows/container-scan.yml b/.github/workflows/container-scan.yml new file mode 100644 index 00000000..a375f317 --- /dev/null +++ b/.github/workflows/container-scan.yml @@ -0,0 +1,27 @@ +name: Container Scan + +on: + schedule: + - cron: "30 17 * * 4" + workflow_dispatch: + +jobs: + trivy: + runs-on: ubuntu-latest + steps: + - name: Scan Alpine image + uses: aquasecurity/trivy-action@master + with: + image-ref: ghcr.io/claabs/epicgames-freegames-node:latest + format: sarif + output: sarif-results/alpine.sarif + - name: Scan Debian image + uses: aquasecurity/trivy-action@master + with: + image-ref: ghcr.io/claabs/epicgames-freegames-node:debian + format: sarif + output: sarif-results/debian.sarif + - name: Upload Trivy scan results to GitHub Security tab + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: sarif-results \ No newline at end of file diff --git a/.github/workflows/snyk-container-analysis.yml b/.github/workflows/snyk-container-analysis.yml deleted file mode 100644 index e11d42df..00000000 --- a/.github/workflows/snyk-container-analysis.yml +++ /dev/null @@ -1,57 +0,0 @@ -# A sample workflow which checks out the code, builds a container -# image using Docker and scans that image for vulnerabilities using -# Snyk. The results are then uploaded to GitHub Security Code Scanning -# -# For more examples, including how to limit scans to only high-severity -# issues, monitor images for newly disclosed vulnerabilities in Snyk and -# fail PR checks for new vulnerabilities, see https://github.com/snyk/actions/ - -name: Snyk Container - -on: - # push: - # branches: [ master ] - # paths: - # - package*.json - # - src/** - # - Dockerfile - schedule: - - cron: "30 17 * * 4" - -jobs: - snyk: - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v4 - # - name: Build a Docker image - # run: docker build -t ghcr.io/claabs/epicgames-freegames-node:latest . - - name: Scan Alpine image - # Snyk can be used to break the build when it detects vulnerabilities. - # In this case we want to upload the issues to GitHub Code Scanning - continue-on-error: true - uses: snyk/actions/docker@master - env: - # In order to use the Snyk Action you will need to have a Snyk API token. - # More details in https://github.com/snyk/actions#getting-your-snyk-token - # or you can signup for free at https://snyk.io/login - SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} - with: - image: ghcr.io/claabs/epicgames-freegames-node:latest - args: --file=Dockerfile - - name: Scan Debian image - # Snyk can be used to break the build when it detects vulnerabilities. - # In this case we want to upload the issues to GitHub Code Scanning - continue-on-error: true - uses: snyk/actions/docker@master - env: - # In order to use the Snyk Action you will need to have a Snyk API token. - # More details in https://github.com/snyk/actions#getting-your-snyk-token - # or you can signup for free at https://snyk.io/login - SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} - with: - image: ghcr.io/claabs/epicgames-freegames-node:bullseye-slim - args: --file=Dockerfile.debian - - name: Upload result to GitHub Code Scanning - uses: github/codeql-action/upload-sarif@v3 - with: - sarif_file: snyk.sarif