Skip to content

Commit

Permalink
ci: add container scanning to default checks
Browse files Browse the repository at this point in the history
Signed-off-by: aldousalvarez <aldousss.alvarez@gmail.com>
  • Loading branch information
aldousalvarez committed May 2, 2022
1 parent 865ec2f commit eaab9c6
Show file tree
Hide file tree
Showing 2 changed files with 167 additions and 0 deletions.
26 changes: 26 additions & 0 deletions .github/containerscan/allowedlist.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
general:
vulnerabilities:
- CVE-2003-1307
- CVE-2007-0086
- CVE-2019-3462
- CVE-2011-3374
- CVE-2022-24771
- CVE-2022-24772
- CVE-2021-32803
- CVE-2021-32804
- CVE-2021-37701
- CVE-2021-37712
- CVE-2021-37713
- CVE-2019-10773
- CVE-2020-8131
- CVE-2021-43138
- CVE-2022-22143
- CVE-2021-3807
bestPracticeViolations:
- DKL-LI-0003
- CIS-DI-0006
- DKL-DI-0006
- CIS-DI-0010
- CIS-DI-0001
- DKL-DI-0005
- CIS-DI-0008
141 changes: 141 additions & 0 deletions .github/workflows/azure-container-scan.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,141 @@
name: azure-container-image-scan

on:
push:
pull_request:
# Publish `main` as Docker `latest` image.
branches:
- main

# Publish `v1.2.3` tags as releases.
tags:
- v*

jobs:
build-secure-and-push:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@master
env:
# (Required) The token to use to make API calls to GitHub.
GITHUB_TOKEN: "${{ secrets.GITHUB_TOKEN }}"

- uses: actions/checkout@v1
- name: Login to DockerHub Registry
run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-besu-all-in-one
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-whitepaper
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin
# - name: Build Image of ghcr.io/hyperledger/cactus-cmd-api-server
# run: DOCKER_BUILDKIT=1 docker build -f ./packages/cactus-cmd-api-server/Dockerfile -t cactus-cmd-api-server .

- name: Build Images from Dockerfile
run: |
DOCKER_BUILDKIT=1 docker build -f ./packages/cactus-cmd-api-server/Dockerfile -t cactus-cmd-api-server .
DOCKER_BUILDKIT=1 docker build -f ./whitepaper/Dockerfile -t cactus-whitepaper .
- uses: Azure/container-scan@v0.1
with:
image-name: cactus-cmd-api-server

# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@master
# with:
# image-name: ./cactus-cmd-api-server
# ignore-unfixed: true;


# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@master
# with:
# scan-ref: '.github/workflows/*-publish.yaml'
# ignore-unfixed: true

# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin export

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-connector-fabric
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-connector-corda-server
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-connector-besu
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: corda-4-6-all-in-one-obligation
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-corda-4-7-all-in-one-obligation
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: corda-4-8-all-in-one-obligation-publish
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-dev-container-vscode
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-example-carbon-accounting
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-example-supply-chain-app
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-fabric-all-in-one
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-fabric2-all-in-one
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-iroha-all-in-one
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-keychain-vault-server
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-quorum-all-in-one
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-rust-compiler
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

# - uses: Azure/container-scan@v0.1
# with:
# image-name: cactus-test-npm-registry
# run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin

0 comments on commit eaab9c6

Please sign in to comment.