ci: check that the changelog is populated on each pull request #3694
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Scan latest app and container | |
on: | |
push: | |
pull_request: | |
branches: [ main ] | |
schedule: | |
- cron: '0 0 * * *' # Run every day at 00:00 UTC. | |
workflow_dispatch: | |
jobs: | |
security-scan-container: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v4 | |
- name: Install container build dependencies | |
run: sudo apt install pipx && pipx install poetry | |
- name: Build container image | |
run: python3 ./install/common/build-image.py --runtime docker --no-save | |
# NOTE: Scan first without failing, else we won't be able to read the scan | |
# report. | |
- name: Scan container image (no fail) | |
uses: anchore/scan-action@v5 | |
id: scan_container | |
with: | |
image: "dangerzone.rocks/dangerzone:latest" | |
fail-build: false | |
only-fixed: false | |
severity-cutoff: critical | |
- name: Upload container scan report | |
uses: github/codeql-action/upload-sarif@v3 | |
with: | |
sarif_file: ${{ steps.scan_container.outputs.sarif }} | |
category: container | |
- name: Inspect container scan report | |
run: cat ${{ steps.scan_container.outputs.sarif }} | |
- name: Scan container image | |
uses: anchore/scan-action@v5 | |
with: | |
image: "dangerzone.rocks/dangerzone:latest" | |
fail-build: true | |
only-fixed: false | |
severity-cutoff: critical | |
security-scan-app: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v4 | |
# NOTE: Scan first without failing, else we won't be able to read the scan | |
# report. | |
- name: Scan application (no fail) | |
uses: anchore/scan-action@v5 | |
id: scan_app | |
with: | |
path: "." | |
fail-build: false | |
only-fixed: false | |
severity-cutoff: critical | |
- name: Upload application scan report | |
uses: github/codeql-action/upload-sarif@v3 | |
with: | |
sarif_file: ${{ steps.scan_app.outputs.sarif }} | |
category: app | |
- name: Inspect application scan report | |
run: cat ${{ steps.scan_app.outputs.sarif }} | |
- name: Scan application | |
uses: anchore/scan-action@v5 | |
with: | |
path: "." | |
fail-build: true | |
only-fixed: false | |
severity-cutoff: critical |