From 8c365c330ae1b16d0e80ad3ea30ab5237ae8faf7 Mon Sep 17 00:00:00 2001 From: Nathan Miller Date: Sat, 21 Oct 2023 10:00:00 -0700 Subject: [PATCH] add Docker Scout scan and compare workflow --- .github/workflows/docker-scout-scan.yml | 135 ++++++++++++++++++++++++ 1 file changed, 135 insertions(+) create mode 100644 .github/workflows/docker-scout-scan.yml diff --git a/.github/workflows/docker-scout-scan.yml b/.github/workflows/docker-scout-scan.yml new file mode 100644 index 00000000..40a4e14b --- /dev/null +++ b/.github/workflows/docker-scout-scan.yml @@ -0,0 +1,135 @@ +name: Docker Scout Scan + +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. + +on: + push: + branches: [ "development", "main", "release" ] + pull_request: + branches: [ "development", "main", "release" ] + +env: + # Use docker.io for Docker Hub if empty + REGISTRY: ghcr.io + # github.repository as / + IMAGE_NAME: ${{ github.repository }} + #VCPKG_BINARY_SOURCES: 'clear;nuget,GitHub,readwrite' + + +jobs: + build: + name: Docker-Scout-Scan + + runs-on: ubuntu-latest + permissions: + contents: read + packages: write + # This is used to complete the identity challenge + # with sigstore/fulcio when running outside of PRs. + id-token: write + + steps: + - name: Checkout repository + uses: actions/checkout@v3 + + # add problem matchers + - name: Add Problem Matchers + uses: ammaraskar/gcc-problem-matcher@master + + # Install the cosign tool except on PR + # https://github.com/sigstore/cosign-installer + - name: Install cosign + if: github.event_name != 'pull_request' + uses: sigstore/cosign-installer@f3c664df7af409cb4873aa5068053ba9d61a57b6 #v2.6.0 + with: + cosign-release: 'v1.13.1' + + # Workaround: https://github.com/docker/build-push-action/issues/461 + - name: Setup Docker buildx + uses: docker/setup-buildx-action@79abd3f86f79a9d68a23c75a09a9a85889262adf + + # Login against a Docker registry except on PR + # https://github.com/docker/login-action + - name: Log into registry ${{ env.REGISTRY }} + if: github.event_name != 'pull_request' + uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c + with: + registry: ${{ env.REGISTRY }} + username: ${{ github.actor }} + password: ${{ secrets.GITHUB_TOKEN }} + + # Extract metadata (tags, labels) for Docker + # https://github.com/docker/metadata-action + - name: Extract Docker metadata + id: meta + uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38 + with: + images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} + tags: | + type=ref,event=pr + type=ref,event=branch,suffix=-${{github.run_number}} + type=ref,event=branch,suffix=-latest + + # Build and push Docker image with Buildx (don't push on PR) + # https://github.com/docker/build-push-action + - name: Build and push Docker image + id: build-and-push + uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a + with: + context: . + push: ${{ github.event_name != 'pull_request' }} + tags: ${{ steps.meta.outputs.tags }} + labels: ${{ steps.meta.outputs.labels }} + cache-from: type=gha + cache-to: type=gha,mode=max + file: Dockerfile_OdbDesignServer + build-args: | + OWNER=nam20485 + GITHUB_TOKEN=${{ secrets.GITHUB_TOKEN }} + VCPKG_BINARY_SOURCES=clear;nuget,GitHub,readwrite + + # Sign the resulting Docker image digest except on PRs. + # This will only write to the public Rekor transparency log when the Docker + # repository is public to avoid leaking data. If you would like to publish + # transparency data even for private images, pass --force to cosign below. + # https://github.com/sigstore/cosign + - name: Sign the published Docker image + if: ${{ github.event_name != 'pull_request' }} + env: + COSIGN_EXPERIMENTAL: "true" + # This step uses the identity token to provision an ephemeral certificate + # against the sigstore community Fulcio instance. + run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign {}@${{ steps.build-and-push.outputs.digest }} + + - name: Analyze for critical and high CVEs + id: docker-scout-cves + if: ${{ github.event_name != 'pull_request_target' }} + uses: docker/scout-action@v1 + with: + command: cves + image: ${{ steps.meta.outputs.tags }} + sarif-file: sarif.output.json + summary: true + + - name: Upload SARIF result + id: upload-sarif + if: ${{ github.event_name != 'pull_request_target' }} + uses: github/codeql-action/upload-sarif@v2 + with: + sarif_file: sarif.output.json + + - name: Docker Scout Compare to Latest + id: docker-scout + if: ${{ github.event_name == 'pull_request' }} + uses: docker/scout-action@v1 + with: + command: compare + image: ${{ steps.meta.outputs.tags }} + to: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.COMPARE_TAG }} + ignore-unchanged: true + only-severities: critical,high + write-comment: true + github-token: ${{ secrets.GITHUB_TOKEN }} # to be able to write the comment