fix: docker workflow security upload (#1951)
* Fix artifact upload paths for CodeQL and SBOM results - Correct CodeQL SARIF path from **/results to ../results (relative to workspace) - Add fallback path for SBOM to handle different generation locations - This should resolve the 'No files were found' warnings for artifacts * Test commit to trigger Security Analysis workflow with fixed artifact paths * Update docker.yaml * Update security.yaml * Update security.yaml
This commit is contained in:
12
.github/workflows/docker.yaml
vendored
12
.github/workflows/docker.yaml
vendored
@@ -61,18 +61,6 @@ jobs:
|
|||||||
tags: ${{ steps.meta.outputs.tags }}
|
tags: ${{ steps.meta.outputs.tags }}
|
||||||
labels: ${{ steps.meta.outputs.labels }}
|
labels: ${{ steps.meta.outputs.labels }}
|
||||||
|
|
||||||
- name: Run Trivy vulnerability scanner
|
|
||||||
uses: aquasecurity/trivy-action@master
|
|
||||||
with:
|
|
||||||
image-ref: ${{ env.REGISTRY }}/${{ steps.image.outputs.name }}:${{ steps.meta.outputs.version }}
|
|
||||||
format: 'sarif'
|
|
||||||
output: 'trivy-results.sarif'
|
|
||||||
|
|
||||||
- name: Upload Trivy scan results to GitHub Security
|
|
||||||
uses: github/codeql-action/upload-sarif@v3
|
|
||||||
if: always()
|
|
||||||
with:
|
|
||||||
sarif_file: 'trivy-results.sarif'
|
|
||||||
|
|
||||||
- name: Check manifest
|
- name: Check manifest
|
||||||
run: docker buildx imagetools inspect ${{ env.REGISTRY }}/${{ steps.image.outputs.name }}:${{ steps.meta.outputs.version }}
|
run: docker buildx imagetools inspect ${{ env.REGISTRY }}/${{ steps.image.outputs.name }}:${{ steps.meta.outputs.version }}
|
||||||
15
.github/workflows/security.yaml
vendored
15
.github/workflows/security.yaml
vendored
@@ -18,7 +18,7 @@ jobs:
|
|||||||
codeql:
|
codeql:
|
||||||
name: CodeQL Analysis
|
name: CodeQL Analysis
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
timeout-minutes: 360
|
timeout-minutes: 45
|
||||||
|
|
||||||
strategy:
|
strategy:
|
||||||
fail-fast: false
|
fail-fast: false
|
||||||
@@ -35,23 +35,22 @@ jobs:
|
|||||||
languages: ${{ matrix.language }}
|
languages: ${{ matrix.language }}
|
||||||
queries: security-extended,security-and-quality
|
queries: security-extended,security-and-quality
|
||||||
|
|
||||||
- name: Setup and Build
|
- name: Autobuild
|
||||||
uses: ./.github/actions/setup-and-build
|
uses: github/codeql-action/autobuild@v3
|
||||||
|
|
||||||
- name: Perform CodeQL Analysis
|
- name: Perform CodeQL Analysis
|
||||||
uses: github/codeql-action/analyze@v3
|
uses: github/codeql-action/analyze@v3
|
||||||
with:
|
with:
|
||||||
category: "/language:${{matrix.language}}"
|
category: "/language:${{matrix.language}}"
|
||||||
upload: false
|
upload: false
|
||||||
|
output: "codeql-results"
|
||||||
|
|
||||||
- name: Upload CodeQL results as artifact
|
- name: Upload CodeQL results as artifact
|
||||||
uses: actions/upload-artifact@v4
|
uses: actions/upload-artifact@v4
|
||||||
if: always()
|
if: always()
|
||||||
with:
|
with:
|
||||||
name: codeql-results-${{ matrix.language }}
|
name: codeql-results-${{ matrix.language }}
|
||||||
path: |
|
path: codeql-results
|
||||||
**/results/**/*.sarif
|
|
||||||
**/results/**/*.sarif.json
|
|
||||||
|
|
||||||
dependency-scan:
|
dependency-scan:
|
||||||
name: Dependency Vulnerability Scan
|
name: Dependency Vulnerability Scan
|
||||||
@@ -90,7 +89,9 @@ jobs:
|
|||||||
if: always()
|
if: always()
|
||||||
with:
|
with:
|
||||||
name: sbom-results
|
name: sbom-results
|
||||||
path: sbom.spdx.json
|
path: |
|
||||||
|
sbom.spdx.json
|
||||||
|
**/sbom.spdx.json
|
||||||
|
|
||||||
secrets-scan:
|
secrets-scan:
|
||||||
name: Secrets Detection
|
name: Secrets Detection
|
||||||
|
|||||||
@@ -366,3 +366,4 @@ For answers to common questions, issues, and to see a list of recommended models
|
|||||||
**Who needs a commercial WebContainer API license?**
|
**Who needs a commercial WebContainer API license?**
|
||||||
|
|
||||||
bolt.diy source code is distributed as MIT, but it uses WebContainers API that [requires licensing](https://webcontainers.io/enterprise) for production usage in a commercial, for-profit setting. (Prototypes or POCs do not require a commercial license.) If you're using the API to meet the needs of your customers, prospective customers, and/or employees, you need a license to ensure compliance with our Terms of Service. Usage of the API in violation of these terms may result in your access being revoked.
|
bolt.diy source code is distributed as MIT, but it uses WebContainers API that [requires licensing](https://webcontainers.io/enterprise) for production usage in a commercial, for-profit setting. (Prototypes or POCs do not require a commercial license.) If you're using the API to meet the needs of your customers, prospective customers, and/or employees, you need a license to ensure compliance with our Terms of Service. Usage of the API in violation of these terms may result in your access being revoked.
|
||||||
|
# Test commit to trigger Security Analysis workflow
|
||||||
|
|||||||
Reference in New Issue
Block a user