Skip to content

Commit 93e0357

Browse files
added msdo + container scanning
1 parent 5c654b3 commit 93e0357

2 files changed

Lines changed: 54 additions & 37 deletions

File tree

.github/workflows/oss_pygoat-devsecops-advanced.yml

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,11 @@ on:
66
workflow_dispatch:
77

88
permissions:
9-
id-token: write
10-
contents: read
9+
# The permissions for azure federation
10+
#id-token: write
11+
#contents: read
12+
# write to security events
13+
security-events: write
1114

1215
env:
1316
#DEFECTDOJO_PRODUCTID: 4
@@ -194,6 +197,13 @@ jobs:
194197
- name: Push Docker image ${{ env.image }}:latest
195198
if: env.pushDockerImage == 'true'
196199
run: docker push ${{ env.image }}:latest
200+
# - name: Aqua Security Trivy
201+
# # You may pin to the exact commit or the version.
202+
# # uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2
203+
# uses: aquasecurity/trivy-action@0.21.0
204+
# with:
205+
# # image reference(for backward compatibility)
206+
# image-ref: ${{ env.image }}:latest
197207
devsecops-tasks:
198208
name: Do DevSecOps Tasks
199209
needs:
@@ -225,6 +235,13 @@ jobs:
225235
# vulnerability-check: true # optional
226236
# # Show a summary of the OpenSSF Scorecard scores.
227237
# show-openssf-scorecard: true # optional
238+
# - name: Run Microsoft Security DevOps
239+
# uses: microsoft/security-devops-action@v1
240+
# id: msdo
241+
# - name: Upload results to Security tab
242+
# uses: github/codeql-action/upload-sarif@v2
243+
# with:
244+
# sarif_file: ${{ steps.msdo.outputs.sarifFile }}
228245
test-run_devopsshield_scan_linux:
229246
name: Run DevOps Shield Scan Linux
230247
needs:

.github/workflows/oss_pygoat-devsecops-basic.yml

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -138,13 +138,13 @@ jobs:
138138
- name: Push Docker image ${{ env.image }}:latest
139139
if: env.pushDockerImage == 'true'
140140
run: docker push ${{ env.image }}:latest
141-
- name: Aqua Security Trivy
142-
# You may pin to the exact commit or the version.
143-
# uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2
144-
uses: aquasecurity/trivy-action@0.21.0
145-
with:
146-
# image reference(for backward compatibility)
147-
image-ref: ${{ env.image }}:latest
141+
# - name: Aqua Security Trivy
142+
# # You may pin to the exact commit or the version.
143+
# # uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2
144+
# uses: aquasecurity/trivy-action@0.21.0
145+
# with:
146+
# # image reference(for backward compatibility)
147+
# image-ref: ${{ env.image }}:latest
148148
devsecops-tasks:
149149
name: Do DevSecOps Tasks
150150
needs:
@@ -155,34 +155,34 @@ jobs:
155155
steps:
156156
- name: checkout
157157
uses: actions/checkout@v4.1.0
158-
- name: Gitleaks
159-
continue-on-error: true
160-
# You may pin to the exact commit or the version.
161-
# uses: gitleaks/gitleaks-action@e6dab246340401bf53eec993b8f05aebe80ac636
162-
uses: gitleaks/gitleaks-action@v2.3.4
163-
env:
164-
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
165-
#GITLEAKS_LICENSE: ${{ secrets.GITLEAKS_LICENSE}} # Only required for Organizations, not personal accounts.
166-
- name: Dependency Review
167-
uses: actions/dependency-review-action@v4.3.2
168-
with:
169-
base-ref: ${{ github.ref }}
170-
head-ref: ${{ github.sha }}
171-
# Token for the repository. Can be passed in using `{{ secrets.GITHUB_TOKEN }}`.
172-
repo-token: ${{ github.token }} # optional, default is ${{ github.token }}
173-
# A boolean to determine if license checks should be performed
174-
license-check: true # optional
175-
# A boolean to determine if vulnerability checks should be performed
176-
vulnerability-check: true # optional
177-
# Show a summary of the OpenSSF Scorecard scores.
178-
show-openssf-scorecard: true # optional
179-
- name: Run Microsoft Security DevOps
180-
uses: microsoft/security-devops-action@v1
181-
id: msdo
182-
- name: Upload results to Security tab
183-
uses: github/codeql-action/upload-sarif@v2
184-
with:
185-
sarif_file: ${{ steps.msdo.outputs.sarifFile }}
158+
# - name: Gitleaks
159+
# continue-on-error: true
160+
# # You may pin to the exact commit or the version.
161+
# # uses: gitleaks/gitleaks-action@e6dab246340401bf53eec993b8f05aebe80ac636
162+
# uses: gitleaks/gitleaks-action@v2.3.4
163+
# env:
164+
# GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
165+
# #GITLEAKS_LICENSE: ${{ secrets.GITLEAKS_LICENSE}} # Only required for Organizations, not personal accounts.
166+
# - name: Dependency Review
167+
# uses: actions/dependency-review-action@v4.3.2
168+
# with:
169+
# base-ref: ${{ github.ref }}
170+
# head-ref: ${{ github.sha }}
171+
# # Token for the repository. Can be passed in using `{{ secrets.GITHUB_TOKEN }}`.
172+
# repo-token: ${{ github.token }} # optional, default is ${{ github.token }}
173+
# # A boolean to determine if license checks should be performed
174+
# license-check: true # optional
175+
# # A boolean to determine if vulnerability checks should be performed
176+
# vulnerability-check: true # optional
177+
# # Show a summary of the OpenSSF Scorecard scores.
178+
# show-openssf-scorecard: true # optional
179+
# - name: Run Microsoft Security DevOps
180+
# uses: microsoft/security-devops-action@v1
181+
# id: msdo
182+
# - name: Upload results to Security tab
183+
# uses: github/codeql-action/upload-sarif@v2
184+
# with:
185+
# sarif_file: ${{ steps.msdo.outputs.sarifFile }}
186186
test-run_devopsshield_scan_linux:
187187
name: Run DevOps Shield Scan Linux
188188
needs:

0 commit comments

Comments
 (0)