fix(ci): re-enable Snyk
This commit is contained in:
@@ -40,6 +40,9 @@ jobs:
|
||||
|
||||
- name: Install dependencies
|
||||
run: uv sync
|
||||
|
||||
- name: Check Import Sorting
|
||||
run: uv run isort --check app/ tests/
|
||||
|
||||
- name: Lint
|
||||
run: |
|
||||
@@ -61,32 +64,44 @@ jobs:
|
||||
# SONAR_HOST_URL: ${{ secrets.SONARQUBE_HOST_URL }}
|
||||
# SONAR_TOKEN: ${{ secrets.SONARQUBE_TOKEN }}
|
||||
|
||||
# - name: Snyk Vulnerability Scan
|
||||
# uses: snyk/actions/python@master
|
||||
# continue-on-error: true # Sometimes vulns aren't immediately fixable
|
||||
# env:
|
||||
# SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
|
||||
- name: Create requirements.txt for Snyk
|
||||
run: |
|
||||
uv pip freeze > requirements.txt
|
||||
|
||||
- name: Snyk SAST Scan
|
||||
uses: snyk/actions/python@master
|
||||
env:
|
||||
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
|
||||
with:
|
||||
command: snyk
|
||||
args: code test --exclude=.archive
|
||||
|
||||
- name: Snyk Vulnerability Scan
|
||||
uses: snyk/actions/python@master
|
||||
continue-on-error: true # Sometimes vulns aren't immediately fixable
|
||||
env:
|
||||
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
|
||||
with:
|
||||
command: snyk
|
||||
args: test --all-projects --exclude=.archive
|
||||
|
||||
# - name: Trivy Setup
|
||||
# uses: aquasecurity/setup-trivy@v0.2.0
|
||||
# with:
|
||||
# command: snyk
|
||||
# args: test --all-projects
|
||||
# cache: true
|
||||
# version: v0.61.1
|
||||
|
||||
- name: Manual Trivy Setup
|
||||
uses: aquasecurity/setup-trivy@v0.2.0
|
||||
with:
|
||||
cache: true
|
||||
version: v0.61.1
|
||||
|
||||
- name: Trivy Vulnerability Scan
|
||||
uses: aquasecurity/trivy-action@master
|
||||
with:
|
||||
skip-setup-trivy: true
|
||||
scan-type: "fs"
|
||||
scan-ref: "${{ gitea.workspace }}"
|
||||
exit-code: "1"
|
||||
ignore-unfixed: true
|
||||
format: "table"
|
||||
severity: "CRITICAL,HIGH,MEDIUM"
|
||||
scanners: "vuln,secret,misconfig,license"
|
||||
# - name: Trivy Vulnerability Scan
|
||||
# uses: aquasecurity/trivy-action@master
|
||||
# with:
|
||||
# skip-setup-trivy: true
|
||||
# scan-type: "fs"
|
||||
# scan-ref: "${{ gitea.workspace }}"
|
||||
# exit-code: "1"
|
||||
# ignore-unfixed: true
|
||||
# format: "table"
|
||||
# severity: "CRITICAL,HIGH,MEDIUM"
|
||||
# scanners: "vuln,secret,misconfig,license"
|
||||
|
||||
# - name: Trivy Vulnerability Scan (Docker)
|
||||
# uses: aquasecurity/trivy-action@master
|
||||
|
||||
Reference in New Issue
Block a user