-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reusable workflows #33
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,86 @@ | ||
# Copyright 2020 Wayback Archiver. All rights reserved. | ||
# Use of this source code is governed by the GNU GPL v3 | ||
# license that can be found in the LICENSE file. | ||
|
||
name: "Analysis" | ||
|
||
on: | ||
push: | ||
branches: | ||
- main | ||
- develop | ||
pull_request: | ||
branches: [ main ] | ||
schedule: | ||
- cron: '33 23 * * 4' | ||
|
||
# Declare default permissions as read only. | ||
permissions: read-all | ||
|
||
jobs: | ||
scorecards: | ||
name: Scorecards | ||
uses: wabarc/.github/.github/workflows/reusable-scorecards.yml@main | ||
if: | | ||
github.event_name == 'pull_request' || | ||
github.ref == 'refs/heads/main' | ||
permissions: | ||
# Needed to upload the results to code-scanning dashboard. | ||
security-events: write | ||
# Used to receive a badge. (Upcoming feature) | ||
id-token: write | ||
actions: read | ||
contents: read | ||
|
||
codeql: | ||
name: CodeQL | ||
permissions: | ||
security-events: write | ||
Check failure Code scanning / Scorecard Token-Permissions
score is 9: jobLevel 'security-events' permission set to 'write'
Click Remediation section below to solve this issue
|
||
actions: read | ||
contents: read | ||
strategy: | ||
fail-fast: false | ||
matrix: | ||
language: [ 'go' ] | ||
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] | ||
# Learn more: | ||
# https://docs.github.com/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed | ||
uses: wabarc/.github/.github/workflows/reusable-codeql.yml@main | ||
with: | ||
language: ${{ matrix.language }} | ||
|
||
nancy: | ||
name: Sonatype Nancy | ||
uses: wabarc/.github/.github/workflows/reusable-nancy.yml@main | ||
|
||
semgrep: | ||
name: Semgrep Scan | ||
if: github.actor != 'dependabot[bot]' | ||
uses: wabarc/.github/.github/workflows/reusable-semgrep.yml@main | ||
permissions: | ||
# Needed to upload the results to code-scanning dashboard. | ||
security-events: write | ||
Check failure Code scanning / Scorecard Token-Permissions
score is 9: jobLevel 'security-events' permission set to 'write'
Click Remediation section below to solve this issue
|
||
actions: read | ||
contents: read | ||
|
||
fossa: | ||
if: github.event_name != 'pull_request' | ||
name: FOSSA | ||
uses: wabarc/.github/.github/workflows/reusable-fossa.yml@main | ||
secrets: | ||
fossa-apikey: ${{ secrets.FOSSA_APIKEY }} | ||
|
||
dependency-review: | ||
name: Dependency Review | ||
uses: wabarc/.github/.github/workflows/reusable-dependency-review.yml@main | ||
|
||
trivy: | ||
name: Trivy | ||
uses: wabarc/.github/.github/workflows/reusable-trivy.yml@main | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
Check failure Code scanning / Scorecard Token-Permissions
score is 9: jobLevel 'security-events' permission set to 'write'
Click Remediation section below to solve this issue
|
||
#actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status | ||
with: | ||
scan-type: 'fs' | ||
sarif: 'filesystem.sarif' |
This file was deleted.
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,24 +1,48 @@ | ||
name: Lint | ||
# Copyright 2020 Wayback Archiver. All rights reserved. | ||
# Use of this source code is governed by the GNU GPL v3 | ||
# license that can be found in the LICENSE file. | ||
# | ||
name: Linter | ||
|
||
on: | ||
push: | ||
branches: [ main ] | ||
branches: | ||
- '**' | ||
pull_request: | ||
branches: [ main ] | ||
branches: | ||
- '**' | ||
types: [ opened, synchronize, reopened ] | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
lint: | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Checkout default branch | ||
uses: actions/checkout@v2 | ||
|
||
- name: Lint Code Base | ||
uses: github/super-linter@v4 | ||
env: | ||
DEFAULT_BRANCH: 'main' | ||
VALIDATE_ALL_CODEBASE: false | ||
VALIDATE_JSON: false | ||
VALIDATE_ANSIBLE: false | ||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | ||
super-linter: | ||
name: Super Linter | ||
uses: wabarc/.github/.github/workflows/reusable-super-linter.yml@main | ||
|
||
golangci: | ||
name: golangci-lint | ||
uses: wabarc/.github/.github/workflows/reusable-golangci.yml@main | ||
|
||
shellcheck: | ||
name: ShellCheck | ||
uses: wabarc/.github/.github/workflows/reusable-shellcheck.yml@main | ||
|
||
misspell: | ||
name: Misspell | ||
uses: wabarc/.github/.github/workflows/reusable-misspell.yml@main | ||
|
||
alex: | ||
name: Alex | ||
uses: wabarc/.github/.github/workflows/reusable-alex.yml@main | ||
|
||
urlcheck: | ||
name: URLCheck | ||
uses: wabarc/.github/.github/workflows/reusable-urlcheck.yml@main | ||
with: | ||
exclude-patterns: '.onion,https://github.com/,https://repo.wabarc.eu.org/,twitter.com' | ||
|
||
goreportcard: | ||
name: Go Report Card | ||
uses: wabarc/.github/.github/workflows/reusable-goreportcard.yml@main |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,19 +1,19 @@ | ||
# Copyright 2020 Wayback Archiver. All rights reserved. | ||
# Use of this source code is governed by the GNU GPL v3 | ||
# license that can be found in the LICENSE file. | ||
# | ||
name: Stale | ||
|
||
on: | ||
schedule: | ||
- cron: "0 3 * * 6" | ||
workflow_dispatch: | ||
|
||
permissions: | ||
issues: write | ||
pull-requests: write | ||
|
||
jobs: | ||
stale: | ||
name: Stale | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Mark stale issues and pull requests | ||
uses: actions/stale@v4 | ||
with: | ||
repo-token: ${{ github.token }} | ||
stale-issue-message: "This issue is stale because it has been open 120 days with no activity. Remove stale label or comment or this will be closed in 5 days" | ||
stale-pr-message: 'It has been open 120 days with no activity. Remove stale label or comment or this will be closed in 5 days' | ||
days-before-stale: 120 | ||
days-before-close: 5 | ||
uses: wabarc/.github/.github/workflows/reusable-stale.yml@main |
Check failure
Code scanning / Scorecard
Token-Permissions