You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@streampipes.apache.org by bo...@apache.org on 2023/04/11 09:17:20 UTC

[streampipes] branch dev updated: #1107 Implementation of `OSV-scanner` with `gh-action` (#1438)

This is an automated email from the ASF dual-hosted git repository.

bossenti pushed a commit to branch dev
in repository https://gitbox.apache.org/repos/asf/streampipes.git


The following commit(s) were added to refs/heads/dev by this push:
     new cb529cc98  #1107 Implementation  of `OSV-scanner` with `gh-action` (#1438)
cb529cc98 is described below

commit cb529cc985705457832e6429c968fc6eac93bb3c
Author: Kshitiz Mhto <nk...@gmail.com>
AuthorDate: Tue Apr 11 15:02:13 2023 +0545

     #1107 Implementation  of `OSV-scanner` with `gh-action` (#1438)
    
    * osv-scanner workflow is added
    
    * added reviewer
    
    * pull and specify the docker image
    
    * undo the changes in pom.xml
    
    * modified worflow not to include error in log file
---
 .github/workflows/osv-scanner.yml | 58 +++++++++++++++++++++++++++++++++++++++
 1 file changed, 58 insertions(+)

diff --git a/.github/workflows/osv-scanner.yml b/.github/workflows/osv-scanner.yml
new file mode 100644
index 000000000..d175ffe15
--- /dev/null
+++ b/.github/workflows/osv-scanner.yml
@@ -0,0 +1,58 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#    http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+name: OSV Scanner
+
+on:
+  schedule:
+    - cron: '0 0 1 * *'
+
+jobs:
+  run-osv-scanner:
+
+    name: Run OSV Scanner
+    runs-on: ubuntu-latest
+
+    steps:
+
+      - name: Checkout
+        uses: actions/checkout@v3
+
+      - name: Pull OSV Scanner Docker image
+        run: docker pull ghcr.io/google/osv-scanner:latest
+
+      - name: Scan for vulnerabilities
+        run: |
+          docker run --rm -v $PWD:/repo -w /repo ghcr.io/google/osv-scanner --format markdown -r . 2>&1 | grep -vE '^((Scanning|Scanned|Failed).*)$' > VULNERABILITY.md
+        continue-on-error: true
+
+      - name: Create Pull Request
+        id: cpr
+        uses: peter-evans/create-pull-request@v4
+        with:
+          token: ${{ secrets.GITHUB_TOKEN }}
+          committer: ${{ github.actor }} <no...@gmail.com>
+          author: ${{ github.actor }} <${{ github.actor }}@github.com>
+          signoff: true
+          title: Add vulnerability report
+          commit-message: Added vulnerability report
+          body: |
+            Update *Vulnerablity* report
+          delete-branch: true
+          labels: |
+            documentation
+            gh-action
+          team-reviewers: apache/streampipes-committers
+