Skip to content

Commit 2e20db9

Browse files
authored
setup snyk attempt #1
attempt 1 because as always, 0 chance a workflow works first try.
1 parent 3f089c8 commit 2e20db9

File tree

1 file changed

+78
-0
lines changed

1 file changed

+78
-0
lines changed
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
# This workflow uses actions that are not certified by GitHub.
2+
# They are provided by a third-party and are governed by
3+
# separate terms of service, privacy policy, and support
4+
# documentation.
5+
6+
# A sample workflow which sets up Snyk to analyze the full Snyk platform (Snyk Open Source, Snyk Code,
7+
# Snyk Container and Snyk Infrastructure as Code)
8+
# The setup installs the Snyk CLI - for more details on the possible commands
9+
# check https://docs.snyk.io/snyk-cli/cli-reference
10+
# The results of Snyk Code are then uploaded to GitHub Security Code Scanning
11+
#
12+
# In order to use the Snyk Action you will need to have a Snyk API token.
13+
# More details in https://github.com/snyk/actions#getting-your-snyk-token
14+
# or you can signup for free at https://snyk.io/login
15+
#
16+
# For more examples, including how to limit scans to only high-severity issues
17+
# and fail PR checks, see https://github.com/snyk/actions/
18+
19+
name: Snyk Security
20+
21+
on:
22+
push:
23+
branches: ["master" ]
24+
pull_request:
25+
branches: ["master"]
26+
27+
permissions:
28+
contents: read
29+
30+
jobs:
31+
snyk:
32+
permissions:
33+
contents: read # for actions/checkout to fetch code
34+
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
35+
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
36+
runs-on: ubuntu-latest
37+
steps:
38+
- uses: actions/checkout@v4
39+
- name: Set up Snyk CLI to check for security issues
40+
# Snyk can be used to break the build when it detects security issues.
41+
# In this case we want to upload the SAST issues to GitHub Code Scanning
42+
uses: snyk/actions/setup@806182742461562b67788a64410098c9d9b96adb
43+
44+
- name: Setup Rust
45+
uses: dtolnay/rust-toolchain@efa25f7f19611383d5b0ccf2d1c8914531636bf9
46+
with:
47+
toolchain: stable
48+
49+
env:
50+
# This is where you will need to introduce the Snyk API token created with your Snyk account
51+
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
52+
53+
# Runs Snyk Code (SAST) analysis and uploads result into GitHub.
54+
# Use || true to not fail the pipeline
55+
- name: Snyk Code test
56+
run: snyk code test --sarif > snyk-code.sarif # || true
57+
58+
# Runs Snyk Open Source (SCA) analysis and uploads result to Snyk.
59+
- name: Snyk Open Source monitor
60+
run: snyk monitor --all-projects
61+
62+
# Runs Snyk Infrastructure as Code (IaC) analysis and uploads result to Snyk.
63+
# Use || true to not fail the pipeline.
64+
- name: Snyk IaC test and report
65+
run: snyk iac test --report # || true
66+
67+
# Build the docker image for testing
68+
- name: Build a Docker image
69+
run: docker build -t your/image-to-test .
70+
# Runs Snyk Container (Container and SCA) analysis and uploads result to Snyk.
71+
- name: Snyk Container monitor
72+
run: snyk container monitor your/image-to-test --file=Dockerfile
73+
74+
# Push the Snyk Code results into GitHub Code Scanning tab
75+
- name: Upload result to GitHub Code Scanning
76+
uses: github/codeql-action/upload-sarif@v3
77+
with:
78+
sarif_file: snyk-code.sarif

0 commit comments

Comments
 (0)