Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(ci): analysis conditionals #867

Closed
wants to merge 1 commit into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
70 changes: 58 additions & 12 deletions .github/workflows/analysis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,23 +14,69 @@ concurrency:
cancel-in-progress: true

jobs:
tests-java:
name: Backend Tests
if: github.event_name != 'pull_request' || !github.event.pull_request.draft
uses: ./.github/workflows/reusable-tests-be.yml
tests:
name: Tests
if: ${{ ! github.event.pull_request.draft }}
uses: ./.github/workflows/.tests.yml

tests-frontend:
name: Frontend Unit Tests
if: github.event_name != 'pull_request' || !github.event.pull_request.draft
uses: ./.github/workflows/reusable-tests-fe.yml
codeql:
name: CodeQL Code Analysis
if: ${{ ! github.event.pull_request.draft }}
runs-on: ubuntu-22.04
permissions:
actions: read
contents: read
security-events: write
steps:
- uses: actions/checkout@v4
- uses: github/codeql-action/init@v3
with:
languages: javascript,java

# Autobuild failed for Java, so building manually
- name: Set up JDK 17 and Caching maven dependencies
uses: actions/setup-java@v4
with:
distribution: "temurin"
java-version: "17"
cache: "maven"

# Java builds
- name: Build Backend
working-directory: backend
run: ./mvnw clean package

- name: Build Legacy
working-directory: legacy
run: ./mvnw clean package

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3

trivy:
name: Trivy Vulnerability Scanner
if: ${{ ! github.event.pull_request.draft }}
runs-on: ubuntu-22.04
steps:
- uses: actions/checkout@v4
- name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/[email protected]
with:
format: "sarif"
output: "trivy-results.sarif"
ignore-unfixed: true
scan-type: "fs"
scanners: "vuln,secret,config"
severity: "CRITICAL,HIGH"

repo-reports:
name: Repository Reports
uses: ./.github/workflows/reusable-tests-repo.yml
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: "trivy-results.sarif"

results:
name: Analysis Results
needs: [tests-java, tests-frontend, repo-reports]
needs: [tests, codeql, trivy]
runs-on: ubuntu-22.04
steps:
- run: echo "Workflow completed successfully!"
Loading