From 147c03281a7addc1f87a21e67a51af27bcf8c40f Mon Sep 17 00:00:00 2001 From: Frank Denis <124872+jedisct1@users.noreply.github.com> Date: Thu, 11 Jun 2020 09:54:00 +0200 Subject: [PATCH] Add Anchore analyzer --- .github/workflows/anchore-analysis.yml | 30 ++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 .github/workflows/anchore-analysis.yml diff --git a/.github/workflows/anchore-analysis.yml b/.github/workflows/anchore-analysis.yml new file mode 100644 index 0000000..b254b51 --- /dev/null +++ b/.github/workflows/anchore-analysis.yml @@ -0,0 +1,30 @@ +# This workflow checks out code, performs an Anchore container image +# vulnerability and compliance scan, and integrates the results with +# GitHub Advanced Security code scanning feature. For more information on +# the Anchore scan action usage and parameters, see +# https://github.com/anchore/scan-action. For more information on +# Anchore container image scanning in general, see +# https://docs.anchore.com. + +name: Anchore Container Scan + +on: push + +jobs: + Anchore-Build-Scan: + runs-on: ubuntu-latest + steps: + - name: Checkout the code + uses: actions/checkout@v2 + - name: Build the Docker image + run: docker build . --file Dockerfile --tag localbuild/testimage:latest + - name: Run the local Anchore scan action itself with GitHub Advanced Security code scanning integration enabled + uses: anchore/scan-action@master + with: + image-reference: "localbuild/testimage:latest" + dockerfile-path: "Dockerfile" + acs-report-enable: true + - name: Upload Anchore Scan Report + uses: github/codeql-action/upload-sarif@v1 + with: + sarif_file: results.sarif