aboutsummaryrefslogtreecommitdiff
path: root/.github
diff options
context:
space:
mode:
Diffstat (limited to '.github')
-rw-r--r--.github/workflows/crda.yml130
1 files changed, 0 insertions, 130 deletions
diff --git a/.github/workflows/crda.yml b/.github/workflows/crda.yml
deleted file mode 100644
index a4f4fe3..0000000
--- a/.github/workflows/crda.yml
+++ /dev/null
@@ -1,130 +0,0 @@
-# This workflow uses actions that are not certified by GitHub.
-# They are provided by a third-party and are governed by
-# separate terms of service, privacy policy, and support
-# documentation.
-
-# This workflow performs a static analysis of your source code using
-# Red Hat CodeReady Dependency Analytics.
-
-# Scans are triggered:
-# 1. On every push to default and protected branches
-# 2. On every Pull Request targeting the default branch
-# 3. On a weekly schedule
-# 4. Manually, on demand, via the "workflow_dispatch" event
-
-# 💁 The CRDA Starter workflow will:
-# - Checkout your repository
-# - Setup the required tool stack
-# - Install the CRDA command line tool
-# - Auto detect the manifest file and install the project's dependencies
-# - Perform the security scan using CRDA
-# - Upload the SARIF result to the GitHub Code Scanning which can be viewed under the security tab
-# - Optionally upload the SARIF file as an artifact for the future reference
-
-# â„šī¸ Configure your repository and the workflow with the following steps:
-# 1. Setup the tool stack based on the project's requirement.
-# Refer to: https://github.com/redhat-actions/crda/#1-set-up-the-tool-stack
-# 2. (Optional) CRDA action attempt to detect the language and install the
-# required dependencies for your project. If your project doesn't aligns
-# with the default dependency installation command mentioned here
-# https://github.com/redhat-actions/crda/#3-installing-dependencies.
-# Use the required inputs to setup the same
-# 3. (Optional) CRDA action attempts to detect the manifest file if it is
-# present in the root of the project and named as per the default mentioned
-# here https://github.com/redhat-actions/crda/#3-installing-dependencies.
-# If it deviates from the default, use the required inputs to setup the same
-# 4. Setup Authentication - Create the CRDA_KEY or SNYK_TOKEN.
-# Refer to: https://github.com/redhat-actions/crda/#4-set-up-authentication
-# 5. (Optional) Upload SARIF file as an Artifact to download and view
-# 6. Commit and push the workflow file to your default branch to trigger a workflow run.
-
-# 👋 Visit our GitHub organization at https://github.com/redhat-actions/ to see our actions and provide feedback.
-
-name: CRDA Scan
-
-# Controls when the workflow will run
-on:
- # TODO: Customize trigger events based on your DevSecOps processes
- #
- # This workflow is made to run with OpenShift starter workflow
- # https://github.com/actions/starter-workflows/blob/main/deployments/openshift.yml
- # However, if you want to run this workflow as a standalone workflow, please
- # uncomment the 'push' trigger below and configure it based on your requirements.
- #
- workflow_call:
- secrets:
- CRDA_KEY:
- required: false
- SNYK_TOKEN:
- required: true
- workflow_dispatch:
-
- push:
- branches: [ "main" ]
-
- # pull_request_target is used to securely share secret to the PR's workflow run.
- # For more info visit: https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#pull_request_target
- pull_request_target:
- branches: [ "main" ]
- types: [ assigned, opened, synchronize, reopened, labeled, edited ]
-
-permissions:
- contents: read
-
-jobs:
- crda-scan:
- permissions:
- contents: read # for actions/checkout to fetch code
- security-events: write # for redhat-actions/crda to upload SARIF results
- name: Scan project vulnerabilities with CRDA
- runs-on: ubuntu-20.04
- steps:
-
- - name: Check out repository
- uses: actions/checkout@v4
-
- # *******************************************************************
- # Required: Instructions to setup project
- # 1. Setup Go, Java, Node.js or Python depending on your project type
- # 2. Setup Actions are listed below, choose one from them:
- # - Go: https://github.com/actions/setup-go
- # - Java: https://github.com/actions/setup-java
- # - Node.js: https://github.com/actions/setup-node
- # - Python: https://github.com/actions/setup-python
- #
- # Example:
- # - name: Setup Node
- # uses: actions/setup-node@v4
- # with:
- # node-version: '20'
- - name: Setup Python
- uses: actions/setup-python@v5
- with:
- python-version: '3.13'
-
- # https://github.com/redhat-actions/openshift-tools-installer/blob/main/README.md
- - name: Install CRDA CLI
- uses: redhat-actions/openshift-tools-installer@v1
- with:
- source: github
- github_pat: ${{ github.token }}
- # Choose the desired version of the CRDA CLI
- crda: "latest"
-
- ######################################################################################
- # https://github.com/redhat-actions/crda/blob/main/README.md
- #
- # By default, CRDA will detect the manifest file and install the required dependencies
- # using the standard command for the project type.
- # If your project doesn't aligns with the defaults mentioned in this action, you will
- # need to set few inputs that are described here:
- # https://github.com/redhat-actions/crda/blob/main/README.md#3-installing-dependencies
- # Visit https://github.com/redhat-actions/crda/#4-set-up-authentication to understand
- # process to get a SNYK_TOKEN or a CRDA_KEY
- - name: CRDA Scan
- id: scan
- uses: redhat-actions/crda@v1
- with:
- # crda_key: ${{ secrets.CRDA_KEY }} # Either use crda_key or snyk_token
- snyk_token: ${{ secrets.SNYK_TOKEN }}
- # upload_artifact: false # Set this to false to skip artifact upload