Skip to content

[Snyk] Security upgrade golang from 1.14.2 to 1.22.7 #185

[Snyk] Security upgrade golang from 1.14.2 to 1.22.7

[Snyk] Security upgrade golang from 1.14.2 to 1.22.7 #185

Workflow file for this run

---
name: Build
on:
pull_request:
branches: [master]
types: [opened, synchronize, reopened]
env:
REPONAME: litmuschaos
IMAGENAME: chaos-ci-lib
IMAGETAG: ci
jobs:
pre-checks:
runs-on: ubuntu-latest
steps:
# Install golang
- uses: actions/setup-go@v2
with:
go-version: 1.14
# Checkout to the latest commit
# On specific directory/path
- name: Checkout
uses: actions/checkout@v2
- name: gofmt check
run: |
if [ "$(gofmt -s -l . | wc -l)" -ne 0 ]
then
echo "The following files were found to be not go formatted:"
gofmt -s -l .
exit 1
fi
- name: golangci-lint
uses: reviewdog/action-golangci-lint@v1
build:
runs-on: ubuntu-latest
steps:
# Install golang
- uses: actions/setup-go@v2
with:
go-version: 1.14
# Checkout to the latest commit
# On specific directory/path
- uses: actions/checkout@v2
- name: Build Docker Image
env:
DOCKER_REPO: ${{ env.REPONAME }}
DOCKER_IMAGE: ${{ env.IMAGENAME }}
DOCKER_TAG: ${{ env.IMAGETAG }}
run: |
make build
security-scan:
runs-on: ubuntu-latest
steps:
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: 'docker.io/${{ env.REPONAME }}/${{ env.IMAGENAME }}:${{ env.IMAGETAG }}'
format: 'table'
exit-code: '0'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH'