Skip to content

Commit

Permalink
Merge pull request #141 from ropable/master
Browse files Browse the repository at this point in the history
Switch ujson for orjson, bump other dependencies, other tweaks
  • Loading branch information
ropable authored Nov 28, 2024
2 parents 2ca05f2 + ed529c0 commit cbc0c51
Show file tree
Hide file tree
Showing 16 changed files with 868 additions and 909 deletions.
23 changes: 13 additions & 10 deletions .github/workflows/docker-publish.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,11 @@ name: "Build Docker image and run Trivy vulnerability scan"
on:
push:
# Publish `master` as `latest` image.
branches: [ master ]
branches: [master]
# Publish `2.*` tags as releases.
tags: [ '2.*' ]
tags: ["2.*"]
pull_request:
branches: [ master ]
branches: [master]

env:
REGISTRY: ghcr.io
Expand Down Expand Up @@ -77,15 +77,18 @@ jobs:
# Run vulnerability scan on built image
#----------------------------------------------
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
uses: aquasecurity/[email protected]
env:
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
with:
scan-type: 'image'
scan-type: "image"
scanners: "vuln"
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
vuln-type: 'os,library'
severity: 'HIGH,CRITICAL'
format: 'sarif'
output: 'trivy-results.sarif'
vuln-type: "os,library"
severity: "HIGH,CRITICAL"
format: "sarif"
output: "trivy-results.sarif"
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
sarif_file: "trivy-results.sarif"
25 changes: 25 additions & 0 deletions .github/workflows/secret-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
name: "Scan project for secrets & sensitive information"

on:
push:
branches:
- master
pull_request:
branches:
- master

jobs:
secret-scan:
name: Scan project for secrets
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v4
with:
fetch-depth: 0
- name: Secret scanning
uses: trufflesecurity/trufflehog@main
with:
base: ""
head: ${{ github.ref_name }}
extra_args: --only-verified
2 changes: 1 addition & 1 deletion .pre-commit-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ repos:
# For running trufflehog in docker, use the following entry instead:
# entry: bash -c 'docker run --rm -v "$(pwd):/workdir" -i --rm trufflesecurity/trufflehog:latest git file:///workdir --since-commit HEAD --only-verified --fail'
language: system
stages: ["commit", "push"]
stages: ["pre-commit", "pre-push"]
Loading

0 comments on commit cbc0c51

Please sign in to comment.