-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: add various scan & enforce them #34
Conversation
5eaa99b
to
4741156
Compare
ba3dce1
to
86eb376
Compare
f7d9078
to
9516656
Compare
Needs #36 to resync package-lock.json, which will allow snyk dependency scan to work properly |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm really not that knowledgeable in Github actions, but it seems like we repeat a lot of code?
Oh yeah. Tho I'll check again it seems it's been added very very recently. OneMoreTry ™️ |
Co-authored-by: Germain Bergeron <[email protected]>
Add a GHA composite action that runs Snyk and Snyk Code
Add aforementioned action to the CI job. In the case of the CI, the goal is only to report (so this is why there's a
continue-on-error
). The enforcing is done using the checks that this generates. You can see an example in the coveo/cli: https://github.com/coveo/cli/pull/794/checks?check_run_id=6525846881. The boon of this method is that it allows PR to come in if they do not worsen the project (so if the project were to have a vuln detected, it will not grind the CI to a halt).Add the action to the CD, but this time, it'll crash if there's unaddressed vulnerability.
fixes #20