Skip to content

Snyk scheduled code base scan #53

Snyk scheduled code base scan

Snyk scheduled code base scan #53

name: Snyk scheduled code base scan
on:
schedule:
- cron: '0 2 * * 1'
workflow_dispatch:
env:
MODULES: >-
[{
'module': 'radar-upload-backend',
'build_file': 'build.gradle.kts'
},{
'module': 'kafka-connect-upload-source',
'build_file': 'kafka-connect-upload-source/build.gradle.kts'
},{
'module': 'radar-upload-frontend',
'build_file': 'radar-upload-frontend/package-lock.json'
}]
jobs:
prepare-matrix:
name: Prepare Matrix Output
runs-on: ubuntu-latest
permissions: {}
outputs:
modules: ${{ steps.step1.outputs.matrix }}
steps:
- name: Create Matrix Variable
id: step1
run: echo "matrix=${{env.MODULES}}" >> $GITHUB_OUTPUT
security:
needs: prepare-matrix
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write
strategy:
matrix:
module: ${{ fromJson(needs.prepare-matrix.outputs.modules ) }}
steps:
- uses: actions/checkout@v5
- name: Run Snyk to check for vulnerabilities
uses: snyk/actions/gradle-8-jdk17@master
continue-on-error: true # To make sure that SARIF upload gets called
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
args: >-
--file=${{ matrix.module.build_file }}
--configuration-matching='^runtimeClasspath$'
--fail-on=upgradable
--severity-threshold=high
--policy-path=.snyk
--org=radar-base
--sarif-file-output=${{ matrix.module.module }}.sarif
# Detected vulnerabilities will appear on Github in Security->Code_scanning_alerts tab
- name: Upload result to GitHub Code Scanning
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: ${{ matrix.module.module }}.sarif
category: ${{ matrix.module.module }}