Some checks failed
Security & Dependency Updates / Dependency Security Scan (push) Successful in 24s
Security & Dependency Updates / Check for Dependency Updates (push) Successful in 19s
Release - Northern Thailand Ping River Monitor / Create Release (push) Successful in 5s
Security & Dependency Updates / License Compliance (push) Successful in 11s
Security & Dependency Updates / Code Quality Metrics (push) Successful in 15s
Release - Northern Thailand Ping River Monitor / Test Release Build (3.10) (push) Successful in 13s
Release - Northern Thailand Ping River Monitor / Test Release Build (3.11) (push) Successful in 13s
Release - Northern Thailand Ping River Monitor / Test Release Build (3.12) (push) Successful in 13s
Release - Northern Thailand Ping River Monitor / Test Release Build (3.9) (push) Successful in 13s
Security & Dependency Updates / Security Summary (push) Successful in 6s
Release - Northern Thailand Ping River Monitor / Build Release Images (push) Failing after 13s
Release - Northern Thailand Ping River Monitor / Security Scan (push) Has been skipped
Release - Northern Thailand Ping River Monitor / Deploy Release (push) Has been skipped
Release - Northern Thailand Ping River Monitor / Validate Release (push) Has been skipped
Release - Northern Thailand Ping River Monitor / Notify Release (push) Successful in 1s
293 lines
9.4 KiB
YAML
293 lines
9.4 KiB
YAML
name: Security & Dependency Updates
|
|
|
|
on:
|
|
schedule:
|
|
# Run security scans daily at 3 AM UTC
|
|
- cron: "0 3 * * *"
|
|
workflow_dispatch:
|
|
push:
|
|
paths:
|
|
- "requirements*.txt"
|
|
- "Dockerfile"
|
|
- ".gitea/workflows/security.yml"
|
|
|
|
env:
|
|
PYTHON_VERSION: "3.11"
|
|
# GitHub token for better rate limits and authentication
|
|
GH_TOKEN: ${{ secrets.GH_TOKEN }}
|
|
|
|
jobs:
|
|
# Dependency vulnerability scan
|
|
dependency-scan:
|
|
name: Dependency Security Scan
|
|
runs-on: ubuntu-latest
|
|
|
|
steps:
|
|
- name: Checkout code
|
|
uses: actions/checkout@v4
|
|
with:
|
|
token: ${{ secrets.GITEA_TOKEN }}
|
|
|
|
- name: Set up Python
|
|
uses: actions/setup-python@v4
|
|
with:
|
|
python-version: ${{ env.PYTHON_VERSION }}
|
|
|
|
- name: Install dependencies
|
|
run: |
|
|
python -m pip install --upgrade pip --root-user-action=ignore
|
|
pip install --root-user-action=ignore safety bandit semgrep
|
|
|
|
- name: Run Safety check
|
|
run: |
|
|
safety check -r requirements.txt --json --output safety-report.json || true
|
|
safety check -r requirements-dev.txt --json --output safety-dev-report.json || true
|
|
|
|
- name: Run Bandit security scan
|
|
run: |
|
|
bandit -r src/ -f json -o bandit-report.json || true
|
|
|
|
- name: Run Semgrep security scan
|
|
run: |
|
|
semgrep --config=auto src/ --json --output=semgrep-report.json || true
|
|
|
|
- name: Upload security reports
|
|
uses: actions/upload-artifact@v3
|
|
with:
|
|
name: security-reports-${{ github.run_number }}
|
|
path: |
|
|
safety-report.json
|
|
safety-dev-report.json
|
|
bandit-report.json
|
|
semgrep-report.json
|
|
|
|
- name: Check for critical vulnerabilities
|
|
run: |
|
|
echo "Checking for critical vulnerabilities..."
|
|
|
|
# Check Safety results
|
|
if [ -f safety-report.json ]; then
|
|
critical_count=$(jq '.vulnerabilities | length' safety-report.json 2>/dev/null || echo "0")
|
|
if [ "$critical_count" -gt 0 ]; then
|
|
echo "Found $critical_count dependency vulnerabilities"
|
|
jq '.vulnerabilities[] | "- \(.package_name) \(.installed_version): \(.vulnerability_id)"' safety-report.json
|
|
else
|
|
echo "No dependency vulnerabilities found"
|
|
fi
|
|
fi
|
|
|
|
# Check Bandit results
|
|
if [ -f bandit-report.json ]; then
|
|
high_severity=$(jq '.results[] | select(.issue_severity == "HIGH") | length' bandit-report.json 2>/dev/null | wc -l)
|
|
if [ "$high_severity" -gt 0 ]; then
|
|
echo "Found $high_severity high-severity security issues"
|
|
else
|
|
echo "No high-severity security issues found"
|
|
fi
|
|
fi
|
|
|
|
# License compliance check
|
|
license-check:
|
|
name: License Compliance
|
|
runs-on: ubuntu-latest
|
|
|
|
steps:
|
|
- name: Checkout code
|
|
uses: actions/checkout@v4
|
|
with:
|
|
token: ${{ secrets.GITEA_TOKEN }}
|
|
|
|
- name: Set up Python
|
|
uses: actions/setup-python@v4
|
|
with:
|
|
python-version: ${{ env.PYTHON_VERSION }}
|
|
|
|
- name: Install pip-licenses
|
|
run: |
|
|
python -m pip install --upgrade pip --root-user-action=ignore
|
|
pip install --root-user-action=ignore pip-licenses
|
|
pip install --root-user-action=ignore -r requirements.txt
|
|
|
|
- name: Check licenses
|
|
run: |
|
|
echo "Checking dependency licenses..."
|
|
pip-licenses --format=json --output-file=licenses.json
|
|
pip-licenses --format=markdown --output-file=licenses.md
|
|
|
|
# Check for problematic licenses
|
|
problematic_licenses=("GPL" "AGPL" "LGPL")
|
|
|
|
for license in "${problematic_licenses[@]}"; do
|
|
if grep -i "$license" licenses.json; then
|
|
echo "Found potentially problematic license: $license"
|
|
fi
|
|
done
|
|
|
|
echo "License check completed"
|
|
|
|
- name: Upload license report
|
|
uses: actions/upload-artifact@v3
|
|
with:
|
|
name: license-report-${{ github.run_number }}
|
|
path: |
|
|
licenses.json
|
|
licenses.md
|
|
|
|
# Dependency update check
|
|
dependency-update:
|
|
name: Check for Dependency Updates
|
|
runs-on: ubuntu-latest
|
|
|
|
steps:
|
|
- name: Checkout code
|
|
uses: actions/checkout@v4
|
|
with:
|
|
token: ${{ secrets.GITEA_TOKEN }}
|
|
|
|
- name: Set up Python
|
|
uses: actions/setup-python@v4
|
|
with:
|
|
python-version: ${{ env.PYTHON_VERSION }}
|
|
|
|
- name: Install pip-check-updates equivalent
|
|
run: |
|
|
python -m pip install --upgrade pip --root-user-action=ignore
|
|
pip install --root-user-action=ignore pip-review
|
|
|
|
- name: Check for outdated packages
|
|
run: |
|
|
echo "Checking for outdated packages..."
|
|
pip install --root-user-action=ignore -r requirements.txt
|
|
pip list --outdated --format=json > outdated-packages.json || true
|
|
|
|
if [ -s outdated-packages.json ]; then
|
|
echo "Outdated packages found:"
|
|
cat outdated-packages.json | jq -r '.[] | "- \(.name): \(.version) -> \(.latest_version)"'
|
|
else
|
|
echo "All packages are up to date"
|
|
fi
|
|
|
|
- name: Upload dependency reports
|
|
uses: actions/upload-artifact@v3
|
|
with:
|
|
name: dependency-reports-${{ github.run_number }}
|
|
path: |
|
|
outdated-packages.json
|
|
|
|
# Code quality metrics
|
|
code-quality:
|
|
name: Code Quality Metrics
|
|
runs-on: ubuntu-latest
|
|
|
|
steps:
|
|
- name: Checkout code
|
|
uses: actions/checkout@v4
|
|
with:
|
|
token: ${{ secrets.GITEA_TOKEN }}
|
|
|
|
- name: Set up Python
|
|
uses: actions/setup-python@v4
|
|
with:
|
|
python-version: ${{ env.PYTHON_VERSION }}
|
|
|
|
- name: Install quality tools
|
|
run: |
|
|
python -m pip install --upgrade pip --root-user-action=ignore
|
|
pip install --root-user-action=ignore radon xenon vulture
|
|
pip install --root-user-action=ignore -r requirements.txt
|
|
|
|
- name: Calculate code complexity
|
|
run: |
|
|
echo "Calculating code complexity..."
|
|
radon cc src/ --json > complexity-report.json
|
|
radon mi src/ --json > maintainability-report.json
|
|
|
|
echo "Complexity Summary:"
|
|
radon cc src/ --average
|
|
|
|
echo "Maintainability Summary:"
|
|
radon mi src/
|
|
|
|
- name: Find dead code
|
|
run: |
|
|
echo "Checking for dead code..."
|
|
vulture src/ --json > dead-code-report.json || true
|
|
|
|
- name: Check for code smells
|
|
run: |
|
|
echo "Checking for code smells..."
|
|
xenon --max-absolute B --max-modules A --max-average A src/ || true
|
|
|
|
- name: Upload quality reports
|
|
uses: actions/upload-artifact@v3
|
|
with:
|
|
name: code-quality-reports-${{ github.run_number }}
|
|
path: |
|
|
complexity-report.json
|
|
maintainability-report.json
|
|
dead-code-report.json
|
|
|
|
# Security summary
|
|
security-summary:
|
|
name: Security Summary
|
|
runs-on: ubuntu-latest
|
|
needs: [dependency-scan, license-check, code-quality]
|
|
if: always()
|
|
|
|
steps:
|
|
- name: Download all artifacts
|
|
uses: actions/download-artifact@v3
|
|
|
|
- name: Generate security summary
|
|
run: |
|
|
echo "# Security Scan Summary" > security-summary.md
|
|
echo "" >> security-summary.md
|
|
echo "**Scan Date:** $(date -u)" >> security-summary.md
|
|
echo "**Repository:** ${{ github.repository }}" >> security-summary.md
|
|
echo "**Commit:** ${{ github.sha }}" >> security-summary.md
|
|
echo "" >> security-summary.md
|
|
|
|
echo "## Results" >> security-summary.md
|
|
echo "" >> security-summary.md
|
|
|
|
# Dependency scan results
|
|
if [ -f security-reports-*/safety-report.json ]; then
|
|
vuln_count=$(jq '.vulnerabilities | length' security-reports-*/safety-report.json 2>/dev/null || echo "0")
|
|
if [ "$vuln_count" -eq 0 ]; then
|
|
echo "- Dependency Scan: No vulnerabilities found" >> security-summary.md
|
|
else
|
|
echo "- Dependency Scan: $vuln_count vulnerabilities found" >> security-summary.md
|
|
fi
|
|
else
|
|
echo "- Dependency Scan: Results not available" >> security-summary.md
|
|
fi
|
|
|
|
# Docker scan results (removed Trivy)
|
|
echo "- Docker Scan: Skipped (Trivy removed)" >> security-summary.md
|
|
|
|
# License check results
|
|
if [ -f license-report-*/licenses.json ]; then
|
|
echo "- License Check: Completed" >> security-summary.md
|
|
else
|
|
echo "- License Check: Results not available" >> security-summary.md
|
|
fi
|
|
|
|
# Code quality results
|
|
if [ -f code-quality-reports-*/complexity-report.json ]; then
|
|
echo "- Code Quality: Analyzed" >> security-summary.md
|
|
else
|
|
echo "- Code Quality: Results not available" >> security-summary.md
|
|
fi
|
|
|
|
echo "" >> security-summary.md
|
|
echo "## Detailed Reports" >> security-summary.md
|
|
echo "" >> security-summary.md
|
|
echo "Detailed reports are available in the workflow artifacts." >> security-summary.md
|
|
|
|
cat security-summary.md
|
|
|
|
- name: Upload security summary
|
|
uses: actions/upload-artifact@v3
|
|
with:
|
|
name: security-summary-${{ github.run_number }}
|
|
path: security-summary.md |