-
Notifications
You must be signed in to change notification settings - Fork 0
86 lines (69 loc) · 2.67 KB
/
ci-devsecops.yml
File metadata and controls
86 lines (69 loc) · 2.67 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
name: CI DevSecOps
on:
push:
branches: ["main", "master"]
pull_request:
workflow_dispatch:
permissions:
contents: read
actions: read
jobs:
build-test-scan:
runs-on: windows-latest
steps:
- name: Checkout
uses: actions/checkout@v4
- name: Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: "8.0.x"
- name: Restore
run: dotnet restore "ThreadPilot_1.sln"
- name: Verify formatting
continue-on-error: true
run: dotnet format "ThreadPilot_1.sln" --verify-no-changes --verbosity diagnostic --report dotnet-format-report.json
- name: Build Debug
run: dotnet build "ThreadPilot_1.sln" --configuration Debug --no-restore
- name: Build Release
run: dotnet build "ThreadPilot_1.sln" --configuration Release --no-restore
- name: Run tests
run: dotnet test "ThreadPilot_1.sln" --configuration Release --no-build --verbosity normal
- name: Dependency vulnerability audit
shell: pwsh
run: |
$ErrorActionPreference = "Stop"
$audit = dotnet list "ThreadPilot.csproj" package --vulnerable --include-transitive
$audit | Out-String | Write-Host
if ($LASTEXITCODE -ne 0) {
throw "dotnet list package --vulnerable failed."
}
if ($audit -match "has the following vulnerable packages") {
throw "Vulnerable packages detected."
}
- name: Secret scan (Gitleaks)
shell: pwsh
run: |
$ErrorActionPreference = "Stop"
$version = "8.24.3"
$baseUrl = "https://github.com/gitleaks/gitleaks/releases/download/v$version"
$zipAsset = "gitleaks_${version}_windows_x64.zip"
$tarAsset = "gitleaks_${version}_windows_x64.tar.gz"
try {
Invoke-WebRequest -Uri "$baseUrl/$zipAsset" -OutFile "gitleaks.zip"
Expand-Archive -Path "gitleaks.zip" -DestinationPath ".\\gitleaks-bin" -Force
}
catch {
Invoke-WebRequest -Uri "$baseUrl/$tarAsset" -OutFile "gitleaks.tar.gz"
New-Item -ItemType Directory -Force -Path ".\\gitleaks-bin" | Out-Null
tar -xzf "gitleaks.tar.gz" -C ".\\gitleaks-bin"
}
$gitleaksExe = Resolve-Path ".\\gitleaks-bin\\gitleaks.exe"
& $gitleaksExe detect --source "." --redact --verbose --report-format json --report-path gitleaks-report.json
- name: Upload security artifacts
if: always()
uses: actions/upload-artifact@v4
with:
name: security-reports
path: |
gitleaks-report.json
dotnet-format-report.json