feat: client-side PKCE support during OIDC and generic redirect_uri #5727
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Docker Image Scanners | |
on: | |
push: | |
branches: | |
- "master" | |
tags: | |
- "v*.*.*" | |
pull_request: | |
branches: | |
- "master" | |
jobs: | |
scanners: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v3 | |
- name: Setup Env | |
id: vars | |
shell: bash | |
run: | | |
echo "SHA_SHORT=$(git rev-parse --short HEAD)" >> "${GITHUB_ENV}" | |
- name: Set up QEMU | |
uses: docker/setup-qemu-action@v2 | |
- name: Set up Docker Buildx | |
uses: docker/setup-buildx-action@v2 | |
- name: Build images | |
shell: bash | |
run: | | |
IMAGE_TAG="${{ env.SHA_SHORT }}" make docker | |
- name: Anchore Scanner | |
uses: anchore/scan-action@v3 | |
id: grype-scan | |
with: | |
image: oryd/kratos:${{ env.SHA_SHORT }} | |
fail-build: true | |
severity-cutoff: high | |
add-cpes-if-none: true | |
- name: Inspect action SARIF report | |
shell: bash | |
if: ${{ always() }} | |
run: | | |
echo "::group::Anchore Scan Details" | |
jq '.runs[0].results' ${{ steps.grype-scan.outputs.sarif }} | |
echo "::endgroup::" | |
- name: Anchore upload scan SARIF report | |
if: always() | |
uses: github/codeql-action/upload-sarif@v2 | |
with: | |
sarif_file: ${{ steps.grype-scan.outputs.sarif }} | |
# - name: Kubescape scanner | |
# uses: kubescape/github-action@main | |
# id: kubescape | |
# with: | |
# verbose: true | |
# format: pretty-printer | |
# # can't whitelist CVE yet: https://github.com/kubescape/kubescape/pull/1568 | |
# image: oryd/kratos:${{ env.SHA_SHORT }} | |
# severityThreshold: critical | |
- name: Trivy Scanner | |
uses: aquasecurity/trivy-action@master | |
if: ${{ always() }} | |
with: | |
image-ref: oryd/kratos:${{ env.SHA_SHORT }} | |
format: "table" | |
exit-code: "42" | |
ignore-unfixed: true | |
vuln-type: "os,library" | |
severity: "CRITICAL,HIGH" | |
scanners: "vuln,secret,config" | |
- name: Dockle Linter | |
uses: erzz/[email protected] | |
if: ${{ always() }} | |
with: | |
image: oryd/kratos:${{ env.SHA_SHORT }} | |
exit-code: 42 | |
failure-threshold: high | |
- name: Hadolint | |
uses: hadolint/[email protected] | |
id: hadolint | |
if: ${{ always() }} | |
with: | |
dockerfile: .docker/Dockerfile-build | |
verbose: true | |
format: "json" | |
failure-threshold: "error" | |
- name: View Hadolint results | |
if: ${{ always() }} | |
shell: bash | |
run: | | |
echo "::group::Hadolint Scan Details" | |
echo "${HADOLINT_RESULTS}" | jq '.' | |
echo "::endgroup::" |