172 lines
6.5 KiB
YAML
172 lines
6.5 KiB
YAML
name: Weekly Security Rebuild
|
|
|
|
# Note: This workflow filename has remained consistent. The related docker-publish.yml
|
|
# was replaced by docker-build.yml in commit f640524b (Dec 21, 2025).
|
|
# GitHub Advanced Security may show warnings about the old filename until its tracking updates.
|
|
|
|
on:
|
|
schedule:
|
|
- cron: '0 12 * * 2' # Tuesdays at 12:00 UTC
|
|
workflow_dispatch:
|
|
inputs:
|
|
force_rebuild:
|
|
description: 'Force rebuild without cache'
|
|
required: false
|
|
type: boolean
|
|
default: true
|
|
|
|
concurrency:
|
|
group: ${{ github.workflow }}-${{ github.ref }}
|
|
cancel-in-progress: false
|
|
|
|
permissions:
|
|
contents: read
|
|
|
|
env:
|
|
REGISTRY: ghcr.io
|
|
IMAGE_NAME: ${{ github.repository_owner }}/charon
|
|
|
|
jobs:
|
|
security-rebuild:
|
|
name: Security Rebuild & Scan
|
|
runs-on: ubuntu-latest
|
|
timeout-minutes: 60
|
|
permissions:
|
|
contents: read
|
|
packages: write
|
|
security-events: write
|
|
|
|
steps:
|
|
- name: Checkout repository
|
|
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
|
|
with:
|
|
# Explicitly fetch the current HEAD of the ref at run time, not the
|
|
# SHA that was frozen when this scheduled job was queued. Without this,
|
|
# a queued job can run days later with stale code.
|
|
ref: ${{ github.ref_name }}
|
|
|
|
- name: Normalize image name
|
|
run: |
|
|
echo "IMAGE_NAME=$(echo "${{ env.IMAGE_NAME }}" | tr '[:upper:]' '[:lower:]')" >> "$GITHUB_ENV"
|
|
|
|
- name: Set up QEMU
|
|
uses: docker/setup-qemu-action@ce360397dd3f832beb865e1373c09c0e9f86d70a # v4.0.0
|
|
|
|
- name: Set up Docker Buildx
|
|
uses: docker/setup-buildx-action@4d04d5d9486b7bd6fa91e7baf45bbb4f8b9deedd # v4.0.0
|
|
|
|
- name: Resolve Debian base image digest
|
|
id: base-image
|
|
run: |
|
|
docker pull debian:trixie-slim
|
|
DIGEST=$(docker inspect --format='{{index .RepoDigests 0}}' debian:trixie-slim)
|
|
echo "digest=$DIGEST" >> "$GITHUB_OUTPUT"
|
|
echo "Base image digest: $DIGEST"
|
|
|
|
- name: Log in to Container Registry
|
|
uses: docker/login-action@4907a6ddec9925e35a0a9e82d7399ccc52663121 # v4.1.0
|
|
with:
|
|
registry: ${{ env.REGISTRY }}
|
|
username: ${{ github.actor }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
- name: Extract metadata
|
|
id: meta
|
|
uses: docker/metadata-action@030e881283bb7a6894de51c315a6bfe6a94e05cf # v6.0.0
|
|
with:
|
|
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
|
|
tags: |
|
|
type=raw,value=security-scan-{{date 'YYYYMMDD'}}
|
|
|
|
- name: Build Docker image (NO CACHE)
|
|
id: build
|
|
uses: docker/build-push-action@bcafcacb16a39f128d818304e6c9c0c18556b85f # v7
|
|
with:
|
|
context: .
|
|
platforms: linux/amd64
|
|
push: true
|
|
tags: ${{ steps.meta.outputs.tags }}
|
|
labels: ${{ steps.meta.outputs.labels }}
|
|
no-cache: ${{ github.event_name == 'schedule' || inputs.force_rebuild }}
|
|
pull: true # Always pull fresh base images to get latest security patches
|
|
build-args: |
|
|
VERSION=security-scan
|
|
BUILD_DATE=${{ fromJSON(steps.meta.outputs.json).labels['org.opencontainers.image.created'] }}
|
|
VCS_REF=${{ github.sha }}
|
|
BASE_IMAGE=${{ steps.base-image.outputs.digest }}
|
|
|
|
- name: Run Trivy vulnerability scanner (CRITICAL+HIGH)
|
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0
|
|
with:
|
|
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}@${{ steps.build.outputs.digest }}
|
|
format: 'table'
|
|
severity: 'CRITICAL,HIGH'
|
|
exit-code: '1' # Fail workflow if vulnerabilities found
|
|
version: 'v0.69.3'
|
|
continue-on-error: true
|
|
|
|
- name: Run Trivy vulnerability scanner (SARIF)
|
|
id: trivy-sarif
|
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0
|
|
with:
|
|
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}@${{ steps.build.outputs.digest }}
|
|
format: 'sarif'
|
|
output: 'trivy-weekly-results.sarif'
|
|
severity: 'CRITICAL,HIGH,MEDIUM'
|
|
version: 'v0.69.3'
|
|
|
|
- name: Upload Trivy results to GitHub Security
|
|
uses: github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
|
|
with:
|
|
sarif_file: 'trivy-weekly-results.sarif'
|
|
|
|
- name: Run Trivy vulnerability scanner (JSON for artifact)
|
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0
|
|
with:
|
|
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}@${{ steps.build.outputs.digest }}
|
|
format: 'json'
|
|
output: 'trivy-weekly-results.json'
|
|
severity: 'CRITICAL,HIGH,MEDIUM,LOW'
|
|
version: 'v0.69.3'
|
|
|
|
- name: Upload Trivy JSON results
|
|
uses: actions/upload-artifact@043fb46d1a93c77aae656e7c1c64a875d1fc6a0a # v7
|
|
with:
|
|
name: trivy-weekly-scan-${{ github.run_number }}
|
|
path: trivy-weekly-results.json
|
|
retention-days: 90
|
|
|
|
- name: Check Debian package versions
|
|
run: |
|
|
{
|
|
echo "## 📦 Installed Package Versions"
|
|
echo ""
|
|
echo "Checking key security packages:"
|
|
echo '```'
|
|
docker run --rm --entrypoint "" "${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}@${{ steps.build.outputs.digest }}" \
|
|
sh -c "dpkg -l | grep -E 'libc-ares|curl|libcurl|openssl|libssl' || echo 'No matching packages found'"
|
|
echo '```'
|
|
} >> "$GITHUB_STEP_SUMMARY"
|
|
|
|
- name: Create security scan summary
|
|
if: always()
|
|
run: |
|
|
{
|
|
echo "## 🔒 Weekly Security Rebuild Complete"
|
|
echo ""
|
|
echo "- **Build Date:** $(date -u +"%Y-%m-%d %H:%M:%S UTC")"
|
|
echo "- **Image:** ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}@${{ steps.build.outputs.digest }}"
|
|
echo "- **Cache Used:** No (forced fresh build)"
|
|
echo "- **Trivy Scan:** Completed (see Security tab for details)"
|
|
echo ""
|
|
echo "### Next Steps:"
|
|
echo "1. Review Security tab for new vulnerabilities"
|
|
echo "2. Check Trivy JSON artifact for detailed package info"
|
|
echo "3. If critical CVEs found, trigger production rebuild"
|
|
} >> "$GITHUB_STEP_SUMMARY"
|
|
|
|
- name: Notify on security issues (optional)
|
|
if: failure()
|
|
run: |
|
|
echo "::warning::Weekly security scan found HIGH or CRITICAL vulnerabilities. Review the Security tab."
|