diff --git a/.github/workflows/security-ci.yml b/.github/workflows/security-ci.yml index cdfb3871c31..e34404332c3 100644 --- a/.github/workflows/security-ci.yml +++ b/.github/workflows/security-ci.yml @@ -2,47 +2,6 @@ name: Security CI on: [push, pull_request] jobs: - snyk: - name: Snyk and Publish - runs-on: ubuntu-latest - steps: - - name: Checkout Source - uses: actions/checkout@master - - name: Run Snyk to check for vulnerabilities - uses: snyk/actions/golang@master - continue-on-error: true - env: - SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} - GOFLAGS: "-buildvcs=false" - with: - args: --org=${{ secrets.SNYK_ORG }} --severity-threshold=medium --sarif-file-output=snyk.sarif - - name: Upload result to GitHub Code Scanning - uses: github/codeql-action/upload-sarif@v2 - continue-on-error: true - with: - sarif_file: snyk.sarif - - snyk-code: - name: Snyk Code and Publish - runs-on: ubuntu-latest - continue-on-error: true - steps: - - name: Checkout Source - uses: actions/checkout@master - - name: Run Snyk SAST to check for code vulnerabilities - uses: snyk/actions/golang@master - continue-on-error: true - env: - SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} - with: - args: --org=${{ secrets.SNYK_ORG }} --sarif-file-output=snyk.sarif - command: code test - - name: Upload result to GitHub Code Scanning - continue-on-error: true - uses: github/codeql-action/upload-sarif@v2 - with: - sarif_file: snyk.sarif - govuln: name: Run govuln check and Publish runs-on: ubuntu-latest diff --git a/.github/workflows/security-sonarqube-ci.yml b/.github/workflows/security-sonarqube-ci.yml deleted file mode 100644 index eb36e383ec7..00000000000 --- a/.github/workflows/security-sonarqube-ci.yml +++ /dev/null @@ -1,32 +0,0 @@ -name: SonarQube CI -on: - push: - branches: - - devel - -jobs: - sonarqube: - name: SonarQube - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v2 - with: - # Disabling shallow clone is recommended for improving relevancy of reporting. - fetch-depth: 0 - - # Triggering SonarQube analysis as results of it are required by Quality Gate check. - - name: SonarQube Scan - uses: sonarsource/sonarqube-scan-action@master - env: - SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} - SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }} - - # Check the Quality Gate status. - - name: SonarQube Quality Gate check - id: sonarqube-quality-gate-check - uses: sonarsource/sonarqube-quality-gate-action@master - # Force to fail step after specific time. - timeout-minutes: 5 - env: - SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} - SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}