Skip to content

Drop python 3.9 support (#336) #44

Drop python 3.9 support (#336)

Drop python 3.9 support (#336) #44

Workflow file for this run

name: Security Scans
on:
schedule:
# Run security checks every day at 2 AM UTC
- cron: "0 2 * * *"
workflow_dispatch:
push:
branches:
- master
- release**
permissions: {}
jobs:
zizmor-scan:
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write # Needed to upload the results to code-scanning dashboard
steps:
- name: Checkout code
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
persist-credentials: false
- name: Run Zizmor scan
uses: open-edge-platform/anomalib/.github/actions/security/zizmor@90e1192dd7d420cb243a93ce17809e43f23fc36d
with:
scan-scope: "all"
severity-level: "LOW"
confidence-level: "LOW"
fail-on-findings: false # reports only
bandit-scan:
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write # Needed to upload the results to code-scanning dashboard
steps:
- name: Checkout code
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
persist-credentials: false
- name: Run Bandit scan
uses: open-edge-platform/anomalib/.github/actions/security/bandit@90e1192dd7d420cb243a93ce17809e43f23fc36d
with:
scan-scope: "all"
severity-level: "LOW"
confidence-level: "LOW"
config_file: "src/python/pyproject.toml"
fail-on-findings: false # reports only
trivy-scan:
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write # Needed to upload the results to code-scanning dashboard
steps:
- name: Checkout code
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
persist-credentials: false
- name: Set up Python
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5.6.0
with:
python-version: "3.10"
- name: Install pip-tools
run: python -m pip install pip-tools
- name: Freeze dependencies
run: pip-compile --extra=full -o requirements.txt src/python/pyproject.toml
- name: Run Trivy scan
id: trivy
uses: open-edge-platform/anomalib/.github/actions/security/trivy@90e1192dd7d420cb243a93ce17809e43f23fc36d
with:
scan_type: "fs"
scan-scope: all
severity: LOW
scanners: "vuln,secret,config"
format: "sarif"
timeout: "15m"
ignore_unfixed: "false"