Browse Source
* ci: add trivy workflow to ensure critical and high vulnerabilties are detected quickly * push trivy-action to 0.13.1pull/4030/head
nico
1 year ago
committed by
GitHub
1 changed files with 43 additions and 0 deletions
@ -0,0 +1,43 @@ |
|||||
|
name: trivy |
||||
|
|
||||
|
on: |
||||
|
push: |
||||
|
branches: |
||||
|
- main |
||||
|
- release-build-revision |
||||
|
tags: |
||||
|
- '*' |
||||
|
pull_request: |
||||
|
branches: [ "main" ] |
||||
|
schedule: |
||||
|
- cron: '00 12 * * *' |
||||
|
|
||||
|
permissions: |
||||
|
contents: read |
||||
|
|
||||
|
jobs: |
||||
|
trivy-scan: |
||||
|
name: Check |
||||
|
runs-on: ubuntu-22.04 |
||||
|
timeout-minutes: 30 |
||||
|
permissions: |
||||
|
contents: read |
||||
|
security-events: write |
||||
|
actions: read |
||||
|
steps: |
||||
|
- name: Checkout code |
||||
|
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 #v4.1.1 |
||||
|
|
||||
|
- name: Run Trivy vulnerability scanner |
||||
|
uses: aquasecurity/trivy-action@f78e9ecf42a1271402d4f484518b9313235990e1 # v0.13.1 |
||||
|
with: |
||||
|
scan-type: repo |
||||
|
ignore-unfixed: true |
||||
|
format: sarif |
||||
|
output: trivy-results.sarif |
||||
|
severity: CRITICAL,HIGH |
||||
|
|
||||
|
- name: Upload Trivy scan results to GitHub Security tab |
||||
|
uses: github/codeql-action/upload-sarif@bad341350a2f5616f9e048e51360cedc49181ce8 # v2.22.4 |
||||
|
with: |
||||
|
sarif_file: 'trivy-results.sarif' |
Loading…
Reference in new issue