You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							53 lines
						
					
					
						
							1.5 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							53 lines
						
					
					
						
							1.5 KiB
						
					
					
				| name: Trivy | |
| permissions: {} | |
| 
 | |
| on: | |
|   push: | |
|     branches: | |
|       - main | |
| 
 | |
|     tags: | |
|       - '*' | |
| 
 | |
|   pull_request: | |
|     branches: | |
|       - main | |
| 
 | |
|   schedule: | |
|     - cron: '08 11 * * *' | |
| 
 | |
| jobs: | |
|   trivy-scan: | |
|     # Only run this in the upstream repo and not on forks | |
|     # When all forks run this at the same time, it is causing `Too Many Requests` issues | |
|     if: ${{ github.repository == 'dani-garcia/vaultwarden' }} | |
|     name: Trivy Scan | |
|     permissions: | |
|       contents: read | |
|       actions: read | |
|       security-events: write | |
|     runs-on: ubuntu-24.04 | |
|     timeout-minutes: 30 | |
| 
 | |
|     steps: | |
|       - name: Checkout code | |
|         uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 #v4.2.2 | |
|         with: | |
|           persist-credentials: false | |
| 
 | |
|       - name: Run Trivy vulnerability scanner | |
|         uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # v0.32.0 | |
|         env: | |
|           TRIVY_DB_REPOSITORY: docker.io/aquasec/trivy-db:2,public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2 | |
|           TRIVY_JAVA_DB_REPOSITORY: docker.io/aquasec/trivy-java-db:1,public.ecr.aws/aquasecurity/trivy-java-db:1,ghcr.io/aquasecurity/trivy-java-db:1 | |
|         with: | |
|           scan-type: repo | |
|           ignore-unfixed: true | |
|           format: sarif | |
|           output: trivy-results.sarif | |
|           severity: CRITICAL,HIGH | |
| 
 | |
|       - name: Upload Trivy scan results to GitHub Security tab | |
|         uses: github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2 | |
|         with: | |
|           sarif_file: 'trivy-results.sarif'
 | |
| 
 |