Skip to content

Commit cfe8bfd

Browse files
committed
build(ci): fix trivy configuration
1 parent 58bd53c commit cfe8bfd

File tree

3 files changed

+30
-23
lines changed

3 files changed

+30
-23
lines changed
+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
name: Dependency Review
2+
3+
on:
4+
pull_request:
5+
paths-ignore:
6+
- "**/*.md"
7+
8+
permissions:
9+
contents: read
10+
11+
jobs:
12+
dependency-review:
13+
name: Dependency Review
14+
runs-on: ubuntu-22.04
15+
steps:
16+
- name: Checkout Repository
17+
uses: actions/checkout@v4
18+
19+
- name: Dependency Review
20+
uses: actions/dependency-review-action@v4

.github/workflows/pr-security.yml renamed to .github/workflows/security.yml

+5-10
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,19 @@
11
name: Security
22

33
on:
4+
push:
5+
branches: [main, protected]
46
pull_request:
57
paths-ignore:
68
- "**/*.md"
9+
schedule:
10+
- cron: '30 10 * * 1'
11+
workflow_dispatch:
712

813
permissions:
914
contents: read
1015

1116
jobs:
12-
dependency-review:
13-
name: Dependency Review
14-
runs-on: ubuntu-22.04
15-
steps:
16-
- name: Checkout Repository
17-
uses: actions/checkout@v4
18-
19-
- name: Dependency Review
20-
uses: actions/dependency-review-action@v4
21-
2217
vulnerability-scanner:
2318
name: Vulnerability Scanner
2419
permissions:

.github/workflows/tests.yaml

+5-13
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@ jobs:
1919
QUAY_IMAGE: "quay.io/enix/kube-image-keeper"
2020
TRIVY_DB_REPOSITORY: "public.ecr.aws/aquasecurity/trivy-db:2"
2121
steps:
22+
- name: Trigger Security workflow
23+
uses: benc-uk/workflow-dispatch@v1
24+
with:
25+
workflow: Security
26+
2227
- name: Checkout Repository
2328
uses: actions/checkout@v4
2429
with:
@@ -28,19 +33,6 @@ jobs:
2833
id: check-for-cc
2934
uses: webiny/action-conventional-commits@v1.3.0
3035

31-
- name: Run Trivy vulnerability scanner
32-
uses: aquasecurity/trivy-action@0.30.0
33-
with:
34-
scan-type: 'fs'
35-
ignore-unfixed: true
36-
format: 'sarif'
37-
output: 'trivy-results.sarif'
38-
39-
- name: Upload Trivy scan results to GitHub Security tab
40-
uses: github/codeql-action/upload-sarif@v3
41-
with:
42-
sarif_file: 'trivy-results.sarif'
43-
4436
- name: Set up Docker Buildx
4537
uses: docker/setup-buildx-action@v3
4638

0 commit comments

Comments
 (0)