-
-
Notifications
You must be signed in to change notification settings - Fork 19
41 lines (40 loc) · 1.25 KB
/
trivy.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
name: Trivy Scan
on:
push:
branches: [ main ]
tags: [ 'v*' ]
pull_request:
branches: [ main ]
jobs:
trivy:
permissions:
security-events: write
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Run Trivy vulnerability scanner (table output)
uses: aquasecurity/trivy-action@master
with:
scan-type: fs
format: table
exit-code: 1
ignore-unfixed: true
vuln-type: os,library
severity: CRITICAL,HIGH
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
scan-type: fs
# The SARIF format ignores severity and uploads all vulnerabilities for
# later triage. The table-format step above is used to fail the build if
# there are any critical or high vulnerabilities.
# See https://github.com/aquasecurity/trivy-action/issues/95
format: sarif
output: trivy-results.sarif
ignore-unfixed: true
vuln-type: os,library
- name: Upload Trivy scan results to GitHub Security tab
if: always() && github.repository == 'hairyhenderson/go-fsimpl'
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'