Files
server-xray/.github/workflows/trivy-scan.yml
2024-10-05 22:13:01 +10:00

33 lines
822 B
YAML

name: Trivy-scanning
on:
workflow_dispatch:
push:
branches:
- master
- dev
jobs:
Trivy-Scan:
runs-on: ubuntu-latest
steps:
-
name: Checkout
uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
with:
ref: ${{ github.ref }}
-
name: Run Trivy fs vulnerability scanner in fs mode
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0
with:
scan-type: 'fs'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
#severity: 'CRITICAL'
-
name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'