diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml index b71ee1e9..11606589 100644 --- a/.github/workflows/trivy.yml +++ b/.github/workflows/trivy.yml @@ -15,40 +15,36 @@ permissions: contents: read jobs: - checkout_code: - runs-on: ubuntu-22.04 - name: Checkout code - steps: - - name: Harden Runner - uses: step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1 - with: - egress-policy: audit - - name: Checkout code - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7 - with: - ref: ${{ inputs.branch }} scan: - runs-on: ubuntu-22.04 - needs: checkout_code permissions: contents: read # for actions/checkout to fetch code security-events: write # for github/codeql-action/upload-sarif to upload SARIF results - name: Scan + runs-on: ubuntu-22.04 + name: Checkout code steps: - - name: Run Trivy vulnerability scanner for 'config' - uses: aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23.0 - with: - scan-type: 'config' - hide-progress: false - ignore-unfixed: true - format: 'sarif' - output: 'trivy-results.sarif' - severity: 'CRITICAL,HIGH,MEDIUM' - - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11 - with: - sarif_file: 'trivy-results.sarif' - - uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3 - with: - name: trivy-results - path: 'trivy-results.sarif' + + - name: Harden Runner + uses: step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1 + with: + egress-policy: audit + - name: Checkout code + uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7 + with: + ref: ${{ inputs.branch }} + - name: Run Trivy vulnerability scanner for 'config' + uses: aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23.0 + with: + scan-type: config + skip-dirs: deployment #helm charts not supported + exit-code: '1' + format: 'sarif' + output: 'trivy-results.sarif' + - name: Upload Trivy scan results to GitHub Security tab + uses: github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11 + with: + sarif_file: 'trivy-results.sarif' + - uses: actions/upload-artifact@v4 + if: always() + with: + name: trivy-results + path: 'trivy-results.sarif'