From c285e955ee0397764969c1417b8c72937f7b9d47 Mon Sep 17 00:00:00 2001 From: Masayoshi Mizutani Date: Tue, 12 Nov 2024 19:51:42 +0900 Subject: [PATCH] fix trivy failure --- .github/workflows/trivy.yml | 28 ++++++++++++++++++++-------- 1 file changed, 20 insertions(+), 8 deletions(-) diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml index a71df39..118d4a4 100644 --- a/.github/workflows/trivy.yml +++ b/.github/workflows/trivy.yml @@ -1,26 +1,38 @@ -name: Vulnerability scan +name: trivy -on: [push] +on: + push: + schedule: + - cron: "0 0 * * *" + workflow_dispatch: jobs: scan: runs-on: ubuntu-latest + permissions: + security-events: write + actions: read + contents: read steps: - name: Checkout upstream repo - uses: actions/checkout@v3 + uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 with: ref: ${{ github.head_ref }} - - name: Run Trivy vulnerability scanner in repo mode - uses: aquasecurity/trivy-action@master + - id: scan + name: Run Trivy vulnerability scanner in repo mode + uses: aquasecurity/trivy-action@f3d98514b056d8c71a3552e8328c225bc7f6f353 # master with: scan-type: "fs" ignore-unfixed: true - format: "template" - template: "@/contrib/sarif.tpl" + format: "sarif" output: "trivy-results.sarif" + exit-code: 1 + env: + TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v1 + if: failure() && steps.scan.outcome == 'failure' + uses: github/codeql-action/upload-sarif@e8893c57a1f3a2b659b6b55564fdfdbbd2982911 # v3.24.0 with: sarif_file: "trivy-results.sarif"