Skip to content

Commit f8bc3fa

Browse files
committed
Improved trivy code scanning
1 parent 665f59c commit f8bc3fa

File tree

1 file changed

+21
-7
lines changed

1 file changed

+21
-7
lines changed

.github/workflows/trivy-analysis.yaml

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: Trivy
1+
name: Trivy Analysis
22

33
permissions:
44
contents: read
@@ -9,8 +9,10 @@ on:
99
pull_request:
1010
workflow_dispatch:
1111
push:
12-
branches:
13-
- master
12+
13+
env:
14+
SARIF_FILE: 'trivy-results.sarif'
15+
1416
jobs:
1517
build:
1618
name: Scan
@@ -19,17 +21,29 @@ jobs:
1921
- name: Checkout code
2022
uses: actions/[email protected]
2123

22-
- name: Run Trivy vulnerability scanner in repo mode
24+
- name: Run Trivy vulnerability scanner on the cloned repository files
2325
uses: aquasecurity/[email protected]
2426
with:
27+
version: 'v0.61.1'
2528
scan-type: 'fs'
26-
scanners: 'vuln,misconfig,secret'
29+
scanners: 'vuln,misconfig,secret,license'
2730
ignore-unfixed: true
2831
format: 'sarif'
29-
output: 'trivy-results.sarif'
32+
output: ${{ env.SARIF_FILE }}
3033
severity: 'CRITICAL'
3134

35+
- name: Check Trivy scan results existence
36+
run: |
37+
if [ ! -f "${{ env.SARIF_FILE }}" ]; then
38+
echo "Error: ${{ env.SARIF_FILE }} does not exist."
39+
exit 1
40+
fi
41+
ls -lash ${{ env.SARIF_FILE }}
42+
3243
- name: Upload Trivy scan results to GitHub Security tab
3344
uses: github/codeql-action/[email protected]
3445
with:
35-
sarif_file: 'trivy-results.sarif'
46+
sarif_file: ${{ env.SARIF_FILE }}
47+
48+
49+

0 commit comments

Comments
 (0)