Skip to content

Commit 724edfc

Browse files
committed
Add dependency scanning to CI pipeline
This enables dependency scanning via trivy. Signed-off-by: Juan Antonio Osorio <[email protected]>
1 parent e1b3b4c commit 724edfc

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed

.github/workflows/security.yml

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
# SPDX-FileCopyrightText: Copyright 2023 The Minder Authors
2+
# SPDX-License-Identifier: Apache-2.0
3+
4+
on:
5+
pull_request:
6+
push:
7+
branches:
8+
- main
9+
schedule:
10+
- cron: '0 0 * * *'
11+
12+
jobs:
13+
security-scan:
14+
runs-on: ubuntu-latest
15+
name: Security Scan
16+
steps:
17+
- name: Checkout
18+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
19+
20+
- name: Code Security Scan
21+
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # v0.29.0
22+
with:
23+
scan-type: 'fs'
24+
scanners: vuln,secret
25+
trivy-config: .trivy.yml
26+
exit-code: 1
27+
ignore-unfixed: true
28+
env:
29+
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
30+
TRIVY_USERNAME: ${{ github.actor }}
31+
TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}

0 commit comments

Comments
 (0)