Files
p2pool-docker/.github/workflows/trivy-analysis.yml
Seth Simmons c8fa7fd543 Only run Trivy against Dockerfile changes
As the Trivy run is scheduled via cron, we should only run in addition to that if the Dockerfile itself is changed.
2021-07-13 19:45:44 +00:00

38 lines
964 B
YAML

name: Build and scan container for vulnerabilities with Trivy
on:
push:
paths:
- 'Dockerfile'
pull_request:
paths:
- 'Dockerfile'
schedule:
- cron: '22 14 * * 0'
jobs:
build:
name: Build
runs-on: "ubuntu-18.04"
steps:
- name: Checkout code
uses: actions/checkout@v2
- name: Build an image from Dockerfile
run: |
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
format: 'template'
template: '@/contrib/sarif.tpl'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: 'trivy-results.sarif'