File tree Expand file tree Collapse file tree 1 file changed +0
-42
lines changed
Expand file tree Collapse file tree 1 file changed +0
-42
lines changed Original file line number Diff line number Diff line change @@ -216,46 +216,4 @@ jobs:
216216 path : sbom.spdx.json
217217 retention-days : 90
218218
219- # Scan container for vulnerabilities
220- scan :
221- name : Scan
222- needs : manifest
223- runs-on : ubuntu-latest
224- if : github.event_name != 'pull_request'
225- permissions :
226- contents : read
227- packages : read
228- security-events : write
229- steps :
230- - name : Harden the runner (Audit all outbound calls)
231- uses : step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
232- with :
233- egress-policy : audit
234-
235- - name : Log in to GitHub Container Registry
236- uses : step-security/docker-login-action@c3e677aae8393bc9c81cfdf9709648720ea4bd4d # v3.6.0
237- with :
238- registry : ${{ env.REGISTRY }}
239- username : ${{ github.actor }}
240- password : ${{ secrets.GITHUB_TOKEN }}
241219
242- - name : Extract metadata
243- id : meta
244- uses : docker/metadata-action@c299e40c65443455700f0fdfc63efafe5b349051 # v5.10.0
245- with :
246- images : ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
247- tags : |
248- type=sha,prefix=sha-
249-
250- - name : Run Trivy vulnerability scanner
251- uses : aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # 0.34.1
252- with :
253- image-ref : ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ steps.meta.outputs.version }}
254- format : " sarif"
255- output : " trivy-results.sarif"
256- severity : " CRITICAL,HIGH"
257-
258- - name : Upload Trivy scan results
259- uses : github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
260- with :
261- sarif_file : " trivy-results.sarif"
You can’t perform that action at this time.
0 commit comments