|  | 
|  | 1 | +name: Trivy Security Scan | 
|  | 2 | + | 
|  | 3 | +on: | 
|  | 4 | +  push: | 
|  | 5 | +    branches: | 
|  | 6 | +      - main | 
|  | 7 | +      - release/* | 
|  | 8 | +  pull_request: | 
|  | 9 | +    branches: | 
|  | 10 | +      - main | 
|  | 11 | +      - release/* | 
|  | 12 | +  schedule: | 
|  | 13 | +    # Run daily at 2:00 AM UTC | 
|  | 14 | +    - cron: '0 2 * * *' | 
|  | 15 | +  workflow_dispatch: | 
|  | 16 | + | 
|  | 17 | +permissions: | 
|  | 18 | +  contents: read | 
|  | 19 | +  security-events: write # for uploading SARIF results | 
|  | 20 | +  actions: read | 
|  | 21 | + | 
|  | 22 | +concurrency: | 
|  | 23 | +  group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.sha }} | 
|  | 24 | +  cancel-in-progress: true | 
|  | 25 | + | 
|  | 26 | +jobs: | 
|  | 27 | +  trivy-fs-scan: | 
|  | 28 | +    name: Trivy Filesystem Scan | 
|  | 29 | +    runs-on: ubuntu-latest | 
|  | 30 | +    steps: | 
|  | 31 | +      - name: Checkout code | 
|  | 32 | +        uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | 
|  | 33 | + | 
|  | 34 | +      - name: Run Trivy vulnerability scanner in filesystem mode | 
|  | 35 | +        uses: aquasecurity/trivy-action@f781cce5aab226378ee181d764ab90ea0be3cdd8 # v0.29.0 | 
|  | 36 | +        with: | 
|  | 37 | +          scan-type: 'fs' | 
|  | 38 | +          scan-ref: '.' | 
|  | 39 | +          format: 'sarif' | 
|  | 40 | +          output: 'trivy-fs-results.sarif' | 
|  | 41 | +          severity: 'CRITICAL,HIGH,MEDIUM' | 
|  | 42 | +          trivyignores: '.trivyignore' | 
|  | 43 | + | 
|  | 44 | +      - name: Upload Trivy scan results to GitHub Security tab | 
|  | 45 | +        uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1 | 
|  | 46 | +        if: always() | 
|  | 47 | +        with: | 
|  | 48 | +          sarif_file: 'trivy-fs-results.sarif' | 
|  | 49 | + | 
|  | 50 | +      - name: Upload filesystem scan results as artifact | 
|  | 51 | +        uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 | 
|  | 52 | +        if: always() | 
|  | 53 | +        with: | 
|  | 54 | +          name: trivy-fs-scan-results | 
|  | 55 | +          path: trivy-fs-results.sarif | 
|  | 56 | + | 
|  | 57 | +  trivy-java-scan: | 
|  | 58 | +    name: Trivy Java Dependencies Scan | 
|  | 59 | +    runs-on: ubuntu-latest | 
|  | 60 | +    steps: | 
|  | 61 | +      - name: Checkout code | 
|  | 62 | +        uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | 
|  | 63 | + | 
|  | 64 | +      - name: Set up JDK for running Gradle | 
|  | 65 | +        uses: actions/setup-java@c5195efecf7bdfc987ee8bae7a71cb8b11521c00 # v4.7.1 | 
|  | 66 | +        with: | 
|  | 67 | +          distribution: temurin | 
|  | 68 | +          java-version: 17 | 
|  | 69 | + | 
|  | 70 | +      - name: Set up gradle | 
|  | 71 | +        uses: gradle/actions/setup-gradle@ac638b010cf58a27ee6c972d7336334ccaf61c96 # v4.4.1 | 
|  | 72 | +        with: | 
|  | 73 | +          cache-read-only: ${{ github.event_name == 'pull_request' }} | 
|  | 74 | + | 
|  | 75 | +      - name: Build project | 
|  | 76 | +        run: ./gradlew build -x test | 
|  | 77 | + | 
|  | 78 | +      - name: Run Trivy vulnerability scanner for Java dependencies | 
|  | 79 | +        uses: aquasecurity/trivy-action@f781cce5aab226378ee181d764ab90ea0be3cdd8 # v0.29.0 | 
|  | 80 | +        with: | 
|  | 81 | +          scan-type: 'fs' | 
|  | 82 | +          scan-ref: '.' | 
|  | 83 | +          scanners: 'vuln' | 
|  | 84 | +          format: 'sarif' | 
|  | 85 | +          output: 'trivy-java-results.sarif' | 
|  | 86 | +          severity: 'CRITICAL,HIGH,MEDIUM' | 
|  | 87 | +          trivyignores: '.trivyignore' | 
|  | 88 | + | 
|  | 89 | +      - name: Upload Java dependencies scan results to GitHub Security tab | 
|  | 90 | +        uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1 | 
|  | 91 | +        if: always() | 
|  | 92 | +        with: | 
|  | 93 | +          sarif_file: 'trivy-java-results.sarif' | 
|  | 94 | + | 
|  | 95 | +      - name: Upload Java scan results as artifact | 
|  | 96 | +        uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 | 
|  | 97 | +        if: always() | 
|  | 98 | +        with: | 
|  | 99 | +          name: trivy-java-scan-results | 
|  | 100 | +          path: trivy-java-results.sarif | 
|  | 101 | + | 
|  | 102 | +  trivy-config-scan: | 
|  | 103 | +    name: Trivy Configuration Scan | 
|  | 104 | +    runs-on: ubuntu-latest | 
|  | 105 | +    steps: | 
|  | 106 | +      - name: Checkout code | 
|  | 107 | +        uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | 
|  | 108 | + | 
|  | 109 | +      - name: Run Trivy configuration scanner | 
|  | 110 | +        uses: aquasecurity/trivy-action@f781cce5aab226378ee181d764ab90ea0be3cdd8 # v0.29.0 | 
|  | 111 | +        with: | 
|  | 112 | +          scan-type: 'config' | 
|  | 113 | +          scan-ref: '.' | 
|  | 114 | +          format: 'sarif' | 
|  | 115 | +          output: 'trivy-config-results.sarif' | 
|  | 116 | +          severity: 'CRITICAL,HIGH,MEDIUM' | 
|  | 117 | +          trivyignores: '.trivyignore' | 
|  | 118 | + | 
|  | 119 | +      - name: Upload configuration scan results to GitHub Security tab | 
|  | 120 | +        uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1 | 
|  | 121 | +        if: always() | 
|  | 122 | +        with: | 
|  | 123 | +          sarif_file: 'trivy-config-results.sarif' | 
|  | 124 | + | 
|  | 125 | +      - name: Upload configuration scan results as artifact | 
|  | 126 | +        uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 | 
|  | 127 | +        if: always() | 
|  | 128 | +        with: | 
|  | 129 | +          name: trivy-config-scan-results | 
|  | 130 | +          path: trivy-config-results.sarif | 
|  | 131 | + | 
|  | 132 | +  trivy-secret-scan: | 
|  | 133 | +    name: Trivy Secret Scan | 
|  | 134 | +    runs-on: ubuntu-latest | 
|  | 135 | +    steps: | 
|  | 136 | +      - name: Checkout code | 
|  | 137 | +        uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | 
|  | 138 | + | 
|  | 139 | +      - name: Run Trivy secret scanner | 
|  | 140 | +        uses: aquasecurity/trivy-action@f781cce5aab226378ee181d764ab90ea0be3cdd8 # v0.29.0 | 
|  | 141 | +        with: | 
|  | 142 | +          scan-type: 'fs' | 
|  | 143 | +          scan-ref: '.' | 
|  | 144 | +          scanners: 'secret' | 
|  | 145 | +          format: 'sarif' | 
|  | 146 | +          output: 'trivy-secret-results.sarif' | 
|  | 147 | +          trivyignores: '.trivyignore' | 
|  | 148 | + | 
|  | 149 | +      - name: Upload secret scan results to GitHub Security tab | 
|  | 150 | +        uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1 | 
|  | 151 | +        if: always() | 
|  | 152 | +        with: | 
|  | 153 | +          sarif_file: 'trivy-secret-results.sarif' | 
|  | 154 | + | 
|  | 155 | +      - name: Upload secret scan results as artifact | 
|  | 156 | +        uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 | 
|  | 157 | +        if: always() | 
|  | 158 | +        with: | 
|  | 159 | +          name: trivy-secret-scan-results | 
|  | 160 | +          path: trivy-secret-results.sarif | 
|  | 161 | + | 
|  | 162 | +  workflow-notification: | 
|  | 163 | +    permissions: | 
|  | 164 | +      contents: read | 
|  | 165 | +      issues: write | 
|  | 166 | +    needs: | 
|  | 167 | +      - trivy-fs-scan | 
|  | 168 | +      - trivy-java-scan | 
|  | 169 | +      - trivy-config-scan | 
|  | 170 | +      - trivy-secret-scan | 
|  | 171 | +    if: always() | 
|  | 172 | +    uses: ./.github/workflows/reusable-workflow-notification.yml | 
|  | 173 | +    with: | 
|  | 174 | +      success: ${{ !contains(needs.*.result, 'failure') }} | 
0 commit comments