github.com/dgraph-io/ristretto@v0.1.2-0.20240116140435-c67e07994f91/.github/workflows/ci-aqua-security-trivy-tests.yml (about) 1 name: ci-aqua-security-trivy-tests 2 on: 3 push: 4 branches: 5 - main 6 pull_request: 7 types: 8 - opened 9 - reopened 10 - synchronize 11 - ready_for_review 12 branches: 13 - main 14 schedule: 15 - cron: "0 0 * * *" 16 jobs: 17 build: 18 name: trivy-tests 19 runs-on: ubuntu-20.04 20 steps: 21 - name: Checkout code 22 uses: actions/checkout@v4 23 - name: Run Trivy vulnerability scanner 24 uses: aquasecurity/trivy-action@master 25 with: 26 scan-type: 'fs' 27 scan-ref: '.' 28 format: 'sarif' 29 output: 'trivy-results.sarif' 30 - name: Upload Trivy scan results to GitHub Security tab 31 uses: github/codeql-action/upload-sarif@v2 32 with: 33 sarif_file: 'trivy-results.sarif'