mirror of
https://github.com/keycloak/keycloak.git
synced 2026-01-10 15:32:05 -03:30
Trivy workflow is not reporting issues on other branches Closes #37331 Co-authored-by: Jon Koops <jonkoops@gmail.com> Signed-off-by: Bruno Oliveira da Silva <bruno@abstractj.com>
46 lines
1.2 KiB
YAML
46 lines
1.2 KiB
YAML
name: Trivy
|
|
|
|
on:
|
|
workflow_dispatch:
|
|
|
|
defaults:
|
|
run:
|
|
shell: bash
|
|
|
|
jobs:
|
|
|
|
analysis:
|
|
name: Vulnerability scanner for containers
|
|
runs-on: ubuntu-latest
|
|
if: github.repository == 'keycloak/keycloak'
|
|
strategy:
|
|
matrix:
|
|
container: [keycloak, keycloak-operator]
|
|
fail-fast: false
|
|
steps:
|
|
- name: Extract release ID
|
|
id: release
|
|
run: echo "id=${GITHUB_REF#refs/heads/release/}" >> $GITHUB_OUTPUT
|
|
|
|
- name: Checkout code
|
|
uses: actions/checkout@v4
|
|
|
|
- name: Run Trivy vulnerability scanner
|
|
uses: aquasecurity/trivy-action@0.29.0
|
|
with:
|
|
image-ref: quay.io/keycloak/${{ matrix.container }}:${{ steps.release.outputs.id }}
|
|
format: sarif
|
|
output: trivy-results.sarif
|
|
severity: MEDIUM,CRITICAL,HIGH
|
|
ignore-unfixed: true
|
|
security-checks: vuln
|
|
timeout: 15m
|
|
env:
|
|
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
|
|
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db
|
|
|
|
- name: Upload Trivy scan results to GitHub Security tab
|
|
uses: github/codeql-action/upload-sarif@v3
|
|
with:
|
|
sarif_file: trivy-results.sarif
|