chore: update reusable docker pipeline to v0.16.0#221
Conversation
There was a problem hiding this comment.
Pull request overview
This PR updates the reusable Docker pipeline workflow from v0.11.2 to v0.16.0 in the publish workflow. The new version introduces pre-push security scanning with Trivy, including vulnerability detection and secret scanning, with results surfaced in GitHub Actions summaries and the Security tab via SARIF uploads.
Changes:
- Updated
reusable_docker_pipeline.ymlreference to v0.16.0 (commita5bf0dd) - Removed trailing whitespace on lines 11 and 20
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
|
||
| permissions: | ||
| contents: read |
There was a problem hiding this comment.
The v0.16.0 update introduces SARIF upload functionality that uploads vulnerability findings to GitHub Security tab. This requires the security-events: write permission to be added to the permissions block. Without this permission, the SARIF upload step will fail for public repositories.
Add the following to the permissions section:
permissions:
contents: read
security-events: write| contents: read | |
| contents: read | |
| security-events: write |
There was a problem hiding this comment.
It seems to be partially true, but the permission might be needed in the reusable workflow, not here. I will check.
Summary
Updates
reusable_docker_pipeline.ymlto v0.16.0 (a5bf0dd).This version introduces pre-push security scanning — images are scanned
for vulnerabilities and secrets before being pushed to registries.
What changes in v0.16.0
docker_scan: true,trivy_nofail: false,hadolint_nofail: falsepush_to_dockerhubnow defaults tofalsecache-fromfor push steps