File tree 3 files changed +78
-0
lines changed
3 files changed +78
-0
lines changed Original file line number Diff line number Diff line change
1
+ # To get started with Dependabot version updates, you'll need to specify which
2
+ # package ecosystems to update and where the package manifests are located.
3
+ # Please see the documentation for all configuration options:
4
+ # https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
5
+
6
+ version : 2
7
+ updates :
8
+ - package-ecosystem : " github-actions" # See documentation for possible values
9
+ directory : " /" # Location of package manifests
10
+ schedule :
11
+ interval : " weekly"
Original file line number Diff line number Diff line change
1
+ name : " Code Scanning - Analysis"
2
+
3
+ on :
4
+ pull_request :
5
+ branches :
6
+ - main
7
+ push :
8
+ branches :
9
+ - main
10
+
11
+ jobs :
12
+ CodeQL-Build :
13
+ runs-on : ubuntu-latest
14
+
15
+ permissions :
16
+ security-events : write
17
+
18
+ steps :
19
+ - name : Checkout repository
20
+ uses : actions/checkout@v3
21
+
22
+ - name : Setup Java
23
+ uses : actions/setup-java@v3
24
+ with :
25
+ distribution : ' adopt-openj9'
26
+ java-version : ' 11'
27
+ check-latest : true
28
+
29
+ - name : Initialize CodeQL
30
+ uses : github/codeql-action/init@v2
31
+ with :
32
+ languages : java
33
+
34
+ - name : Autobuild
35
+ uses : github/codeql-action/autobuild@v2
36
+
37
+ - name : Perform CodeQL Analysis
38
+ uses : github/codeql-action/analyze@v2
Original file line number Diff line number Diff line change
1
+ name : " Code Scan - Security"
2
+ on :
3
+ pull_request :
4
+ branches :
5
+ - main
6
+ push :
7
+ branches :
8
+ - main
9
+ jobs :
10
+ build :
11
+ name : Build
12
+ runs-on : ubuntu-20.04
13
+ steps :
14
+ - name : Checkout code
15
+ uses : actions/checkout@v3
16
+
17
+ - name : Run Trivy vulnerability scanner in repo mode
18
+ uses : aquasecurity/trivy-action@master
19
+ with :
20
+ scan-type : ' fs'
21
+ ignore-unfixed : true
22
+ format : ' sarif'
23
+ output : ' trivy-results.sarif'
24
+ severity : ' CRITICAL'
25
+
26
+ - name : Upload Trivy scan results to GitHub Security tab
27
+ uses : github/codeql-action/upload-sarif@v2
28
+ with :
29
+ sarif_file : ' trivy-results.sarif'
You can’t perform that action at this time.
0 commit comments