Skip to content

Commit 3e6f787

Browse files
committed
chore(ci): add trivy
1 parent f3f5bf0 commit 3e6f787

File tree

2 files changed

+55
-18
lines changed

2 files changed

+55
-18
lines changed

.github/workflows/lint.yml

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,15 +16,10 @@ jobs:
1616
strategy:
1717
fail-fast: false
1818

19-
permissions:
20-
# required for codeql analysis
21-
security-events: write
22-
2319
steps:
2420
- uses: actions/checkout@v6
2521
- uses: actions/setup-go@v6
26-
with:
27-
go-version: 'stable'
22+
2823
- name: golangci-lint
2924
uses: golangci/golangci-lint-action@v9
3025
with:

.github/workflows/security.yml

Lines changed: 54 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: Security
1+
name: Security scan
22

33
on:
44
push:
@@ -9,41 +9,64 @@ on:
99
- cron: '0 3 * * 1'
1010
workflow_dispatch: # Allow manual trigger
1111

12+
permissions:
13+
contents: read
14+
# required for codeql analysis
15+
security-events: write
16+
1217
jobs:
13-
analyze:
14-
name: analyze
18+
govulncheck:
19+
name: govulncheck
1520
runs-on: ubuntu-latest
1621
strategy:
1722
fail-fast: false
18-
19-
permissions:
20-
contents: read
21-
# required for codeql analysis
22-
security-events: write
23-
2423
steps:
2524
- uses: actions/checkout@v6
2625
- uses: actions/setup-go@v6
27-
with:
28-
go-version: 'stable'
2926

3027
- name: govulncheck
3128
run: govulncheck ./...
3229

30+
bearer:
31+
name: bearer
32+
runs-on: ubuntu-latest
33+
strategy:
34+
fail-fast: false
35+
steps:
36+
- uses: actions/checkout@v6
3337
- name: Bearer
3438
uses: bearer/bearer-action@v2
3539
with:
3640
skip-path: 'docs/'
3741

42+
codeql:
43+
name: codeql
44+
runs-on: ubuntu-latest
45+
strategy:
46+
fail-fast: false
47+
steps:
48+
- uses: actions/checkout@v6
49+
- uses: actions/setup-go@v6
50+
3851
- name: Initialize CodeQL
3952
uses: github/codeql-action/init@v4
4053
with:
4154
languages: go
55+
4256
- name: Autobuild
4357
uses: github/codeql-action/autobuild@v4
4458
- name: Perform CodeQL Analysis
4559
uses: github/codeql-action/analyze@v4
4660

61+
trivy-codeql:
62+
name: trivy-codeql
63+
runs-on: ubuntu-latest
64+
strategy:
65+
fail-fast: false
66+
steps:
67+
- uses: actions/checkout@v6
68+
- uses: actions/setup-go@v6
69+
4770
- name: Run Trivy vulnerability scanner (source code)
4871
uses: aquasecurity/trivy-action@0.35.0
4972
with:
@@ -61,6 +84,15 @@ jobs:
6184
with:
6285
sarif_file: "trivy-results.sarif"
6386

87+
trivy-logs:
88+
name: trivy-logs
89+
runs-on: ubuntu-latest
90+
strategy:
91+
fail-fast: false
92+
steps:
93+
- uses: actions/checkout@v6
94+
- uses: actions/setup-go@v6
95+
6496
- name: Run Trivy scanner (table output for logs)
6597
uses: aquasecurity/trivy-action@0.35.0
6698
if: always()
@@ -71,4 +103,14 @@ jobs:
71103
format: "table"
72104
severity: "CRITICAL,HIGH,MEDIUM"
73105
ignore-unfixed: true
74-
exit-code: "1"
106+
exit-code: "1"
107+
108+
- name: Run Trivy scanner (license)
109+
uses: aquasecurity/trivy-action@0.35.0
110+
if: always()
111+
with:
112+
scan-type: fs
113+
scan-ref: .
114+
scanners: license
115+
severity: UNKNOWN,HIGH,CRITICAL
116+
format: table

0 commit comments

Comments
 (0)