feat: Added support for NodePort port numbers configuration #125
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: "[secops] Trivy" | |
# Controls when the workflow will run | |
on: | |
pull_request: | |
branches: | |
- master | |
paths: | |
- mailu/** | |
push: | |
branches: | |
- master | |
paths: | |
- mailu/** | |
- .github/workflows/trivy.yaml | |
- .trivy.yaml | |
# Allows you to run this workflow manually from the Actions tab | |
workflow_dispatch: {} | |
permissions: | |
security-events: write # To upload sarif files | |
jobs: | |
chart-test: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v3 | |
with: | |
fetch-depth: 0 | |
- name: Install Helm | |
uses: azure/setup-helm@v3 | |
with: | |
version: v3.10.0 | |
- name: Install dependencies | |
run: | | |
helm repo add bitnami https://charts.bitnami.com/bitnami | |
helm repo update | |
helm dependency build mailu | |
- name: Set up python | |
uses: actions/setup-python@v4 | |
with: | |
python-version: '3.10' | |
- name: Run Trivy vulnerability scanner in IaC mode | |
uses: aquasecurity/trivy-action@master | |
with: | |
scan-type: 'config' | |
scan-ref: '.' | |
trivy-config: '.trivy.yaml' | |
- name: Upload Trivy scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@v2 | |
with: | |
sarif_file: 'trivy-results.sarif' |