-
Notifications
You must be signed in to change notification settings - Fork 301
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'master' into amd/dfuse-ch-evict
- Loading branch information
Showing
1,697 changed files
with
68,824 additions
and
41,943 deletions.
There are no files selected for viewing
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
name: Trivy scan | ||
|
||
on: | ||
pull_request: | ||
branches: ["master", "release/**"] | ||
|
||
# Declare default permissions as nothing. | ||
permissions: {} | ||
|
||
jobs: | ||
build: | ||
name: Build | ||
runs-on: ubuntu-20.04 | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | ||
|
||
- name: Run Trivy vulnerability scanner in repo mode | ||
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0 | ||
with: | ||
scan-type: 'fs' | ||
scan-ref: '.' | ||
trivy-config: 'utils/trivy/trivy.yaml' | ||
|
||
- name: Prepare the report to be uploaded to the GitHub artifact store | ||
run: | | ||
mkdir report | ||
cp trivy-report-daos.txt report | ||
cp utils/trivy/.trivyignore report/trivyignore.txt | ||
- name: Upload the report to the GitHub artifact store | ||
uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3 | ||
with: | ||
path: report/* | ||
name: trivy-report-daos | ||
|
||
- name: Adjust config file to use sarif format | ||
run: | | ||
sed -i 's/output: "trivy-report-daos.txt"/output: "trivy-results.sarif"/g' \ | ||
utils/trivy/trivy.yaml | ||
sed -i 's/format: template/format: sarif/g' utils/trivy/trivy.yaml | ||
- name: Run Trivy vulnerability scanner in repo mode | ||
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0 | ||
with: | ||
scan-type: 'fs' | ||
scan-ref: '.' | ||
trivy-config: 'utils/trivy/trivy.yaml' | ||
|
||
- name: Upload Trivy scan results to GitHub Security tab | ||
uses: github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a | ||
# 3.25.15 (v3) | ||
with: | ||
sarif_file: 'trivy-results.sarif' | ||
|
||
- name: Adjust config file to show and validate scan results | ||
run: | | ||
sed -i 's/output: "trivy-results.sarif"//g' utils/trivy/trivy.yaml | ||
sed -i 's/format: sarif/format: table/g' utils/trivy/trivy.yaml | ||
sed -i 's/exit-code: 0/exit-code: 1/g' utils/trivy/trivy.yaml | ||
- name: Run Trivy vulnerability scanner in repo mode | ||
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0 | ||
with: | ||
scan-type: 'fs' | ||
scan-ref: '.' | ||
trivy-config: 'utils/trivy/trivy.yaml' |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.