Skip to content

build(deps): bump github/codeql-action from 3.26.1 to 3.26.2 #2091

build(deps): bump github/codeql-action from 3.26.1 to 3.26.2

build(deps): bump github/codeql-action from 3.26.1 to 3.26.2 #2091

Workflow file for this run

name: Trivy Container Scan
on:
push:
branches: [main]
pull_request:
# The branches below must be a subset of the branches above
branches: [main]
permissions:
contents: read
jobs:
build:
runs-on: ubuntu-latest
permissions:
security-events: write
steps:
- name: Harden Runner
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde # v2.9.1
with:
egress-policy: audit
- uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0
- name: Build the Docker image
run: docker build . --file Dockerfile --tag vprodemo.azurecr.io/mps:${{ github.sha }} --tag vprodemo.azurecr.io/mps:latest
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # master
with:
image-ref: 'vprodemo.azurecr.io/mps:${{ github.sha }}'
format: 'sarif'
output: 'trivy-results.sarif'
exit-code: '1'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@429e1977040da7a23b6822b13c129cd1ba93dbb2 # v3.26.2
if: always()
with:
sarif_file: 'trivy-results.sarif'