Skip to content

Fmd 1081 publication details page #140

Fmd 1081 publication details page

Fmd 1081 publication details page #140

Workflow file for this run

---
name: Scan Image
on:
pull_request:
branches:
- main
push:
branches:
- main
permissions: {}
jobs:
scan-image:
name: Scan Image
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write
steps:
- name: Checkout
id: checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Build Image
id: build_image
uses: docker/build-push-action@4f58ea79222b3b9dc2c8bbdd6debcef730109a75 # v6.9.0
with:
push: false
load: true
tags: ingestion-notify
- name: Scan Image (Produce SARIF)
id: scan_image
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # v0.29.0
env:
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
with:
image-ref: ingestion-notify
format: sarif
output: trivy-results.sarif
trivyignores: .trivyignore.yaml
- name: Upload SARIF
if: always()
id: upload_sarif
uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v2.2.7
with:
sarif_file: trivy-results.sarif