Skip to content

Commit 3e79d79

Browse files
authored
Merge pull request #398 from stefanprodan/govulncheck
Run CVE scan with govulncheck
2 parents 2927336 + cd555cf commit 3e79d79

File tree

2 files changed

+9
-17
lines changed

2 files changed

+9
-17
lines changed

.github/workflows/cve-scan.yml

Lines changed: 8 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,23 @@
11
name: cve-scan
22

33
on:
4+
workflow_dispatch:
45
push:
56
branches:
67
- "master"
8+
pull_request:
9+
branches:
10+
- "master"
711

812
permissions:
913
contents: read
1014

1115
jobs:
12-
trivy:
16+
govulncheck:
1317
runs-on: ubuntu-latest
1418
steps:
1519
- name: Checkout
1620
uses: actions/checkout@v4
17-
- name: Build image
18-
id: build
19-
run: |
20-
IMAGE=test/podinfo:${GITHUB_SHA}
21-
docker build -t ${IMAGE} .
22-
echo "image=$IMAGE" >> $GITHUB_OUTPUT
23-
- name: Run Trivy vulnerability scanner
24-
uses: aquasecurity/trivy-action@v0.30.0
25-
with:
26-
image-ref: ${{ steps.build.outputs.image }}
27-
format: table
28-
exit-code: "1"
29-
ignore-unfixed: true
30-
vuln-type: os,library
31-
severity: CRITICAL,HIGH
21+
- name: Vulnerability scan
22+
id: govulncheck
23+
uses: golang/govulncheck-action@v1

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Specifications:
2525
* Multi-arch container image with Docker buildx and GitHub Actions
2626
* Container image signing with Sigstore cosign
2727
* SBOMs and SLSA Provenance embedded in the container image
28-
* CVE scanning with Trivy
28+
* CVE scanning with govulncheck
2929

3030
Web API:
3131

0 commit comments

Comments
 (0)