File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 2020 required : false
2121 type : boolean
2222 default : false
23+ workflow_call :
24+ inputs :
25+ image :
26+ description : ' Full Docker image to scan with Trivy (e.g., ghcr.io/org/repo). Leave empty to skip Trivy scanning.'
27+ required : false
28+ type : string
29+ default : ' '
30+ image_tag :
31+ description : ' Image tag to scan'
32+ required : false
33+ type : string
34+ default : ' main'
35+ dry_run :
36+ required : false
37+ type : boolean
38+ default : false
39+ force_analysis :
40+ required : false
41+ type : boolean
42+ default : false
43+ secrets :
44+ ANTHROPIC_API_KEY :
45+ required : true
46+ LINEAR_API_KEY :
47+ required : true
48+ LINEAR_TEAM_ID :
49+ required : true
50+ DEPENDABOT_PAT :
51+ required : false
2352
2453env :
2554 IMAGE : ghcr.io/sourcebot-dev/sourcebot
3463 scan :
3564 name : Trivy Scan
3665 runs-on : ubuntu-latest
66+ if : github.repository == 'sourcebot-dev/sourcebot' || inputs.image != ''
3767 outputs :
3868 has_vulnerabilities : ${{ steps.check.outputs.has_vulnerabilities }}
3969 steps :
5080 - name : Run Trivy vulnerability scan
5181 uses : aquasecurity/trivy-action@master
5282 with :
53- image-ref : " ${{ env.IMAGE }}:${{ inputs.image_tag || 'main' }}"
83+ image-ref : " ${{ inputs.image || env.IMAGE }}:${{ inputs.image_tag || 'main' }}"
5484 format : " json"
5585 output : " trivy-results.json"
5686 trivy-config : trivy.yaml
77107 run : |
78108 echo "## Trivy Scan" >> "$GITHUB_STEP_SUMMARY"
79109 echo "" >> "$GITHUB_STEP_SUMMARY"
80- echo "**Image:** \`${{ env.IMAGE }}:${{ inputs.image_tag || 'main' }}\`" >> "$GITHUB_STEP_SUMMARY"
110+ echo "**Image:** \`${{ inputs.image || env.IMAGE }}:${{ inputs.image_tag || 'main' }}\`" >> "$GITHUB_STEP_SUMMARY"
81111 echo "" >> "$GITHUB_STEP_SUMMARY"
82112 if [ "${{ steps.check.outputs.has_vulnerabilities }}" = "true" ]; then
83113 VULN_COUNT=$(jq '[.Results[]? | .Vulnerabilities[]?] | length' trivy-results.json)
@@ -213,7 +243,7 @@ jobs:
213243 submodules : recursive
214244
215245 - name : Download scan results
216- if : needs.scan.outputs.has_vulnerabilities == 'true' || inputs.force_analysis == true
246+ if : needs.scan.outputs.has_vulnerabilities == 'true'
217247 uses : actions/download-artifact@v4
218248 with :
219249 name : trivy-results
You can’t perform that action at this time.
0 commit comments