Skip to content

Commit a2b8b7b

Browse files
msukkariclaude
andcommitted
chore: rename trivy-vulnerability-triage workflow to vulnerability-triage
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent 588882e commit a2b8b7b

1 file changed

Lines changed: 33 additions & 3 deletions

File tree

.github/workflows/trivy-vulnerability-triage.yml renamed to .github/workflows/vulnerability-triage.yml

Lines changed: 33 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,35 @@ on:
2020
required: false
2121
type: boolean
2222
default: false
23+
workflow_call:
24+
inputs:
25+
image:
26+
description: 'Full Docker image to scan with Trivy (e.g., ghcr.io/org/repo). Leave empty to skip Trivy scanning.'
27+
required: false
28+
type: string
29+
default: ''
30+
image_tag:
31+
description: 'Image tag to scan'
32+
required: false
33+
type: string
34+
default: 'main'
35+
dry_run:
36+
required: false
37+
type: boolean
38+
default: false
39+
force_analysis:
40+
required: false
41+
type: boolean
42+
default: false
43+
secrets:
44+
ANTHROPIC_API_KEY:
45+
required: true
46+
LINEAR_API_KEY:
47+
required: true
48+
LINEAR_TEAM_ID:
49+
required: true
50+
DEPENDABOT_PAT:
51+
required: false
2352

2453
env:
2554
IMAGE: ghcr.io/sourcebot-dev/sourcebot
@@ -34,6 +63,7 @@ jobs:
3463
scan:
3564
name: Trivy Scan
3665
runs-on: ubuntu-latest
66+
if: github.repository == 'sourcebot-dev/sourcebot' || inputs.image != ''
3767
outputs:
3868
has_vulnerabilities: ${{ steps.check.outputs.has_vulnerabilities }}
3969
steps:
@@ -50,7 +80,7 @@ jobs:
5080
- name: Run Trivy vulnerability scan
5181
uses: aquasecurity/trivy-action@master
5282
with:
53-
image-ref: "${{ env.IMAGE }}:${{ inputs.image_tag || 'main' }}"
83+
image-ref: "${{ inputs.image || env.IMAGE }}:${{ inputs.image_tag || 'main' }}"
5484
format: "json"
5585
output: "trivy-results.json"
5686
trivy-config: trivy.yaml
@@ -77,7 +107,7 @@ jobs:
77107
run: |
78108
echo "## Trivy Scan" >> "$GITHUB_STEP_SUMMARY"
79109
echo "" >> "$GITHUB_STEP_SUMMARY"
80-
echo "**Image:** \`${{ env.IMAGE }}:${{ inputs.image_tag || 'main' }}\`" >> "$GITHUB_STEP_SUMMARY"
110+
echo "**Image:** \`${{ inputs.image || env.IMAGE }}:${{ inputs.image_tag || 'main' }}\`" >> "$GITHUB_STEP_SUMMARY"
81111
echo "" >> "$GITHUB_STEP_SUMMARY"
82112
if [ "${{ steps.check.outputs.has_vulnerabilities }}" = "true" ]; then
83113
VULN_COUNT=$(jq '[.Results[]? | .Vulnerabilities[]?] | length' trivy-results.json)
@@ -213,7 +243,7 @@ jobs:
213243
submodules: recursive
214244

215245
- name: Download scan results
216-
if: needs.scan.outputs.has_vulnerabilities == 'true' || inputs.force_analysis == true
246+
if: needs.scan.outputs.has_vulnerabilities == 'true'
217247
uses: actions/download-artifact@v4
218248
with:
219249
name: trivy-results

0 commit comments

Comments
 (0)