@@ -14,45 +14,6 @@ concurrency:
1414 cancel-in-progress : true
1515
1616jobs :
17- codeql :
18- name : CodeQL
19- if : ${{ ! github.event.pull_request.draft }}
20- runs-on : ubuntu-22.04
21- timeout-minutes : 5
22- steps :
23- - uses : actions/checkout@v4
24- - uses : github/codeql-action/init@v3
25- with :
26- languages : javascript
27-
28- - name : Perform CodeQL Analysis
29- uses : github/codeql-action/analyze@v3
30- with :
31- category : " /language:javascript"
32-
33- # https://github.com/marketplace/actions/aqua-security-trivy
34- trivy :
35- name : Trivy Security Scan
36- if : ${{ ! github.event.pull_request.draft }}
37- runs-on : ubuntu-22.04
38- timeout-minutes : 1
39- steps :
40- - uses : actions/checkout@v4
41- - name : Run Trivy vulnerability scanner in repo mode
42- uses :
aquasecurity/[email protected] 43- with :
44- format : " sarif"
45- output : " trivy-results.sarif"
46- ignore-unfixed : true
47- scan-type : " fs"
48- scanners : " vuln,secret,config"
49- severity : " CRITICAL,HIGH"
50-
51- - name : Upload Trivy scan results to GitHub Security tab
52- uses : github/codeql-action/upload-sarif@v3
53- with :
54- sarif_file : " trivy-results.sarif"
55-
5617 tests :
5718 name : Tests
5819 if : ${{ ! github.event.pull_request.draft }}
@@ -96,10 +57,44 @@ jobs:
9657 sonar_token : ${{ secrets[matrix.token] }}
9758 triggers : ('${{ matrix.dir }}/')
9859
99- results :
100- name : Results
101- needs : [codeql, trivy, tests]
60+ codeql :
61+ name : CodeQL
62+ if : ${{ ! github.event.pull_request.draft }}
63+ needs : [tests]
64+ runs-on : ubuntu-22.04
65+ timeout-minutes : 5
66+ steps :
67+ - uses : actions/checkout@v4
68+ - uses : github/codeql-action/init@v3
69+ with :
70+ languages : javascript
71+
72+ - name : Perform CodeQL Analysis
73+ uses : github/codeql-action/analyze@v3
74+ with :
75+ category : " /language:javascript"
76+
77+ # https://github.com/marketplace/actions/aqua-security-trivy
78+ trivy :
79+ name : Trivy Security Scan
80+ if : ${{ ! github.event.pull_request.draft }}
81+ needs : [tests]
10282 runs-on : ubuntu-22.04
10383 timeout-minutes : 1
10484 steps :
105- - run : echo "Success!"
85+ - uses : actions/checkout@v4
86+ - name : Run Trivy vulnerability scanner in repo mode
87+ uses :
aquasecurity/[email protected] 88+ with :
89+ format : " sarif"
90+ output : " trivy-results.sarif"
91+ ignore-unfixed : true
92+ scan-type : " fs"
93+ scanners : " vuln,secret,config"
94+ severity : " CRITICAL,HIGH"
95+
96+ - name : Upload Trivy scan results to GitHub Security tab
97+ uses : github/codeql-action/upload-sarif@v3
98+ with :
99+ sarif_file : " trivy-results.sarif"
100+
0 commit comments