1
0
mirror of https://github.com/tommytran732/Synapse-Docker synced 2024-11-24 12:11:34 -05:00

Compare commits

...

2 Commits

Author SHA1 Message Date
4ab1f29957
Use Ubuntu 24.04 runners
Signed-off-by: Tommy <contact@tommytran.io>
2024-07-19 22:04:45 -07:00
015cd9066a
Use Ubuntu 24.04 runners
Signed-off-by: Tommy <contact@tommytran.io>
2024-07-19 21:45:21 -07:00

View File

@ -19,7 +19,7 @@ env:
jobs:
build:
name: Build & push new image
runs-on: "ubuntu-latest"
runs-on: ubuntu-24.04
permissions:
contents: read
packages: write
@ -79,36 +79,36 @@ jobs:
needs: build
permissions:
security-events: write
runs-on: "ubuntu-latest"
runs-on: ubuntu-24.04
steps:
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: 'ghcr.io/tommytran732/synapse'
format: 'template'
image-ref: ghcr.io/tommytran732/synapse
format: template
template: '@/contrib/sarif.tpl'
output: 'trivy-results.sarif'
severity: 'UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL'
vuln-type: "os,library"
output: trivy-results.sarif
severity: UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL
vuln-type: os,library
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
category: 'trivy'
sarif_file: trivy-results.sarif
category: trivy
grype:
name: Scan current image with Grype
needs: build
permissions:
security-events: write
runs-on: "ubuntu-latest"
runs-on: ubuntu-24.04
steps:
- name: Run Grype vulnerability scanner
uses: anchore/scan-action@v4
id: grype
with:
image: "ghcr.io/tommytran732/synapse"
image: ghcr.io/tommytran732/synapse
fail-build: false
- name: Upload Grype scan results to GitHub Security tab