Skip to content
This repository was archived by the owner on Dec 5, 2025. It is now read-only.
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 15 additions & 15 deletions .github/workflows/security-scan.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,4 @@
name: Vulnerability Scan
run-name: Vulnerability Scan for ${{ inputs.target }} ${{ inputs.image && format('({0})', inputs.image) || '' }}
# This workflow performs security vulnerability scanning on Docker images or source code
# using Trivy and Grype tools. It can be triggered manually via workflow_dispatch.

name: Docker Security Scan
on:
workflow_dispatch:
inputs:
Expand All @@ -15,22 +11,21 @@ on:
- docker
- source
image:
description: "Docker image (for docker). By default ghcr.io/<owner>/<repo>:latest"
description: "Docker image (for 'docker' target). By default ghcr.io/<owner>/<repo>:latest"
required: false
default: ""
type: string
only-high-critical:
description: "Scope only HIGH + CRITICAL"
description: "Scan only HIGH + CRITICAL"
required: false
default: true
type: boolean
trivy-scan:
description: "Trivy scan"
description: "Run Trivy scan"
required: false
default: true
type: boolean
grype-scan:
description: "Grype scan"
description: "Run Grype scan"
required: false
default: true
type: boolean
Expand All @@ -40,13 +35,18 @@ on:
default: true
type: boolean

permissions:
contents: read
security-events: write
actions: read

jobs:
security-scan:
uses: Netcracker/qubership-workflow-hub/.github/workflows/re-security-scan.yml@main
uses: netcracker/qubership-workflow-hub/.github/workflows/re-security-scan.yml@main
with:
target: ${{ inputs.target }}
image: ${{ inputs.image }}
only-high-critical: ${{ inputs.only-high-critical }}
target: ${{ github.event.inputs.target || 'source' }}
image: ${{ github.event.inputs.image || '' }}
only-high-critical: ${{ inputs.only-high-critical}}
trivy-scan: ${{ inputs.trivy-scan }}
grype-scan: ${{ inputs.grype-scan }}
continue-on-error: ${{ inputs.continue-on-error }}
continue-on-error: ${{ inputs.continue-on-error }}
Loading