feat: allow externalService nodePort to be set #147
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: "[secops] Trivy" | |
# Controls when the workflow will run | |
on: | |
pull_request: | |
branches: | |
- master | |
paths: | |
- mailu/** | |
push: | |
branches: | |
- master | |
paths: | |
- mailu/** | |
- .github/workflows/trivy.yaml | |
- .trivy.yaml | |
# Allows you to run this workflow manually from the Actions tab | |
workflow_dispatch: {} | |
permissions: | |
security-events: write # To upload sarif files | |
jobs: | |
chart-test: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v3 | |
with: | |
fetch-depth: 0 | |
- name: Install Helm | |
uses: azure/setup-helm@v3 | |
with: | |
version: v3.10.0 | |
- name: Install dependencies | |
run: | | |
helm repo add bitnami https://charts.bitnami.com/bitnami | |
helm repo update | |
helm dependency build mailu | |
- name: Set up python | |
uses: actions/setup-python@v4 | |
with: | |
python-version: '3.10' | |
- name: Run Trivy vulnerability scanner in IaC mode | |
uses: aquasecurity/trivy-action@master | |
with: | |
scan-type: 'config' | |
scan-ref: '.' | |
trivy-config: '.trivy.yaml' | |
- name: Upload Trivy scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@v2 | |
with: | |
sarif_file: 'trivy-results.sarif' |