Skip to content

deps(go): Bump github.com/hashicorp/go-sockaddr from 1.0.6 to 1.0.7 #2945

deps(go): Bump github.com/hashicorp/go-sockaddr from 1.0.6 to 1.0.7

deps(go): Bump github.com/hashicorp/go-sockaddr from 1.0.6 to 1.0.7 #2945

Workflow file for this run

name: Docker Image Scan
on:
push:
branches: [ main ]
tags: [ 'v*' ]
pull_request:
branches: [ main ]
jobs:
image-scan:
permissions:
security-events: write
runs-on: ubuntu-latest
env:
DOCKER_BUILDKIT: 1
DOCKER_CLI_EXPERIMENTAL: enabled
steps:
- uses: actions/checkout@v4
- name: Quick build (linux/alpine only)
run: |
docker build --target gomplate-alpine -t gomplate .
- name: Run Trivy vulnerability scanner (table output)
uses: aquasecurity/trivy-action@master
with:
image-ref: gomplate
format: table
exit-code: 1
ignore-unfixed: true
vuln-type: os,library
severity: CRITICAL,HIGH
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: gomplate
format: sarif
output: trivy-results.sarif
# exit-code: 1
ignore-unfixed: true
vuln-type: os,library
# The SARIF format ignores severity and uploads all vulnerabilities for
# later triage. The table-format step above is used to fail the build if
# there are any critical or high vulnerabilities.
# See https://github.com/aquasecurity/trivy-action/issues/95
# severity: 'CRITICAL,HIGH'
trivyignores: .trivyignore
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
if: always() && github.repository == 'hairyhenderson/gomplate'