Skip to content

chore: bump the k8s group across 1 directory with 6 updates #134

chore: bump the k8s group across 1 directory with 6 updates

chore: bump the k8s group across 1 directory with 6 updates #134

Workflow file for this run

# name: scan_vulns
# on:
# push:
# paths-ignore:
# - ".github/workflows/website.yaml"
# - "docs/**"
# - "library/**"
# - "demo/**"
# - "deprecated/**"
# - "example/**"
# - "website/**"
# - "**.md"
# - "!cmd/build/helmify/static/README.md"
# pull_request:
# paths-ignore:
# - ".github/workflows/website.yaml"
# - "docs/**"
# - "library/**"
# - "demo/**"
# - "deprecated/**"
# - "example/**"
# - "website/**"
# - "**.md"
# - "!cmd/build/helmify/static/README.md"
# permissions: read-all
# jobs:
# govulncheck:
# name: "Run govulncheck"
# runs-on: ubuntu-22.04
# timeout-minutes: 15
# steps:
# - name: Harden Runner
# uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
# with:
# egress-policy: audit
# - uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
# with:
# go-version: "1.22"
# check-latest: true
# - uses: golang/govulncheck-action@b625fbe08f3bccbe446d94fbf87fcc875a4f50ee # v1.0.4
# scan_vulnerabilities:
# name: "[Trivy] Scan for vulnerabilities"
# runs-on: ubuntu-22.04
# timeout-minutes: 15
# steps:
# - name: Harden Runner
# uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
# with:
# egress-policy: audit
# - name: Check out code into the Go module directory
# uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
# - name: Download trivy
# run: |
# pushd $(mktemp -d)
# wget https://github.com/aquasecurity/trivy/releases/download/v${{ env.TRIVY_VERSION }}/trivy_${{ env.TRIVY_VERSION }}_Linux-64bit.tar.gz
# tar zxvf trivy_${{ env.TRIVY_VERSION }}_Linux-64bit.tar.gz
# echo "$(pwd)" >> $GITHUB_PATH
# env:
# TRIVY_VERSION: "0.46.0"
# - name: Run trivy on git repository
# run: |
# trivy fs --format table --ignore-unfixed --skip-dirs website --scanners vuln .
# - name: Build docker images
# run: |
# make docker-buildx \
# IMG=gatekeeper-e2e:latest
# make docker-buildx-crds \
# CRD_IMG=gatekeeper-crds:latest
# - name: Run trivy on images
# run: |
# for img in "gatekeeper-e2e:latest" "gatekeeper-crds:latest"; do
# trivy image --ignore-unfixed --vuln-type="os,library" "${img}"
# done