Skip to content
This repository has been archived by the owner on Aug 6, 2024. It is now read-only.

Commit

Permalink
ci: add vulnerability scan pipeline
Browse files Browse the repository at this point in the history
  • Loading branch information
h3adex committed Dec 7, 2023
1 parent e7b3c7f commit b193d41
Show file tree
Hide file tree
Showing 2 changed files with 28 additions and 0 deletions.
27 changes: 27 additions & 0 deletions .github/workflows/vulnerability-scan.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
name: Vulnerability Scan

on:
release:
types: [ created ]

jobs:
vulnerability-scan:
runs-on: ubuntu-latest
permissions:
contents: read
packages: write
steps:
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2

- name: build local container
uses: docker/build-push-action@v4
with:
tags: docker.io/guardgress:1.0.0-dev
push: false
load: true

- name: Scan image
uses: anchore/scan-action@v3
with:
image: "docker.io/guardgress:1.0.0-dev"
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
# Guardgress
![Tests](https://github.com/h3adex/guardgress/actions/workflows/test-go-code.yaml/badge.svg)
![Vulnerability Scan](https://github.com/h3adex/guardgress/actions/workflows/vulnerability-scan.yaml/badge.svg)
![Docker](https://github.com/h3adex/guardgress/actions/workflows/publish-to-docker.yaml/badge.svg)

Guardgress showcases a Web Application Firewall (WAF) integration within
Expand Down

0 comments on commit b193d41

Please sign in to comment.