File tree Expand file tree Collapse file tree 3 files changed +78
-0
lines changed Expand file tree Collapse file tree 3 files changed +78
-0
lines changed Original file line number Diff line number Diff line change 1+ #  To get started with Dependabot version updates, you'll need to specify which
2+ #  package ecosystems to update and where the package manifests are located.
3+ #  Please see the documentation for all configuration options:
4+ #  https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
5+ 
6+ version : 2 
7+ updates :
8+   - package-ecosystem : " github-actions" #  See documentation for possible values
9+     directory : " /" #  Location of package manifests
10+     schedule :
11+       interval : " weekly" 
Original file line number Diff line number Diff line change 1+ name : " Code Scanning - Analysis" 
2+ 
3+ on :
4+   pull_request :
5+     branches :
6+       - main 
7+   push :
8+     branches :
9+       - main 
10+ 
11+ jobs :
12+   CodeQL-Build :
13+     runs-on : ubuntu-latest 
14+ 
15+     permissions :
16+       security-events : write 
17+ 
18+     steps :
19+       - name : Checkout repository 
20+         uses : actions/checkout@v3 
21+ 
22+       - name : Setup Java 
23+         uses : actions/setup-java@v3 
24+         with :
25+           distribution : ' adopt-openj9' 
26+           java-version : ' 11' 
27+           check-latest : true 
28+ 
29+       - name : Initialize CodeQL 
30+         uses : github/codeql-action/init@v2 
31+         with :
32+           languages : java 
33+ 
34+       - name : Autobuild 
35+         uses : github/codeql-action/autobuild@v2 
36+ 
37+       - name : Perform CodeQL Analysis 
38+         uses : github/codeql-action/analyze@v2 
Original file line number Diff line number Diff line change 1+ name : " Code Scan - Security" 
2+ on :
3+   pull_request :
4+     branches :
5+       - main 
6+   push :
7+     branches :
8+       - main 
9+ jobs :
10+   build :
11+     name : Build 
12+     runs-on : ubuntu-20.04 
13+     steps :
14+       - name : Checkout code 
15+         uses : actions/checkout@v3 
16+ 
17+       - name : Run Trivy vulnerability scanner in repo mode 
18+         uses : aquasecurity/trivy-action@master 
19+         with :
20+           scan-type : ' fs' 
21+           ignore-unfixed : true 
22+           format : ' sarif' 
23+           output : ' trivy-results.sarif' 
24+           severity : ' CRITICAL' 
25+ 
26+       - name : Upload Trivy scan results to GitHub Security tab 
27+         uses : github/codeql-action/upload-sarif@v2 
28+         with :
29+           sarif_file : ' trivy-results.sarif' 
 
 
   
 
     
   
   
          
    
    
     
    
      
     
     
    You can’t perform that action at this time.
  
 
    
  
    
      
        
     
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments