diff --git a/.github/workflows/anchore.yml b/.github/workflows/anchore.yml index a58c0ff..c872460 100644 --- a/.github/workflows/anchore.yml +++ b/.github/workflows/anchore.yml @@ -13,6 +13,10 @@ permissions: security-events: write actions: read +concurrency: + group: ${{ github.workflow }}-${{ github.ref }} + cancel-in-progress: true + jobs: Anchore-Build-Scan: runs-on: ubuntu-latest diff --git a/.github/workflows/codacy.yml b/.github/workflows/codacy.yml index a8826c9..cdc0ed1 100644 --- a/.github/workflows/codacy.yml +++ b/.github/workflows/codacy.yml @@ -13,6 +13,10 @@ permissions: security-events: write actions: read +concurrency: + group: ${{ github.workflow }}-${{ github.ref }} + cancel-in-progress: true + jobs: codacy-security-scan: name: Codacy Security Scan diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index c75abce..dcdb3ee 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -25,6 +25,10 @@ permissions: actions: read contents: read +concurrency: + group: ${{ github.workflow }}-${{ github.ref }} + cancel-in-progress: true + jobs: analyze: name: Analyze (${{ matrix.language }}) diff --git a/.github/workflows/grype.yml b/.github/workflows/grype.yml index a93be98..79f799a 100644 --- a/.github/workflows/grype.yml +++ b/.github/workflows/grype.yml @@ -13,6 +13,10 @@ permissions: security-events: write actions: read +concurrency: + group: ${{ github.workflow }}-${{ github.ref }} + cancel-in-progress: true + jobs: Anchore-Build-Scan: runs-on: ubuntu-latest diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml index 9b1b448..1929388 100644 --- a/.github/workflows/trivy.yml +++ b/.github/workflows/trivy.yml @@ -7,22 +7,23 @@ name: trivy on: push: - branches: [ "main" ] + branches: ["main"] pull_request: - # The branches below must be a subset of the branches above - branches: [ "main" ] + branches: ["main"] schedule: - - cron: '29 1 * * 4' + - cron: "29 1 * * 4" permissions: contents: read + security-events: write + actions: read + +concurrency: + group: ${{ github.workflow }}-${{ github.ref }} + cancel-in-progress: true jobs: build: - permissions: - contents: read # for actions/checkout to fetch code - security-events: write # for github/codeql-action/upload-sarif to upload SARIF results - actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status name: Build runs-on: "ubuntu-20.04" steps: @@ -36,13 +37,13 @@ jobs: - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@7b7aa264d83dc58691451798b4d117d53d21edfe with: - image-ref: 'ghcr.io/drengskapur/pptx2video:${{ github.sha }}' - format: 'template' - template: '@/contrib/sarif.tpl' - output: 'trivy-results.sarif' - severity: 'CRITICAL,HIGH' + image-ref: "ghcr.io/drengskapur/pptx2video:${{ github.sha }}" + format: "template" + template: "@/contrib/sarif.tpl" + output: "trivy-results.sarif" + severity: "CRITICAL,HIGH" - name: Upload Trivy scan results to GitHub Security tab uses: github/codeql-action/upload-sarif@v3 with: - sarif_file: 'trivy-results.sarif' + sarif_file: "trivy-results.sarif"