feat(prophet): pricepred model handler #662
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: Scan for Vulnerabilities | |
on: | |
pull_request: | |
jobs: | |
scan-trivy-fs: | |
name: Scan Trivy FS | |
runs-on: ubuntu-latest | |
permissions: | |
id-token: write | |
contents: read | |
steps: | |
- uses: actions/checkout@v4 | |
- name: Run Trivy vulnerability scanner | |
uses: aquasecurity/[email protected] | |
with: | |
scan-type: "fs" | |
output: "trivy.txt" | |
severity: "CRITICAL,HIGH" | |
env: | |
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db | |
- name: Publish Trivy Output to Summary | |
run: | | |
if [[ -s trivy.txt ]]; then | |
{ | |
echo "### Security Output" | |
echo "<details><summary>Click to expand</summary>" | |
echo "" | |
echo '```terraform' | |
cat trivy.txt | |
echo '```' | |
echo "</details>" | |
} >> $GITHUB_STEP_SUMMARY | |
fi |