diff --git a/.github/workflows/build.yaml b/.github/workflows/build.yaml index 3f31cf2..f99029b 100644 --- a/.github/workflows/build.yaml +++ b/.github/workflows/build.yaml @@ -5,10 +5,10 @@ name: build on: pull_request: branches: - - '*' + - "*" push: branches: - - 'master' + - "main" jobs: docker: diff --git a/.github/workflows/lint.yaml b/.github/workflows/lint.yaml index b41ab9a..7a177dc 100644 --- a/.github/workflows/lint.yaml +++ b/.github/workflows/lint.yaml @@ -8,7 +8,7 @@ on: - "*" push: branches: - - "master" + - "main" jobs: hadolint: diff --git a/.github/workflows/trivy-analysis.yaml b/.github/workflows/trivy-analysis.yaml index c248066..0c46153 100644 --- a/.github/workflows/trivy-analysis.yaml +++ b/.github/workflows/trivy-analysis.yaml @@ -5,7 +5,7 @@ name: trivy-analysis on: push: branches: - - master + - "main" pull_request: jobs: @@ -23,13 +23,13 @@ jobs: - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@master with: - image-ref: 'docker.io/dokku/ambassador:${{ github.sha }}' - format: 'template' - template: '@/contrib/sarif.tpl' - output: 'trivy-results.sarif' - severity: 'CRITICAL,HIGH' + image-ref: "docker.io/dokku/ambassador:${{ github.sha }}" + format: "template" + template: "@/contrib/sarif.tpl" + output: "trivy-results.sarif" + severity: "CRITICAL,HIGH" - name: Upload Trivy scan results to GitHub Security tab uses: github/codeql-action/upload-sarif@v3 with: - sarif_file: 'trivy-results.sarif' + sarif_file: "trivy-results.sarif"