Skip to content

Bump unsafe-libyaml from 0.2.9 to 0.2.10 in /src/main/rust/cardtool #95

Bump unsafe-libyaml from 0.2.9 to 0.2.10 in /src/main/rust/cardtool

Bump unsafe-libyaml from 0.2.9 to 0.2.10 in /src/main/rust/cardtool #95

Workflow file for this run

name: Snyk Container
on:
push:
branches: [ master ]
pull_request:
branches: [ master ]
schedule:
- cron: '0 14 1 * *'
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch: null
jobs:
snyk:
#if: false # disable, due to too many errors
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # pin@v3.1.0
with:
submodules: true
- name: Build a Docker image
run: docker build -t emvcard-builder .
- name: Run Snyk to check Docker image for vulnerabilities
# Snyk can be used to break the build when it detects vulnerabilities.
# In this case we want to upload the issues to GitHub Code Scanning
continue-on-error: true
uses: snyk/actions/docker@4259725f0dd662aa764d82760cca8959888a595c # pin@master
env:
# In order to use the Snyk Action you will need to have a Snyk API token.
# More details in https://github.com/snyk/actions#getting-your-snyk-token
# or you can signup for free at https://snyk.io/login
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
image: emvcard-builder
args: --file=Dockerfile
- name: Upload result to GitHub Code Scanning
uses: github/codeql-action/upload-sarif@e095058bfa09de8070f94e98f5dc059531bc6235 # pin@v1
with:
sarif_file: snyk.sarif