From fe78bcc0e0a652683740d2b5110313a68b2a27c4 Mon Sep 17 00:00:00 2001 From: Anatoliy Babushka Date: Fri, 24 Jan 2025 14:38:59 +0100 Subject: [PATCH] chore: conditionally run Trivy vulnerability scanner for PHP 8.3 in GitHub Actions workflow --- .github/workflows/php.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.github/workflows/php.yml b/.github/workflows/php.yml index 01e06ee..30ea87e 100644 --- a/.github/workflows/php.yml +++ b/.github/workflows/php.yml @@ -65,6 +65,7 @@ jobs: - name: Run Trivy vulnerability scanner in repo mode uses: aquasecurity/trivy-action@0.28.0 + if: ${{ matrix.php-versions == '8.3' }} with: scan-type: 'fs' ignore-unfixed: true @@ -74,5 +75,6 @@ jobs: - name: Upload Trivy scan results to GitHub Security tab uses: github/codeql-action/upload-sarif@v3 + if: ${{ matrix.php-versions == '8.3' }} with: sarif_file: 'trivy-results.sarif'