forked from prometheus/node_exporter
-
Notifications
You must be signed in to change notification settings - Fork 0
92 lines (80 loc) · 2.47 KB
/
trivy.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
# Workflow managed by https://github.com/AnchorFree/workflows/
name: Trivy scan
on:
push:
branches: [ "master" ]
pull_request:
types: [opened, reopened, synchronize]
schedule:
# 00:00 every 14 days
- cron: 0 0 */14 * *
permissions:
contents: read
jobs:
trivy-repo-scan:
permissions:
contents: read
security-events: write
actions: read
name: Trivy repo scan
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
with:
lfs: true
submodules: recursive
- name: Checkout LFS objects
run: git lfs checkout
- name: Run Trivy vulnerability scanner in repo mode (table)
uses: aquasecurity/[email protected]
with:
scan-type: 'fs'
ignore-unfixed: true
format: 'table'
- name: Run Trivy vulnerability scanner in repo mode (sarif)
uses: aquasecurity/[email protected]
with:
scan-type: 'fs'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
trivy-image-scan:
permissions:
contents: read
security-events: write
actions: read
name: Trivy image scan
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
with:
lfs: true
submodules: recursive
- name: Checkout LFS objects
run: git lfs checkout
- name: Build an image from Dockerfile
run: |
docker build -t ${{ github.sha }} .
- name: Run Trivy vulnerability scanner in image mode (table output)
uses: aquasecurity/[email protected]
with:
image-ref: '${{ github.sha }}'
ignore-unfixed: true
format: 'table'
- name: Run Trivy vulnerability scanner in image mode (sarif output)
uses: aquasecurity/[email protected]
with:
image-ref: '${{ github.sha }}'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'