56 lines
1.9 KiB
YAML
56 lines
1.9 KiB
YAML
name: Trivy vulnerability scanner
|
|
on:
|
|
push:
|
|
branches:
|
|
- master
|
|
pull_request:
|
|
jobs:
|
|
build:
|
|
name: Build
|
|
runs-on: ubuntu-18.04
|
|
steps:
|
|
- name: Checkout code
|
|
uses: actions/checkout@v2
|
|
|
|
- name: Install go
|
|
uses: actions/setup-go@v2
|
|
with:
|
|
go-version: ^1.16
|
|
|
|
- name: Build images from Dockerfile
|
|
run: |
|
|
make
|
|
docker build -t test/csi-snapshotter:latest -f ./cmd/csi-snapshotter/Dockerfile --output=type=docker --label revision=latest .
|
|
docker build -t test/snapshot-controller:latest -f ./cmd/snapshot-controller/Dockerfile --output=type=docker --label revision=latest .
|
|
docker build -t test/snapshot-validation-webhook:latest -f ./cmd/snapshot-validation-webhook/Dockerfile --output=type=docker --label revision=latest .
|
|
|
|
- name: Run Trivy vulnerability scanner on csi-snapshotter image
|
|
uses: aquasecurity/trivy-action@master
|
|
with:
|
|
image-ref: 'test/csi-snapshotter:latest'
|
|
format: 'table'
|
|
exit-code: '1'
|
|
ignore-unfixed: true
|
|
vuln-type: 'os,library'
|
|
severity: 'CRITICAL,HIGH,MEDIUM,LOW,UNKNOWN'
|
|
|
|
- name: Run Trivy vulnerability scanner on snapshotter-controller image
|
|
uses: aquasecurity/trivy-action@master
|
|
with:
|
|
image-ref: 'test/snapshot-controller:latest'
|
|
format: 'table'
|
|
exit-code: '1'
|
|
ignore-unfixed: true
|
|
vuln-type: 'os,library'
|
|
severity: 'CRITICAL,HIGH,MEDIUM,LOW,UNKNOWN'
|
|
|
|
- name: Run Trivy vulnerability scanner on snapshot-validation-webhook image
|
|
uses: aquasecurity/trivy-action@master
|
|
with:
|
|
image-ref: 'test/snapshot-validation-webhook:latest'
|
|
format: 'table'
|
|
exit-code: '1'
|
|
ignore-unfixed: true
|
|
vuln-type: 'os,library'
|
|
severity: 'CRITICAL,HIGH,MEDIUM,LOW,UNKNOWN'
|