From 041cbfff6e0e11a0b79c81d09a45ef35a22cf95e Mon Sep 17 00:00:00 2001 From: paspo Date: Fri, 17 Jan 2025 00:02:47 +0100 Subject: [PATCH] fix trivy --- .gitea/workflows/vulnscan.yaml | 15 +-------------- 1 file changed, 1 insertion(+), 14 deletions(-) diff --git a/.gitea/workflows/vulnscan.yaml b/.gitea/workflows/vulnscan.yaml index 6f09103..1d63868 100644 --- a/.gitea/workflows/vulnscan.yaml +++ b/.gitea/workflows/vulnscan.yaml @@ -16,12 +16,6 @@ jobs: - name: Pull docker image run: docker pull docker.asperti.com/paspo/dnscache:latest - - uses: actions/cache/restore@v4 - with: - path: | - /root/.cache/trivy - key: trivy-db - - name: Setup trivy run: | wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.57.1/trivy_0.57.1_Linux-64bit.deb @@ -30,14 +24,7 @@ jobs: - name: Run Trivy vulnerability scanner id: scan run: | - trivy image --format json docker.asperti.com/paspo/dnscache:latest > trivy-results.json - - - uses: actions/cache/save@v4 - if: always() # salva in cache anche se trova vulnerabilità - with: - path: | - /root/.cache/trivy - key: trivy-db + trivy --server ${{ secrets.TRIVY_SERVER }} --token ${{ secrets.TRIVY_TOKEN }} image --format json docker.asperti.com/paspo/dnscache:latest > trivy-results.json # if some vulnerability is found, we fail - name: check output