From a90bc4bfc96676f8088dc6036fe7c65e3638daf9 Mon Sep 17 00:00:00 2001 From: paspo Date: Mon, 2 Dec 2024 16:23:52 +0100 Subject: [PATCH] cached trivy db --- .gitea/workflows/vulnscan.yaml | 23 +++++++++++++++++++---- 1 file changed, 19 insertions(+), 4 deletions(-) diff --git a/.gitea/workflows/vulnscan.yaml b/.gitea/workflows/vulnscan.yaml index 4bbbbcd..6f09103 100644 --- a/.gitea/workflows/vulnscan.yaml +++ b/.gitea/workflows/vulnscan.yaml @@ -16,13 +16,28 @@ jobs: - name: Pull docker image run: docker pull docker.asperti.com/paspo/dnscache:latest + - uses: actions/cache/restore@v4 + with: + path: | + /root/.cache/trivy + key: trivy-db + + - name: Setup trivy + run: | + wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.57.1/trivy_0.57.1_Linux-64bit.deb + dpkg -i /tmp/trivy.deb + - name: Run Trivy vulnerability scanner id: scan - uses: aquasecurity/trivy-action@master + run: | + trivy image --format json docker.asperti.com/paspo/dnscache:latest > trivy-results.json + + - uses: actions/cache/save@v4 + if: always() # salva in cache anche se trova vulnerabilità with: - image-ref: "docker.asperti.com/paspo/dnscache:latest" - format: "json" - output: "trivy-results.json" + path: | + /root/.cache/trivy + key: trivy-db # if some vulnerability is found, we fail - name: check output