docker-glpi/.gitea/workflows/vulnscan.yaml

30 lines
764 B
YAML
Raw Normal View History

2023-10-30 10:34:34 +00:00
name: Vulnerability Scan
on:
schedule:
2023-10-30 11:00:11 +00:00
- cron: "0 14 * * *"
2023-12-13 10:44:13 +00:00
workflow_dispatch:
2023-10-30 10:34:34 +00:00
jobs:
scan:
name: Daily Vulnerability Scan
runs-on: ubuntu-latest
2023-12-13 10:44:13 +00:00
container:
image: catthehacker/ubuntu:act-latest
2023-10-30 10:34:34 +00:00
steps:
- name: Pull docker image
run: docker pull docker.asperti.com/paspo/glpi:latest
- name: Run Trivy vulnerability scanner
id: scan
uses: aquasecurity/trivy-action@master
with:
2023-10-30 11:00:11 +00:00
image-ref: "docker.asperti.com/paspo/glpi:latest"
format: "json"
output: "trivy-results.json"
2023-10-30 10:34:34 +00:00
2023-10-30 11:00:11 +00:00
# if some vulnerability is found, we fail
2023-10-30 10:34:34 +00:00
- name: check output
2023-10-30 10:57:51 +00:00
run: if [ $(jq '.Results[0].Vulnerabilities|length' trivy-results.json) -ne "0" ] ; then exit 1 ; fi