fix trivy
All checks were successful
continuous-integration/drone/push Build is passing
Vulnerability Scan / Daily Vulnerability Scan (push) Successful in 8s

This commit is contained in:
Paolo Asperti 2025-01-17 07:59:30 +01:00
parent d2824d0831
commit e6c28c3b15
Signed by: paspo
GPG Key ID: 06D46905D19D5182

View File

@ -17,28 +17,22 @@ jobs:
- name: Pull docker image
run: docker pull docker.asperti.com/paspo/glpi:latest
- uses: actions/cache/restore@v4
with:
path: |
/root/.cache/trivy
key: trivy-db
- name: Setup trivy
run: |
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.57.1/trivy_0.57.1_Linux-64bit.deb
echo "Installing Trivy for arch: $(uname -m)"
case $(uname -m) in
x86_64)
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.58.2/trivy_0.58.2_Linux-64bit.deb ;;
aarch64)
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.58.2/trivy_0.58.2_Linux-ARM64.deb ;;
*) exit 1 ;;
esac
dpkg -i /tmp/trivy.deb
- name: Run Trivy vulnerability scanner
id: scan
run: |
trivy image --format json docker.asperti.com/paspo/glpi:latest > trivy-results.json
- uses: actions/cache/save@v4
if: always() # salva in cache anche se trova vulnerabilità
with:
path: |
/root/.cache/trivy
key: trivy-db
trivy --server ${{ secrets.TRIVY_SERVER }} --token ${{ secrets.TRIVY_TOKEN }} image --format json docker.asperti.com/paspo/glpi:latest > trivy-results.json
# if some vulnerability is found, we fail
- name: check output