From 1ed8bcbc3193f4690ed8388a2ee03d28e23b97f7 Mon Sep 17 00:00:00 2001 From: paspo Date: Fri, 17 Jan 2025 00:04:19 +0100 Subject: [PATCH] fix trivy --- .gitea/workflows/vulnscan.yaml | 15 +-------------- 1 file changed, 1 insertion(+), 14 deletions(-) diff --git a/.gitea/workflows/vulnscan.yaml b/.gitea/workflows/vulnscan.yaml index 22e77ba..d179137 100644 --- a/.gitea/workflows/vulnscan.yaml +++ b/.gitea/workflows/vulnscan.yaml @@ -17,12 +17,6 @@ jobs: - name: Pull docker image run: docker pull docker.asperti.com/paspo/hugo:latest - - uses: actions/cache/restore@v4 - with: - path: | - /root/.cache/trivy - key: trivy-db - - name: Setup trivy run: | wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.57.1/trivy_0.57.1_Linux-64bit.deb @@ -31,14 +25,7 @@ jobs: - name: Run Trivy vulnerability scanner id: scan run: | - trivy image --format json docker.asperti.com/paspo/hugo:latest > trivy-results.json - - - uses: actions/cache/save@v4 - if: always() # salva in cache anche se trova vulnerabilità - with: - path: | - /root/.cache/trivy - key: trivy-db + trivy --server ${{ secrets.TRIVY_SERVER }} --token ${{ secrets.TRIVY_TOKEN }} image --format json docker.asperti.com/paspo/hugo:latest > trivy-results.json # if some vulnerability is found, we fail - name: check output