multiarch trivy
This commit is contained in:
parent
a22cadeb8d
commit
f5d3ed6cbb
@ -1,59 +1,52 @@
|
|||||||
---
|
---
|
||||||
name: Vulnerability Scan
|
name: Vulnerability Scan
|
||||||
|
|
||||||
on:
|
on:
|
||||||
schedule:
|
schedule:
|
||||||
- cron: "0 14 * * *"
|
- cron: "0 14 * * *"
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
scan:
|
scan:
|
||||||
name: Daily Vulnerability Scan
|
name: Daily Vulnerability Scan
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
container:
|
container:
|
||||||
image: catthehacker/ubuntu:act-latest
|
image: catthehacker/ubuntu:act-latest
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
- name: Pull docker image
|
- name: Pull docker image
|
||||||
run: docker pull docker.asperti.com/paspo/smtp-relay:latest
|
run: docker pull docker.asperti.com/paspo/smtp-relay:latest
|
||||||
|
|
||||||
- uses: actions/cache/restore@v4
|
- name: Setup trivy
|
||||||
with:
|
run: |
|
||||||
path: |
|
echo "Installing Trivy for arch: $(uname -m)"
|
||||||
/root/.cache/trivy
|
case $(uname -m) in
|
||||||
key: trivy-db
|
x86_64)
|
||||||
|
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.58.2/trivy_0.58.2_Linux-64bit.deb ;;
|
||||||
- name: Setup trivy
|
aarch64)
|
||||||
run: |
|
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.58.2/trivy_0.58.2_Linux-ARM64.deb ;;
|
||||||
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.57.1/trivy_0.57.1_Linux-64bit.deb
|
*) exit 1 ;;
|
||||||
dpkg -i /tmp/trivy.deb
|
esac
|
||||||
|
dpkg -i /tmp/trivy.deb
|
||||||
- name: Run Trivy vulnerability scanner
|
|
||||||
id: scan
|
- name: Run Trivy vulnerability scanner
|
||||||
run: |
|
id: scan
|
||||||
trivy image --format json docker.asperti.com/paspo/smtp-relay:latest > trivy-results.json
|
run: |
|
||||||
|
trivy --server ${{ secrets.TRIVY_SERVER }} --token ${{ secrets.TRIVY_TOKEN }} image --format json docker.asperti.com/paspo/smtp-relay:latest > trivy-results.json
|
||||||
- uses: actions/cache/save@v4
|
|
||||||
if: always() # salva in cache anche se trova vulnerabilità
|
# if some vulnerability is found, we fail
|
||||||
with:
|
- name: check output
|
||||||
path: |
|
id: vulncount
|
||||||
/root/.cache/trivy
|
run: |
|
||||||
key: trivy-db
|
echo "VULNCOUNT=$(jq '.Results[0].Vulnerabilities|length' trivy-results.json)" >> ${GITHUB_OUTPUT}
|
||||||
|
if [ $(jq '.Results[0].Vulnerabilities|length' trivy-results.json) -ne "0" ] ; then exit 1 ; fi
|
||||||
# if some vulnerability is found, we fail
|
|
||||||
- name: check output
|
- name: send telegram notification
|
||||||
id: vulncount
|
if: failure()
|
||||||
run: |
|
uses: appleboy/telegram-action@master
|
||||||
echo "VULNCOUNT=$(jq '.Results[0].Vulnerabilities|length' trivy-results.json)" >> ${GITHUB_OUTPUT}
|
with:
|
||||||
if [ $(jq '.Results[0].Vulnerabilities|length' trivy-results.json) -ne "0" ] ; then exit 1 ; fi
|
to: ${{ secrets.TELEGRAM_TO }}
|
||||||
|
token: ${{ secrets.TELEGRAM_TOKEN }}
|
||||||
- name: send telegram notification
|
format: markdown
|
||||||
if: failure()
|
message: |
|
||||||
uses: appleboy/telegram-action@master
|
Found **${{ steps.vulncount.outputs.VULNCOUNT }}** vulnerabilities in `${{ github.repository }}`
|
||||||
with:
|
|
||||||
to: ${{ secrets.TELEGRAM_TO }}
|
|
||||||
token: ${{ secrets.TELEGRAM_TOKEN }}
|
|
||||||
format: markdown
|
|
||||||
message: |
|
|
||||||
Found **${{ steps.vulncount.outputs.VULNCOUNT }}** vulnerabilities in `${{ github.repository }}`
|
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user