-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Track security scans & updates (#551)
* Update packages * Set container scans to continue-on-error * Update grype ignore list * Update CVE-2015-5237 to closed Signed-off-by: Victor Chang <[email protected]>
- Loading branch information
Showing
40 changed files
with
3,483 additions
and
3,550 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -90,6 +90,7 @@ jobs: | |
|
||
- name: Dockle Container Scanner | ||
uses: erzz/dockle-action@v1 | ||
continue-on-error: true | ||
if: ${{ contains(github.ref, 'refs/heads/main') || contains(github.head_ref, 'release/') }} | ||
with: | ||
image: ${{ fromJSON(steps.meta.outputs.json).tags[0] }} | ||
|
@@ -100,12 +101,14 @@ jobs: | |
# Disable upload due to bug https://github.com/erzz/dockle-action/issues/18 | ||
# - name: Upload Dockle SARIF Report | ||
# uses: github/codeql-action/upload-sarif@v2 | ||
# continue-on-error: true | ||
# if: ${{ contains(github.ref, 'refs/heads/main') || contains(github.head_ref, 'release/') }} | ||
# with: | ||
# sarif_file: dockle-report.sarif | ||
|
||
- name: Trivy Vulnerability Scanner | ||
uses: aquasecurity/trivy-action@master | ||
continue-on-error: true | ||
if: ${{ contains(github.ref, 'refs/heads/main') || contains(github.head_ref, 'release/') }} | ||
with: | ||
image-ref: ${{ fromJSON(steps.meta.outputs.json).tags[0] }} | ||
|
@@ -114,13 +117,15 @@ jobs: | |
|
||
- name: Upload Trivy SARIF Report | ||
uses: github/codeql-action/upload-sarif@v2 | ||
continue-on-error: true | ||
if: ${{ contains(github.ref, 'refs/heads/main') || contains(github.head_ref, 'release/') }} | ||
with: | ||
sarif_file: 'trivy-results.sarif' | ||
|
||
- name: Anchore Container Scan | ||
id: anchore-scan | ||
uses: anchore/[email protected] | ||
continue-on-error: true | ||
if: ${{ contains(github.ref, 'refs/heads/main') || contains(github.head_ref, 'release/') }} | ||
with: | ||
image: ${{ fromJSON(steps.meta.outputs.json).tags[0] }} | ||
|
@@ -130,6 +135,7 @@ jobs: | |
|
||
- name: Upload Anchore Scan SARIF Report | ||
uses: github/codeql-action/upload-sarif@v2 | ||
continue-on-error: true | ||
if: ${{ contains(github.ref, 'refs/heads/main') || contains(github.head_ref, 'release/') }} | ||
with: | ||
sarif_file: ${{ steps.anchore-scan.outputs.sarif }} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.