Update cve-scan.yaml
fix unreadable cve report
This commit is contained in:
parent
fc11b1070f
commit
6aba89e7a8
21
.github/workflows/cve-scan.yaml
vendored
21
.github/workflows/cve-scan.yaml
vendored
@ -36,13 +36,23 @@ jobs:
|
|||||||
shell: bash
|
shell: bash
|
||||||
run: |
|
run: |
|
||||||
make docker-build-notest
|
make docker-build-notest
|
||||||
- name: Anchore Scan
|
- name: Anchore Scanner
|
||||||
uses: anchore/scan-action@v3
|
uses: anchore/scan-action@v3
|
||||||
|
id: grype-scan
|
||||||
with:
|
with:
|
||||||
image: controller:latest
|
image: controller:latest
|
||||||
fail-build: true
|
fail-build: true
|
||||||
- name: Trivy Scan
|
severity-cutoff: high
|
||||||
|
debug: false
|
||||||
|
acs-report-enable: true
|
||||||
|
- name: Anchore upload scan SARIF report
|
||||||
|
if: always()
|
||||||
|
uses: github/codeql-action/upload-sarif@v1
|
||||||
|
with:
|
||||||
|
sarif_file: ${{ steps.grype-scan.outputs.sarif }}
|
||||||
|
- name: Trivy Scanner
|
||||||
uses: aquasecurity/trivy-action@master
|
uses: aquasecurity/trivy-action@master
|
||||||
|
if: ${{ always() }}
|
||||||
with:
|
with:
|
||||||
image-ref: controller:latest
|
image-ref: controller:latest
|
||||||
format: "table"
|
format: "table"
|
||||||
@ -50,3 +60,10 @@ jobs:
|
|||||||
ignore-unfixed: true
|
ignore-unfixed: true
|
||||||
vuln-type: "os,library"
|
vuln-type: "os,library"
|
||||||
severity: "CRITICAL,HIGH"
|
severity: "CRITICAL,HIGH"
|
||||||
|
- name: Dockle Linter
|
||||||
|
uses: erzz/dockle-action@v1.3.1
|
||||||
|
if: ${{ always() }}
|
||||||
|
with:
|
||||||
|
image: controller:latest
|
||||||
|
exit-code: 42
|
||||||
|
failure-threshold: fatal
|
||||||
|
Loading…
x
Reference in New Issue
Block a user