Update cve-scan.yaml
fix unreadable cve report
This commit is contained in:
parent
fc11b1070f
commit
6aba89e7a8
21
.github/workflows/cve-scan.yaml
vendored
21
.github/workflows/cve-scan.yaml
vendored
@ -36,13 +36,23 @@ jobs:
|
||||
shell: bash
|
||||
run: |
|
||||
make docker-build-notest
|
||||
- name: Anchore Scan
|
||||
- name: Anchore Scanner
|
||||
uses: anchore/scan-action@v3
|
||||
id: grype-scan
|
||||
with:
|
||||
image: controller:latest
|
||||
fail-build: true
|
||||
- name: Trivy Scan
|
||||
severity-cutoff: high
|
||||
debug: false
|
||||
acs-report-enable: true
|
||||
- name: Anchore upload scan SARIF report
|
||||
if: always()
|
||||
uses: github/codeql-action/upload-sarif@v1
|
||||
with:
|
||||
sarif_file: ${{ steps.grype-scan.outputs.sarif }}
|
||||
- name: Trivy Scanner
|
||||
uses: aquasecurity/trivy-action@master
|
||||
if: ${{ always() }}
|
||||
with:
|
||||
image-ref: controller:latest
|
||||
format: "table"
|
||||
@ -50,3 +60,10 @@ jobs:
|
||||
ignore-unfixed: true
|
||||
vuln-type: "os,library"
|
||||
severity: "CRITICAL,HIGH"
|
||||
- name: Dockle Linter
|
||||
uses: erzz/dockle-action@v1.3.1
|
||||
if: ${{ always() }}
|
||||
with:
|
||||
image: controller:latest
|
||||
exit-code: 42
|
||||
failure-threshold: fatal
|
||||
|
Loading…
x
Reference in New Issue
Block a user