Compare commits
1 commit
main
...
dependabot
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
ef05db2eba |
2 changed files with 6 additions and 6 deletions
6
.github/workflows/cd.yml
vendored
6
.github/workflows/cd.yml
vendored
|
|
@ -41,7 +41,7 @@ jobs:
|
||||||
docker build -t veza-stream-server:${{ github.sha }} -f veza-stream-server/Dockerfile.production veza-stream-server/
|
docker build -t veza-stream-server:${{ github.sha }} -f veza-stream-server/Dockerfile.production veza-stream-server/
|
||||||
|
|
||||||
- name: Trivy vulnerability scan
|
- name: Trivy vulnerability scan
|
||||||
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.28.0
|
||||||
with:
|
with:
|
||||||
image-ref: 'veza-backend-api:${{ github.sha }}'
|
image-ref: 'veza-backend-api:${{ github.sha }}'
|
||||||
format: 'table'
|
format: 'table'
|
||||||
|
|
@ -49,7 +49,7 @@ jobs:
|
||||||
severity: 'CRITICAL,HIGH'
|
severity: 'CRITICAL,HIGH'
|
||||||
|
|
||||||
- name: Trivy scan frontend
|
- name: Trivy scan frontend
|
||||||
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.28.0
|
||||||
with:
|
with:
|
||||||
image-ref: 'veza-frontend:${{ github.sha }}'
|
image-ref: 'veza-frontend:${{ github.sha }}'
|
||||||
format: 'table'
|
format: 'table'
|
||||||
|
|
@ -57,7 +57,7 @@ jobs:
|
||||||
severity: 'CRITICAL,HIGH'
|
severity: 'CRITICAL,HIGH'
|
||||||
|
|
||||||
- name: Trivy scan stream server
|
- name: Trivy scan stream server
|
||||||
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.28.0
|
||||||
with:
|
with:
|
||||||
image-ref: 'veza-stream-server:${{ github.sha }}'
|
image-ref: 'veza-stream-server:${{ github.sha }}'
|
||||||
format: 'table'
|
format: 'table'
|
||||||
|
|
|
||||||
6
.github/workflows/container-scan.yml
vendored
6
.github/workflows/container-scan.yml
vendored
|
|
@ -26,7 +26,7 @@ jobs:
|
||||||
run: docker build -t veza-backend:scan -f veza-backend-api/Dockerfile.production veza-backend-api/
|
run: docker build -t veza-backend:scan -f veza-backend-api/Dockerfile.production veza-backend-api/
|
||||||
|
|
||||||
- name: Run Trivy vulnerability scanner
|
- name: Run Trivy vulnerability scanner
|
||||||
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.28.0
|
||||||
with:
|
with:
|
||||||
image-ref: 'veza-backend:scan'
|
image-ref: 'veza-backend:scan'
|
||||||
format: 'table'
|
format: 'table'
|
||||||
|
|
@ -44,7 +44,7 @@ jobs:
|
||||||
run: docker build -t veza-stream:scan -f veza-stream-server/Dockerfile .
|
run: docker build -t veza-stream:scan -f veza-stream-server/Dockerfile .
|
||||||
|
|
||||||
- name: Run Trivy vulnerability scanner
|
- name: Run Trivy vulnerability scanner
|
||||||
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.28.0
|
||||||
with:
|
with:
|
||||||
image-ref: 'veza-stream:scan'
|
image-ref: 'veza-stream:scan'
|
||||||
format: 'table'
|
format: 'table'
|
||||||
|
|
@ -75,7 +75,7 @@ jobs:
|
||||||
|
|
||||||
- name: Run Trivy vulnerability scanner
|
- name: Run Trivy vulnerability scanner
|
||||||
if: steps.check.outputs.exists == 'true'
|
if: steps.check.outputs.exists == 'true'
|
||||||
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.28.0
|
||||||
with:
|
with:
|
||||||
image-ref: 'veza-frontend:scan'
|
image-ref: 'veza-frontend:scan'
|
||||||
format: 'table'
|
format: 'table'
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue