@@ -406,3 +406,61 @@ jobs:
406
406
with :
407
407
name : release-images
408
408
path : ./release-images
409
+
410
+ trivy-scan-image :
411
+ runs-on : ubuntu-20.04
412
+ needs : docker-amd64
413
+
414
+ steps :
415
+ - name : Checkout code
416
+ uses : actions/checkout@v2
417
+
418
+ - name : Download release images
419
+ uses : actions/download-artifact@v2
420
+ with :
421
+ name : release-images
422
+ path : ./release-images
423
+
424
+ - name : Run Trivy vulnerability scanner in image mode
425
+ # Commit SHA for v0.0.14
426
+ uses : aquasecurity/trivy-action@b38389f8efef9798810fe0c5b5096ac198cffd54
427
+ with :
428
+ input : " ./release-images/code-server-amd64-*.tar"
429
+ scan-type : " image"
430
+ ignore-unfixed : true
431
+ format : " template"
432
+ template : " @/contrib/sarif.tpl"
433
+ output : " trivy-image-results.sarif"
434
+ severity : " HIGH,CRITICAL"
435
+
436
+ - name : Upload Trivy scan results to GitHub Security tab
437
+ uses : github/codeql-action/upload-sarif@v1
438
+ with :
439
+ sarif_file : " trivy-image-results.sarif"
440
+
441
+ # We have to use two trivy jobs
442
+ # because GitHub only allows
443
+ # codeql/upload-sarif action per job
444
+ trivy-scan-repo :
445
+ runs-on : ubuntu-20.04
446
+
447
+ steps :
448
+ - name : Checkout code
449
+ uses : actions/checkout@v2
450
+
451
+ - name : Run Trivy vulnerability scanner in repo mode
452
+ # Commit SHA for v0.0.14
453
+ uses : aquasecurity/trivy-action@b38389f8efef9798810fe0c5b5096ac198cffd54
454
+ with :
455
+ scan-type : " fs"
456
+ scan-ref : " ."
457
+ ignore-unfixed : true
458
+ format : " template"
459
+ template : " @/contrib/sarif.tpl"
460
+ output : " trivy-repo-results.sarif"
461
+ severity : " HIGH,CRITICAL"
462
+
463
+ - name : Upload Trivy scan results to GitHub Security tab
464
+ uses : github/codeql-action/upload-sarif@v1
465
+ with :
466
+ sarif_file : " trivy-repo-results.sarif"
0 commit comments