Merge pull request #4184 from zhzhuang-zju/trivy
ci: add schedule image-scanning
This commit is contained in:
commit
8308cb1976
|
@ -0,0 +1,69 @@
|
|||
name: image-scanning-on-schedule
|
||||
on:
|
||||
schedule:
|
||||
# Run this workflow "At 00:00 UTC on Sunday"
|
||||
- cron: '0 0 * * 0'
|
||||
permissions:
|
||||
contents: read
|
||||
jobs:
|
||||
use-trivy-to-scan-image:
|
||||
permissions:
|
||||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
|
||||
name: image-scanning
|
||||
if: ${{ github.repository == 'karmada-io/karmada' }}
|
||||
runs-on: ubuntu-22.04
|
||||
strategy:
|
||||
fail-fast: false
|
||||
matrix:
|
||||
target:
|
||||
- karmada-controller-manager
|
||||
- karmada-scheduler
|
||||
- karmada-descheduler
|
||||
- karmada-webhook
|
||||
- karmada-agent
|
||||
- karmada-scheduler-estimator
|
||||
- karmada-interpreter-webhook-example
|
||||
- karmada-aggregated-apiserver
|
||||
- karmada-search
|
||||
- karmada-operator
|
||||
- karmada-metrics-adapter
|
||||
karmada-version: [ release-1.11, release-1.10, release-1.9 ]
|
||||
steps:
|
||||
- name: checkout code
|
||||
uses: actions/checkout@v4
|
||||
with:
|
||||
ref: ${{ matrix.karmada-version }}
|
||||
- name: install Go
|
||||
uses: actions/setup-go@v5
|
||||
with:
|
||||
go-version-file: go.mod
|
||||
- id: gen_git_info
|
||||
run: |
|
||||
echo "ref=$(git rev-parse --symbolic-full-name HEAD)" >> "$GITHUB_OUTPUT"
|
||||
echo "sha=$(git rev-parse HEAD)" >> "$GITHUB_OUTPUT"
|
||||
- name: Build images from Dockerfile
|
||||
run: |
|
||||
export VERSION=${{ matrix.karmada-version }}
|
||||
export REGISTRY="docker.io/karmada"
|
||||
make image-${{ matrix.target }}
|
||||
- name: Run Trivy vulnerability scanner
|
||||
uses: aquasecurity/trivy-action@0.24.0
|
||||
with:
|
||||
image-ref: 'docker.io/karmada/${{ matrix.target }}:${{ matrix.karmada-version }}'
|
||||
format: 'sarif'
|
||||
ignore-unfixed: true
|
||||
vuln-type: 'os,library'
|
||||
output: '${{ matrix.target }}:${{ matrix.karmada-version }}.trivy-results.sarif'
|
||||
- name: display scan results
|
||||
uses: aquasecurity/trivy-action@0.24.0
|
||||
with:
|
||||
image-ref: 'docker.io/karmada/${{ matrix.target }}:${{ matrix.karmada-version }}'
|
||||
format: 'table'
|
||||
ignore-unfixed: true
|
||||
vuln-type: 'os,library'
|
||||
- name: Upload Trivy scan results to GitHub Security tab
|
||||
uses: github/codeql-action/upload-sarif@v3
|
||||
with:
|
||||
sarif_file: '${{ matrix.target }}:${{ matrix.karmada-version }}.trivy-results.sarif'
|
||||
ref: ${{steps.gen_git_info.outputs.ref}}
|
||||
sha: ${{steps.gen_git_info.outputs.sha}}
|
Loading…
Reference in New Issue