From 93e6e2b62233948690ffb5fb213b4d5769852cd3 Mon Sep 17 00:00:00 2001 From: r1skz3ro Date: Mon, 24 Jun 2024 15:17:58 +0200 Subject: [PATCH] chore: change owner name --- .github/workflows/trivy-frontend.yml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/.github/workflows/trivy-frontend.yml b/.github/workflows/trivy-frontend.yml index 28636999..2fec8ca1 100644 --- a/.github/workflows/trivy-frontend.yml +++ b/.github/workflows/trivy-frontend.yml @@ -19,7 +19,7 @@ env: jobs: build_docker_image: name: Build docker image - timeout-minutes: 30 + timeout-minutes: 15 runs-on: ubuntu-latest defaults: run: @@ -31,16 +31,18 @@ jobs: - name: Build docker image run: docker build . --file Dockerfile --tag $IMAGE_NAME - - name: Log in to registry + - name: Log in to gHRC run: echo "${{ secrets.GITHUB_TOKEN }}" | docker login ghcr.io -u ${{ github.actor }} --password-stdin - name: Push image - run: docker push ghcr.io/${{ github.repository_owner }}/cpf/$IMAGE_NAME:$VERSION + run: | + docker tag $IMAGE_NAME ghcr.io/tivix/cpf/$IMAGE_NAME:$VERSION + docker push ghcr.io/tivix/cpf/$IMAGE_NAME:$VERSION - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@0.23.0 with: - image-ref: "ghcr.io/${{ github.repository_owner }}/cpf/$IMAGE_NAME:$VERSION" + image-ref: "ghcr.io/tivix/cpf/${{ env.IMAGE_NAME }}:${{ env.VERSION }}" scanners: "vuln,secret,config" format: "sarif" output: "trivy-fe-results.sarif"