Scan main images for vulnerabilities (scheduled) #56
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Scan Images for Vulnerabilities (Trivy) | |
run-name: Scan ${{ inputs.version == '' && github.ref_name || inputs.version }} images for vulnerabilities ${{ github.event_name == 'schedule' && '(scheduled)' || '' }} | |
on: | |
schedule: | |
- cron: "0 7 * * 1" # Run every Monday at 7:00 AM UTC | |
workflow_dispatch: | |
inputs: | |
version: | |
description: "Version of Eraser to run Trivy scans against. Leave empty to scan images built from the branch the action is running against." | |
type: string | |
required: false | |
default: "" | |
upload-results: | |
description: "Upload results to Github Security?" | |
type: boolean | |
required: true | |
default: false | |
permissions: read-all | |
env: | |
# Scanning released versions require the project `eraser-dev` as part of the registry name. | |
REGISTRY: ghcr.io/${{ github.event.inputs.version == '' && 'eraser-test' || 'eraser-dev' }} | |
TAG: ${{ github.event.inputs.version == '' && 'test' || github.event.inputs.version }} | |
jobs: | |
scan_vulnerabilities: | |
name: Scan ${{ matrix.data.image }} for vulnerabilities | |
runs-on: ubuntu-latest | |
timeout-minutes: 15 | |
strategy: | |
matrix: | |
data: | |
- {image: remover, build_cmd: docker-build-remover, repo_environment_var: REMOVER_REPO} | |
- {image: eraser-manager, build_cmd: docker-build-manager, repo_environment_var: MANAGER_REPO} | |
- {image: collector, build_cmd: docker-build-collector, repo_environment_var: COLLECTOR_REPO} | |
- {image: eraser-trivy-scanner, build_cmd: docker-build-trivy-scanner, repo_environment_var: TRIVY_SCANNER_REPO} | |
steps: | |
- name: Harden Runner | |
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde # v2.9.1 | |
with: | |
egress-policy: audit | |
- name: Check out code | |
if: github.event_name == 'schedule' || github.event.inputs.version == '' | |
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7 | |
- name: Build image | |
if: github.event_name == 'schedule' || github.event.inputs.version == '' | |
run: | | |
make ${{ matrix.data.build_cmd }} VERSION=${{ env.TAG }} ${{ matrix.data.repo_environment_var }}=${{ env.REGISTRY }}/${{ matrix.data.image }} | |
- name: Scan for vulnerabilities | |
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0 | |
with: | |
image-ref: ${{ env.REGISTRY }}/${{ matrix.data.image }}:${{ env.TAG }} | |
vuln-type: 'os,library' | |
ignore-unfixed: true | |
format: 'sarif' | |
output: ${{ matrix.data.image }}-results.sarif | |
- uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0 | |
with: | |
name: ${{ matrix.data.image }} Scan Results | |
path: ${{ matrix.data.image }}-results.sarif | |
overwrite: true | |
upload_vulnerabilities: | |
name: Upload ${{ matrix.image }} results to GitHub Security | |
runs-on: ubuntu-latest | |
needs: scan_vulnerabilities | |
if: github.event_name == 'schedule' || (github.event_name == 'workflow_dispatch' && github.event.inputs.upload-results == 'true') | |
permissions: | |
actions: read | |
contents: read | |
security-events: write | |
strategy: | |
matrix: | |
image: [remover, eraser-manager, collector, eraser-trivy-scanner] | |
steps: | |
- name: Harden Runner | |
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde # v2.9.1 | |
with: | |
egress-policy: audit | |
- uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8 | |
with: | |
name: ${{ matrix.image }} Scan Results | |
path: ${{ matrix.image }}-results.sarif | |
merge-multiple: true | |
- name: Upload results to GitHub Security | |
uses: github/codeql-action/upload-sarif@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v2.14.4 | |
with: | |
sarif_file: ${{ matrix.image }}-results.sarif |