mirror of
https://github.com/external-secrets/external-secrets.git
synced 2024-12-14 11:57:59 +00:00
6c7d829ede
Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.28.0 to 0.29.0.
- [Release notes](https://github.com/aquasecurity/trivy-action/releases)
- [Commits](915b19bbe7...18f2510ee3
)
---
updated-dependencies:
- dependency-name: aquasecurity/trivy-action
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
152 lines
4.4 KiB
YAML
152 lines
4.4 KiB
YAML
name: Reusable workflow to run trivy scan
|
|
|
|
on:
|
|
workflow_call:
|
|
inputs:
|
|
image-name:
|
|
required: true
|
|
type: string
|
|
image-tag:
|
|
required: false
|
|
type: string
|
|
tag-suffix:
|
|
required: true
|
|
type: string
|
|
dockerfile:
|
|
required: true
|
|
type: string
|
|
ref:
|
|
required: false
|
|
default: main
|
|
type: string
|
|
build-args:
|
|
required: true
|
|
type: string
|
|
build-arch:
|
|
required: true
|
|
type: string
|
|
build-platform:
|
|
required: true
|
|
type: string
|
|
secrets:
|
|
GHCR_USERNAME:
|
|
required: true
|
|
GHCR_TOKEN:
|
|
required: true
|
|
|
|
env:
|
|
IMAGE_NAME: ${{ inputs.image-name }}
|
|
TAG_SUFFIX: ${{ inputs.tag-suffix }}
|
|
ARCH: ${{ inputs.build-arch }}
|
|
DOCKERFILE: ${{ inputs.dockerfile }}
|
|
IS_FORK: ${{ secrets.GHCR_USERNAME == '' && 'true' || 'false' }}
|
|
|
|
jobs:
|
|
build-publish:
|
|
name: Build and Publish
|
|
runs-on: ubuntu-latest
|
|
outputs:
|
|
image-tag: ${{ steps.container_info.outputs.image-tag }}
|
|
steps:
|
|
|
|
- name: Checkout
|
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
with:
|
|
ref: ${{ inputs.ref }}
|
|
|
|
- name: Setup QEMU
|
|
uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf # v3.2.0
|
|
with:
|
|
platforms: all
|
|
|
|
- name: Setup Docker Buildx
|
|
uses: docker/setup-buildx-action@c47758b77c9736f4b2ef4073d4d51994fabfe349 # v3.7.1
|
|
with:
|
|
version: 'v0.4.2'
|
|
install: true
|
|
|
|
- name: Setup Go
|
|
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
|
id: setup-go
|
|
with:
|
|
go-version-file: "go.mod"
|
|
|
|
- name: Download Go modules
|
|
if: ${{ steps.setup-go.outputs.cache-hit != 'true' }}
|
|
run: go mod download
|
|
|
|
- name: Fetch History
|
|
shell: bash
|
|
run: git fetch --prune --unshallow
|
|
|
|
- name: Login to Docker
|
|
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
|
|
if: env.IS_FORK == 'false'
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ secrets.GHCR_USERNAME }}
|
|
password: ${{ secrets.GHCR_TOKEN }}
|
|
|
|
- name: Get docker image tag
|
|
id: container_info
|
|
shell: bash
|
|
env:
|
|
GITHUB_REF: ${{ github.ref }}
|
|
run: |
|
|
# rebuild-image
|
|
if [ "${{ inputs.image-tag }}" != "" ]; then
|
|
TAG="${{ inputs.image-tag }}${{ inputs.tag-suffix }}"
|
|
# main / release-x.y
|
|
elif [[ "$GITHUB_REF" == "refs/heads/main" || "$GITHUB_REF" =~ refs/heads/release-.* ]]; then
|
|
TAG=${GITHUB_REF#refs/heads/}${{ inputs.tag-suffix }}
|
|
# Pull Request
|
|
else
|
|
TAG=$(make docker.tag)
|
|
fi
|
|
echo "image-tag=${TAG}" >> $GITHUB_OUTPUT
|
|
|
|
- name: Build & Publish Artifacts
|
|
if: env.IS_FORK == 'false'
|
|
shell: bash
|
|
env:
|
|
IMAGE_TAG: ${{ steps.container_info.outputs.image-tag }}
|
|
BUILD_ARGS: ${{ inputs.build-args }}
|
|
DOCKER_BUILD_ARGS: >-
|
|
--push
|
|
--platform ${{ inputs.build-platform }}
|
|
run: make docker.build
|
|
|
|
- name: Build & Publish Artifacts fork
|
|
if: env.IS_FORK == 'true'
|
|
shell: bash
|
|
env:
|
|
IMAGE_TAG: ${{ steps.container_info.outputs.image-tag }}
|
|
BUILD_ARGS: ${{ inputs.build-args }}
|
|
DOCKER_BUILD_ARGS: --load
|
|
run: make docker.build
|
|
|
|
- name: Run Trivy vulnerability scanner
|
|
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # master
|
|
with:
|
|
image-ref: ${{ inputs.image-name }}:${{ steps.container_info.outputs.image-tag }}
|
|
format: 'table'
|
|
exit-code: '1'
|
|
ignore-unfixed: true
|
|
vuln-type: 'os,library'
|
|
severity: 'CRITICAL,HIGH'
|
|
|
|
sign:
|
|
runs-on: ubuntu-latest
|
|
needs: build-publish
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
- name: Sign image
|
|
if: env.IS_FORK == 'false'
|
|
uses: ./.github/actions/sign
|
|
with:
|
|
image-name: ${{ inputs.image-name }}
|
|
image-tag: ${{ needs.build-publish.outputs.image-tag }}
|
|
GHCR_USERNAME: ${{ secrets.GHCR_USERNAME }}
|
|
GHCR_TOKEN: ${{ secrets.GHCR_TOKEN }}
|
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|