Skip to content

Commit 0dc7db0

Browse files
committed
fix scan
1 parent a531404 commit 0dc7db0

2 files changed

Lines changed: 13 additions & 13 deletions

File tree

.github/workflows/build_multi_arch_image.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -74,9 +74,9 @@ jobs:
7474
7575
echo "Creating combined trivy ignore file"
7676
# create combined trivy ignore file for use in trivy scan, combining common and specific ignore files if they exist
77-
combined="src/${CONTAINER_NAME}/.trivyignore_combined.yaml"
77+
combined="src/${BASE_FOLDER}/${CONTAINER_NAME}/.trivyignore_combined.yaml"
7878
common="src/common/.trivyignore.yaml"
79-
specific="src/${CONTAINER_NAME}/.trivyignore.yaml"
79+
specific="src/${BASE_FOLDER}/${CONTAINER_NAME}/.trivyignore.yaml"
8080
echo "vulnerabilities:" > "$combined"
8181
if [ -f "$common" ]; then sed -n '2,$p' "$common" >> "$combined"; fi
8282
if [ -f "$specific" ]; then sed -n '2,$p' "$specific" >> "$combined"; fi
@@ -100,7 +100,7 @@ jobs:
100100
format: "json"
101101
output: "scan_results_docker.json"
102102
exit-code: "0"
103-
trivy-config: src/${{ inputs.container_name }}/trivy.yaml
103+
trivy-config: src/${{ inputs.base_folder }}/${{ inputs.container_name }}/trivy.yaml
104104
- uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f
105105
name: Upload scan results
106106
with:
@@ -117,7 +117,7 @@ jobs:
117117
format: "table"
118118
output: "scan_results_docker.txt"
119119
exit-code: "1"
120-
trivy-config: src/${{ inputs.container_name }}/trivy.yaml
120+
trivy-config: src/${{ inputs.base_folder }}/${{ inputs.container_name }}/trivy.yaml
121121

122122
- name: Show docker vulnerability output
123123
if: always()

Makefile

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -27,39 +27,39 @@ build-image: guard-CONTAINER_NAME guard-BASE_VERSION guard-BASE_FOLDER
2727
--push false \
2828
--image-name "${CONTAINER_PREFIX}$${CONTAINER_NAME}${IMAGE_TAG}"
2929

30-
scan-image: guard-CONTAINER_NAME
31-
@combined="src/$${CONTAINER_NAME}/.trivyignore_combined.yaml"; \
30+
scan-image: guard-CONTAINER_NAME guard-BASE_FOLDER
31+
@combined="src/$${BASE_FOLDER}/$${CONTAINER_NAME}/.trivyignore_combined.yaml"; \
3232
common="src/common/.trivyignore.yaml"; \
33-
specific="src/$${CONTAINER_NAME}/.trivyignore.yaml"; \
33+
specific="src/$${BASE_FOLDER}/$${CONTAINER_NAME}/.trivyignore.yaml"; \
3434
echo "vulnerabilities:" > "$$combined"; \
3535
if [ -f "$$common" ]; then sed -n '2,$$p' "$$common" >> "$$combined"; fi; \
3636
if [ -f "$$specific" ]; then sed -n '2,$$p' "$$specific" >> "$$combined"; fi
3737
trivy image \
3838
--severity HIGH,CRITICAL \
39-
--config src/${CONTAINER_NAME}/trivy.yaml \
39+
--config src/${BASE_FOLDER}/${CONTAINER_NAME}/trivy.yaml \
4040
--scanners vuln \
4141
--exit-code 1 \
4242
--format table "${CONTAINER_PREFIX}$${CONTAINER_NAME}"
4343

44-
scan-image-json: guard-CONTAINER_NAME
45-
@combined="src/$${CONTAINER_NAME}/.trivyignore_combined.yaml"; \
44+
scan-image-json: guard-CONTAINER_NAME guard-BASE_FOLDER
45+
@combined="src/$${BASE_FOLDER}/$${CONTAINER_NAME}/.trivyignore_combined.yaml"; \
4646
common="src/common/.trivyignore.yaml"; \
47-
specific="src/$${CONTAINER_NAME}/.trivyignore.yaml"; \
47+
specific="src/$${BASE_FOLDER}/$${CONTAINER_NAME}/.trivyignore.yaml"; \
4848
echo "vulnerabilities:" > "$$combined"; \
4949
if [ -f "$$common" ]; then sed -n '2,$$p' "$$common" >> "$$combined"; fi; \
5050
if [ -f "$$specific" ]; then sed -n '2,$$p' "$$specific" >> "$$combined"; fi
5151
mkdir -p .out
5252
trivy image \
5353
--severity HIGH,CRITICAL \
54-
--config src/${CONTAINER_NAME}/trivy.yaml \
54+
--config src/${BASE_FOLDER}/${CONTAINER_NAME}/trivy.yaml \
5555
--scanners vuln \
5656
--exit-code 1 \
5757
--format json \
5858
--output .out/scan.out.json "${CONTAINER_PREFIX}$${CONTAINER_NAME}"
5959

6060
shell-image: guard-CONTAINER_NAME
6161
docker run -it \
62-
"${CONTAINER_PREFIX}$${CONTAINER_NAME}" \
62+
"${CONTAINER_PREFIX}$${CONTAINER_NAME}${IMAGE_TAG}" \
6363
bash
6464

6565
lint: lint-githubactions

0 commit comments

Comments
 (0)