@@ -159,7 +159,7 @@ jobs:
159
159
with :
160
160
sarif_file : ' snyk.sarif'
161
161
scan :
162
- name : " Trivy (sarif) "
162
+ name : " Trivy"
163
163
runs-on : ubuntu-latest
164
164
needs : build
165
165
permissions :
@@ -178,40 +178,24 @@ jobs:
178
178
docker load --input /tmp/${{ env.ARTIFACT_NAME }}_prod.tar
179
179
docker image ls -a
180
180
181
- - name : Run Trivy vulnerability scanner
181
+ - name : Run Trivy vulnerability scanner (cli report)
182
+ uses :
aquasecurity/[email protected]
183
+ with :
184
+ image-ref : ${{ env.IMAGE_NAME }}:${{ github.sha }}
185
+ format : ' table'
186
+ env :
187
+ TRIVY_DB_REPOSITORY : ${{ vars.TRIVY_DB_REPOSITORY }}
188
+
189
+ - name : Run Trivy vulnerability scanner (sarif report)
182
190
uses :
aquasecurity/[email protected]
183
191
with :
184
192
image-ref : ${{ env.IMAGE_NAME }}:${{ github.sha }}
185
193
format : ' sarif'
186
194
output : ' trivy-results.sarif'
195
+ env :
196
+ TRIVY_DB_REPOSITORY : ${{ vars.TRIVY_DB_REPOSITORY }}
187
197
188
198
- name : Upload Trivy scan results to GitHub Security tab
189
199
uses : github/codeql-action/upload-sarif@v3
190
200
with :
191
201
sarif_file : ' trivy-results.sarif'
192
- env :
193
- ACTIONS_RUNTIME_TOKEN : ${{ secrets.GITHUB_TOKEN }}
194
-
195
- report :
196
- name : " Trivy (report)"
197
- runs-on : ubuntu-latest
198
- needs : build
199
- steps :
200
- - name : Download artifact
201
- uses : actions/download-artifact@v4
202
- with :
203
- name : ${{ env.ARTIFACT_NAME }}_prod
204
- path : /tmp/
205
-
206
- - name : Load image
207
- run : |
208
- docker load --input /tmp/${{ env.ARTIFACT_NAME }}_prod.tar
209
- docker image ls -a
210
-
211
- - name : Run Trivy vulnerability scanner
212
- uses :
aquasecurity/[email protected]
213
- with :
214
- image-ref : ${{ env.IMAGE_NAME }}:${{ github.sha }}
215
- format : ' table'
216
- env :
217
- ACTIONS_RUNTIME_TOKEN : ${{ secrets.GITHUB_TOKEN }}
0 commit comments