85
85
- name : Download image
86
86
run : |
87
87
. venv/bin/activate
88
- sudo openstack image save --file /mnt/${{ steps.manifest.outputs.image-name }}.qcow2 ${{ steps.manifest.outputs.image-name }}
88
+ sudo mkdir /mnt/images
89
+ sudo chmod 777 /mnt/images
90
+ openstack image save --file /mnt/images/${{ steps.manifest.outputs.image-name }}.qcow2 ${{ steps.manifest.outputs.image-name }}
89
91
90
92
- name : Set up QEMU
91
93
uses : docker/setup-qemu-action@v3
@@ -96,32 +98,32 @@ jobs:
96
98
sudo apt -y install libguestfs-tools
97
99
98
100
- name : mkdir for mount
99
- run : sudo mkdir -p '/mnt /${{ steps.manifest.outputs.image-name }}'
101
+ run : sudo mkdir -p '. /${{ steps.manifest.outputs.image-name }}'
100
102
101
103
- name : mount qcow2 file
102
- run : sudo guestmount -a ${{ steps.manifest.outputs.image-name }}.qcow2 -i --ro -o allow_other '/mnt /${{ steps.manifest.outputs.image-name }}'
104
+ run : sudo guestmount -a /mnt/images/ ${{ steps.manifest.outputs.image-name }}.qcow2 -i --ro -o allow_other '. /${{ steps.manifest.outputs.image-name }}'
103
105
104
106
- name : Run Trivy vulnerability scanner
105
107
uses :
aquasecurity/[email protected]
106
108
with :
107
109
scan-type : fs
108
- scan-ref : " /mnt/ ${{ steps.manifest.outputs.image-name }}"
110
+ scan-ref : " ${{ steps.manifest.outputs.image-name }}"
109
111
scanners : " vuln"
110
112
format : sarif
111
- output : " /mnt/ ${{ steps.manifest.outputs.image-name }}.sarif"
113
+ output : " ${{ steps.manifest.outputs.image-name }}.sarif"
112
114
# turn off secret scanning to speed things up
113
115
114
116
- name : Upload Trivy scan results to GitHub Security tab
115
117
uses : github/codeql-action/upload-sarif@v3
116
118
with :
117
- sarif_file : " /mnt/ ${{ steps.manifest.outputs.image-name }}.sarif"
119
+ sarif_file : " ${{ steps.manifest.outputs.image-name }}.sarif"
118
120
category : " ${{ matrix.os_version }}-${{ matrix.build }}"
119
121
120
122
- name : Fail if scan has CRITICAL vulnerabilities
121
123
uses :
aquasecurity/[email protected]
122
124
with :
123
125
scan-type : fs
124
- scan-ref : " /mnt/ ${{ steps.manifest.outputs.image-name }}"
126
+ scan-ref : " ${{ steps.manifest.outputs.image-name }}"
125
127
scanners : " vuln"
126
128
format : table
127
129
exit-code : ' 1'
0 commit comments