Trivy #893
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
################################################################################# | |
# Tractus-X - Digital Product Pass Application | |
# | |
# Copyright (c) 2022, 2024 BMW AG | |
# Copyright (c) 2022, 2024 Henkel AG & Co. KGaA | |
# Copyright (c) 2023, 2024 CGI Deutschland B.V. & Co. KG | |
# Copyright (c) 2023, 2024 Contributors to the Eclipse Foundation | |
# | |
# See the NOTICE file(s) distributed with this work for additional | |
# information regarding copyright ownership. | |
# | |
# This program and the accompanying materials are made available under the | |
# terms of the Apache License, Version 2.0 which is available at | |
# https://www.apache.org/licenses/LICENSE-2.0. | |
# | |
# Unless required by applicable law or agreed to in writing, software | |
# distributed under the License is distributed on an "AS IS" BASIS | |
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, | |
# either express or implied. See the | |
# License for the specific language govern in permissions and limitations | |
# under the License. | |
# | |
# SPDX-License-Identifier: Apache-2.0 | |
################################################################################# | |
# This workflow uses actions that are not certified by GitHub. | |
# They are provided by a third-party and are governed by | |
# separate terms of service, privacy policy, and support | |
# documentation. | |
name: "Trivy" | |
on: | |
push: | |
branches: [ "main" ] | |
schedule: | |
- cron: "0 0 * * *" | |
workflow_dispatch: | |
inputs: | |
branch: | |
description: "Branch to use" | |
required: true | |
default: "main" | |
type: string | |
env: | |
IMAGE_NAMESPACE: 'tractusx' | |
FRONTEND_IMAGE_NAME: "digital-product-pass-frontend" | |
BACKEND_IMAGE_NAME: "digital-product-pass-backend" | |
jobs: | |
analyze-config: | |
runs-on: "ubuntu-latest" | |
permissions: | |
actions: read | |
contents: read # for actions/checkout to fetch code | |
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
- name: Run Trivy vulnerability scanner in repo mode | |
uses: aquasecurity/trivy-action@master | |
with: | |
scan-type: "config" | |
ignore-unfixed: true | |
hide-progress: false | |
format: "sarif" | |
output: "trivy-results1.sarif" | |
severity: "CRITICAL,HIGH" | |
args: "--ignorefile .trivyignore" | |
skip-dirs: "deployment/infrastructure/data-consumer/edc-consumer,deployment/infrastructure/data-provider/edc-provider,deployment/infrastructure/data-provider/edc-provider/data-service,deployment/infrastructure/data-provider/registry" # skip scanning external images. | |
- name: Upload Trivy scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@9b7c22c3b39078582fa6d0d8f3841e944ec54582 | |
if: always() | |
with: | |
sarif_file: "trivy-results1.sarif" | |
analyze-digital-product-pass-frontend: | |
runs-on: ubuntu-latest | |
permissions: | |
actions: read | |
contents: read | |
security-events: write | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
# Build action for docker hub registry | |
- name: Build frontend image from Dockerfile - Docker Hub | |
id: build-docker-frontend-dockerhub | |
run: | | |
cd dpp-frontend | |
docker build -t ${{ env.IMAGE_NAMESPACE }}/${{ env.FRONTEND_IMAGE_NAME }}:latest . | |
# Build action for docker hub registry | |
- name: Run Trivy vulnerability scanner - Docker Hub | |
id: run-trivy-vulnerability-scanner-frontend-dockerhub | |
uses: aquasecurity/trivy-action@master | |
with: | |
image-ref: "${{ env.IMAGE_NAMESPACE }}/${{ env.FRONTEND_IMAGE_NAME }}" | |
ignore-unfixed: true | |
format: "sarif" | |
output: "trivy-results-dpp-frontend.sarif" | |
hide-progress: false | |
severity: "CRITICAL,HIGH" | |
args: "--ignorefile .trivyignore" | |
- name: Upload Trivy scan results to GitHub Security tab | |
if: always() | |
uses: github/codeql-action/upload-sarif@9b7c22c3b39078582fa6d0d8f3841e944ec54582 | |
with: | |
sarif_file: "trivy-results-dpp-frontend.sarif" | |
analyze-digital-product-pass-backend: | |
runs-on: ubuntu-latest | |
permissions: | |
actions: read | |
contents: read | |
security-events: write | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
- name: Setup Java 21 | |
uses: ./.github/actions/setup-java | |
# Build Java code with Maven | |
- name: Build JAR | |
run: | | |
cd dpp-backend/digitalproductpass | |
mvn -B clean install | |
# Build action for docker hub registry | |
- name: Build backend image from Dockerfile - Docker Hub | |
id: build-docker-backend-dockerhub | |
run: | | |
cd dpp-backend/digitalproductpass | |
docker build -t ${{ env.IMAGE_NAMESPACE }}/${{ env.BACKEND_IMAGE_NAME }}:latest . | |
# Build action for docker hub registry | |
- name: Run Trivy vulnerability scanner - Docker Hub | |
id: run-trivy-vulnerability-scanner-backend-dockerhub | |
uses: aquasecurity/trivy-action@master | |
with: | |
image-ref: "${{ env.IMAGE_NAMESPACE }}/${{ env.BACKEND_IMAGE_NAME }}" | |
format: "sarif" | |
ignore-unfixed: true | |
output: "trivy-results-dpp-backend.sarif" | |
hide-progress: false | |
severity: "CRITICAL,HIGH" | |
args: "--ignorefile .trivyignore" | |
- name: Upload Trivy scan results to GitHub Security tab | |
if: always() | |
uses: github/codeql-action/upload-sarif@9b7c22c3b39078582fa6d0d8f3841e944ec54582 | |
with: | |
sarif_file: "trivy-results-dpp-backend.sarif" | |