Rebase to upstream v1.30.1 and prepare release v1.4.0 #132
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Trivy vulnerability scanner | |
on: | |
workflow_dispatch: | |
push: | |
branches: | |
- master | |
pull_request: | |
jobs: | |
build: | |
name: Build | |
runs-on: ubuntu-latest | |
steps: | |
- name: Set up Go 1.x | |
uses: actions/setup-go@v5 | |
with: | |
go-version: '1.22' | |
id: go | |
- name: Checkout code | |
uses: actions/checkout@v4 | |
- name: Install Dependencies | |
run: sudo apt-get update && sudo apt-get install -y libcryptsetup-dev | |
- name: Build an image from Dockerfile | |
run: | | |
export PUBLISH=true | |
export REGISTRY=test | |
export IMAGE_VERSION=latest | |
export DOCKER_CLI_EXPERIMENTAL=enabled | |
make container | |
- name: Run Trivy vulnerability scanner | |
uses: aquasecurity/trivy-action@master | |
with: | |
image-ref: 'test/constellation/azure-csi-driver:latest' | |
format: 'table' | |
exit-code: '1' | |
ignore-unfixed: true | |
vuln-type: 'os,library' | |
severity: 'CRITICAL,HIGH,MEDIUM,LOW,UNKNOWN' |