|
9 | 9 | - cron: "0 8 * * 6" |
10 | 10 |
|
11 | 11 | jobs: |
12 | | - ubuntu-php: |
| 12 | + ubuntu: |
13 | 13 | name: PHP images vulnerability scanner |
14 | 14 | runs-on: "ubuntu-18.04" |
15 | 15 | strategy: |
|
33 | 33 | uses: github/codeql-action/upload-sarif@v1 |
34 | 34 | with: |
35 | 35 | sarif_file: 'trivy-results.sarif' |
| 36 | + |
| 37 | + alpine: |
| 38 | + name: PHP images vulnerability scanner |
| 39 | + runs-on: "ubuntu-18.04" |
| 40 | + strategy: |
| 41 | + matrix: |
| 42 | + php: ["5.6", "7.0", "7.2", "7.3", "7.4", "8.0"] |
| 43 | + steps: |
| 44 | + - name: Checkout |
| 45 | + uses: actions/checkout@v2 |
| 46 | + |
| 47 | + - name: Run Trivy vulnerability scanner |
| 48 | + uses: aquasecurity/trivy-action@master |
| 49 | + with: |
| 50 | + image-ref: 'docker.io/itkdev/php${{ matrix.php }}-fpm:alpine' |
| 51 | + format: 'template' |
| 52 | + template: '@/contrib/sarif.tpl' |
| 53 | + output: 'trivy-results.sarif' |
| 54 | + severity: 'MEDIUM,CRITICAL,HIGH' |
| 55 | + ignore-unfixed: true |
| 56 | + |
| 57 | + - name: Upload Trivy scan results to GitHub Security tab |
| 58 | + uses: github/codeql-action/upload-sarif@v1 |
| 59 | + with: |
| 60 | + sarif_file: 'trivy-results.sarif' |
| 61 | + |
| 62 | + mariadb: |
| 63 | + name: MariaDB images vulnerability scanner |
| 64 | + runs-on: "ubuntu-18.04" |
| 65 | + steps: |
| 66 | + - name: Checkout |
| 67 | + uses: actions/checkout@v2 |
| 68 | + |
| 69 | + - name: Run Trivy vulnerability scanner |
| 70 | + uses: aquasecurity/trivy-action@master |
| 71 | + with: |
| 72 | + image-ref: 'docker.io/itkdev/mariadb:alpine' |
| 73 | + format: 'template' |
| 74 | + template: '@/contrib/sarif.tpl' |
| 75 | + output: 'trivy-results.sarif' |
| 76 | + severity: 'MEDIUM,CRITICAL,HIGH' |
| 77 | + ignore-unfixed: true |
| 78 | + |
| 79 | + - name: Upload Trivy scan results to GitHub Security tab |
| 80 | + uses: github/codeql-action/upload-sarif@v1 |
| 81 | + with: |
| 82 | + sarif_file: 'trivy-results.sarif' |
0 commit comments