feat(container): update quay.io/minio/minio docker tag to release.2023-12-07t04-16-00z #2370
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: Scan Containers | |
on: | |
pull_request: | |
branches: | |
- main | |
paths: | |
- "cluster/**.yaml" | |
workflow_dispatch: | |
jobs: | |
detect-file-changes: | |
name: Detect File Changes | |
runs-on: ubuntu-latest | |
steps: | |
- uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4 | |
- uses: dorny/paths-filter@v2 | |
id: filter | |
with: | |
list-files: json | |
filters: | | |
yaml: | |
- added|modified: "**.yaml" | |
- added|modified: "**.yml" | |
outputs: | |
yaml_files: ${{ steps.filter.outputs.yaml_files }} | |
detect-containers: | |
name: Detect Containers | |
runs-on: ubuntu-latest | |
needs: detect-file-changes | |
strategy: | |
matrix: | |
file: ${{ fromJSON(needs.detect-file-changes.outputs.yaml_files) }} | |
steps: | |
- name: Checkout | |
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4 | |
- name: Install Jo | |
run: | | |
sudo apt-get install jo | |
- name: Detect Containers in Files | |
id: containers | |
run: | | |
containers=$(.github/scripts/container-parser.sh --file "${{ matrix.file }}") | |
echo "${containers}" | |
echo ::set-output name=containers::${containers} | |
outputs: | |
containers: ${{ steps.containers.outputs.containers }} | |
scan-containers: | |
name: Scan Containers | |
runs-on: ubuntu-latest | |
needs: detect-containers | |
strategy: | |
matrix: ${{ fromJSON(needs.detect-containers.outputs.containers) }} | |
fail-fast: false | |
steps: | |
- name: Checkout | |
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4 | |
- name: Scan Container | |
uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f # 0.12.0 | |
with: | |
image-ref: ${{ matrix.containers }} | |
vuln-type: os,library | |
severity: CRITICAL,HIGH | |
format: template | |
template: "@/contrib/sarif.tpl" | |
output: trivy-results.sarif | |
- name: Upload Trivy scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@v2 | |
with: | |
sarif_file: trivy-results.sarif |