@@ -142,7 +142,7 @@ jobs:
142
142
cd ${{ env.RESC_BACKEND_DIR }}
143
143
docker build -t ${{ env.CONTAINER_REGISTRY }}/${{ env.IMAGE_NAME }}:${{needs.python-build-and-publish.outputs.backend_version}} .
144
144
145
- - name : Run Trivy vulnerability scanner
145
+ - name : Run Trivy vulnerability scanner - RESC-Backend
146
146
uses : aquasecurity/trivy-action@master
147
147
with :
148
148
image-ref : ${{ env.CONTAINER_REGISTRY }}/${{ env.IMAGE_NAME }}:${{needs.python-build-and-publish.outputs.backend_version}}
@@ -197,3 +197,33 @@ jobs:
197
197
context : ${{ env.RESC_BACKEND_DIR }}/
198
198
push : ${{ env.PUBLISH_IMAGE }}
199
199
tags : ${{ env.CONTAINER_REGISTRY }}/${{ env.IMAGE_NAME }}:latest, ${{ env.CONTAINER_REGISTRY }}/${{ env.IMAGE_NAME }}:${{needs.python-build-and-publish.outputs.backend_version}}
200
+
201
+ - name : Run Trivy vulnerability scanner - Redis
202
+ uses : aquasecurity/trivy-action@master
203
+ with :
204
+ image-ref : redis:7.0.11-alpine
205
+ format : ' table'
206
+ exit-code : ' 0'
207
+ ignore-unfixed : true
208
+ vuln-type : ' os,library'
209
+ severity : ' CRITICAL,HIGH'
210
+
211
+ - name : Run Trivy vulnerability scanner - RabbitMQ
212
+ uses : aquasecurity/trivy-action@master
213
+ with :
214
+ image-ref : rabbitmq:3.11.9-management-alpine
215
+ format : ' table'
216
+ exit-code : ' 0'
217
+ ignore-unfixed : true
218
+ vuln-type : ' os,library'
219
+ severity : ' CRITICAL,HIGH'
220
+
221
+ - name : Run Trivy vulnerability scanner - Database
222
+ uses : aquasecurity/trivy-action@master
223
+ with :
224
+ image-ref : mcr.microsoft.com/azure-sql-edge:1.0.7
225
+ format : ' table'
226
+ exit-code : ' 0'
227
+ ignore-unfixed : true
228
+ vuln-type : ' os,library'
229
+ severity : ' CRITICAL,HIGH'
0 commit comments