Summary
Jobs
scan (ghcr.io/geonet/base-images/alpine-gdal:3.18)
scan (ghcr.io/geonet/base-images/alpine-iputils:3.18)
scan (ghcr.io/geonet/base-images/alpine-xslt:3.18)
scan (ghcr.io/geonet/base-images/alpine:3.18)
scan (ghcr.io/geonet/base-images/binfmt:latest)
scan (ghcr.io/geonet/base-images/centos:centos7)
scan (ghcr.io/geonet/base-images/centos:stream8)
scan (ghcr.io/geonet/base-images/centos:stream9)
scan (ghcr.io/geonet/base-images/chart-centos7:latest)
scan (ghcr.io/geonet/base-images/curl:8.1.2)
scan (ghcr.io/geonet/base-images/datadog/agent:7)
scan (ghcr.io/geonet/base-images/debian:bookworm-slim)
scan (ghcr.io/geonet/base-images/fedora-coreos:stable)
scan (ghcr.io/geonet/base-images/fedora:38)
scan (ghcr.io/geonet/base-images/git-ssh:latest)
scan (ghcr.io/geonet/base-images/git:latest)
scan (ghcr.io/geonet/base-images/go:1.16)
scan (ghcr.io/geonet/base-images/go:1.20)
scan (ghcr.io/geonet/base-images/go:1.21)
scan (ghcr.io/geonet/base-images/hadolint/hadolint:v2.12.0-alpine)
scan (ghcr.io/geonet/base-images/hashicorp/terraform:1.5.0)
scan (ghcr.io/geonet/base-images/mkdocs_plus:2023-06-14)
scan (ghcr.io/geonet/base-images/mkdocs_plus:latest)
scan (ghcr.io/geonet/base-images/nginx:latest)
scan (ghcr.io/geonet/base-images/node:16.17.1-alpine)
scan (ghcr.io/geonet/base-images/node:20)
scan (ghcr.io/geonet/base-images/node:20.3-alpine3.18)
scan (ghcr.io/geonet/base-images/owasp/zap2docker-stable:2.11.1)
scan (ghcr.io/geonet/base-images/python:3.11.4-alpine3.18)
scan (ghcr.io/geonet/base-images/python:3.11.4-bullseye)
scan (ghcr.io/geonet/base-images/rpmbuild-centos-stream8:latest)
scan (ghcr.io/geonet/base-images/rpmbuild-centos-stream9:latest)
scan (ghcr.io/geonet/base-images/rpmbuild-centos7:latest)
scan (ghcr.io/geonet/base-images/shellcheck:v0.9.0)
scan (ghcr.io/geonet/base-images/siderolabs-conform:v0.1.0-alpha.27)
scan (ghcr.io/geonet/base-images/static:latest)
scan (ghcr.io/geonet/base-images/texlive:latest)
scan (ghcr.io/geonet/base-images/ubi8-minimal:8.8)
scan (ghcr.io/geonet/base-images/ubi8:8.8)
prepare
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# NOTE refs
# - https://github.com/aquasecurity/trivy-action#using-trivy-to-scan-your-private-registry
name: scan
on:
push:
branches:
- main
schedule:
- cron: "0 0 * * MON"
workflow_dispatch: {}
permissions:
contents: read
security-events: write
concurrency:
group: ${{ github.run_id }}
cancel-in-progress: false
jobs:
prepare:
runs-on: ubuntu-latest
outputs:
matrix: ${{ steps.set.outputs.matrix }}
steps:
- uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0
- id: set
run: |
echo "matrix=$(jq -r -c '.sync as $sync | .build as $build | {"include":[{"destination": $sync[].destination}, {"destination": $build[].destination}]}' <<< "$(yq e . -o json config.yaml)")" >> $GITHUB_OUTPUT
- name: check output
run: |
jq . <<< '${{ steps.set.outputs.matrix }}'
scan:
if: ${{ fromJSON(needs.prepare.outputs.matrix) != null }}
needs: prepare
strategy:
fail-fast: false
matrix: ${{ fromJSON(needs.prepare.outputs.matrix) }}
uses: GeoNet/Actions/.github/workflows/reusable-container-image-scan.yml@main
with:
imageRefs: ${{ fromJSON(toJSON(matrix)).destination }}
You can’t perform that action at this time.