Skip to content

Commit 5478987

Browse files
committed
add image scan with dockle-action, add dockleignore with all kinds of warnings [skip ci]
1 parent f13f997 commit 5478987

File tree

2 files changed

+36
-2
lines changed

2 files changed

+36
-2
lines changed

.dockleignore

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
#
2+
# Ignore rules for https://github.com/goodwithtech/dockle
3+
#
4+
# https://github.com/goodwithtech/dockle?tab=readme-ov-file#checkpoint-summary
5+
#
6+
7+
CIS-DI-0001 # Create a user for the container
8+
# Disabled because:
9+
# Currently user is root.
10+
# This is a devcontainer image for usage inside VSCode or a CI pipeline.
11+
12+
CIS-DI-0005 # Enable Content trust for Docker
13+
# Disabled because:
14+
# This is open-source. Not messing around with keys and trust for now.
15+
16+
CIS-DI-0006 # Add HEALTHCHECK instruction to the container image
17+
# Disabled because:
18+
# The Docker engine itself does not automatically restart unhealthy containers
19+
# based on HEALTHCHECK pings to the local Docker host.
20+
# This is also not a server container with a running service,
21+
# which needs to be kept alive.
22+
23+
CIS-DI-0008 # Confirm safety of setuid/setgid files
24+
# Disabled because:
25+
# This is a devcontainer image for usage inside VSCode or a CI pipeline.

.github/workflows/release.yml

+11-2
Original file line numberDiff line numberDiff line change
@@ -232,7 +232,7 @@ jobs:
232232
README-${{ matrix.config.debian_codename }}-base.md
233233
README-${{ matrix.config.debian_codename }}-with-vulkansdk.md
234234
235-
- name: 🛡️🔍 Scan Image for Vulnerabilities
235+
- name: 🛡️🔍 Scan Image for Vulnerabilities using Trivy
236236
uses: aquasecurity/trivy-action@master # https://github.com/aquasecurity/trivy-action
237237
with:
238238
image-ref: '${{ env.GHCR_IMAGE }}:latest'
@@ -251,7 +251,16 @@ jobs:
251251
# are not relevant for the image security. The scan is faster without them.
252252

253253
# upload fails: https://github.com/github/codeql-action/issues/2117
254-
- name: 🛡️🔼 Upload scan results to GitHub Security tab
254+
- name: 🛡️🔼 Upload Trivy scan results to GitHub Security tab
255255
uses: github/codeql-action/upload-sarif@v3 # https://github.com/github/codeql-action
256256
with:
257257
sarif_file: 'trivy-results.sarif'
258+
259+
- name: 🛡️🔍 Scan Image for Vulnerabilities using Dockle
260+
if: always()
261+
uses: goodwithtech/dockle-action@v0.4.15 # https://github.com/goodwithtech/dockle-action
262+
with:
263+
image: '${{ env.GHCR_IMAGE }}:latest'
264+
format: 'list'
265+
exit-code: '0'
266+
exit-level: 'warn'

0 commit comments

Comments
 (0)