gilde-ci-cd/templates/static-analysis/repo-cve-scan-trivy.gitlab-ci.yml
2022-07-08 09:55:39 +02:00

21 lines
818 B
YAML

.repo-cve-scan-trivy:
image:
name: docker.io/aquasec/trivy:0.25.0
entrypoint: [ "" ]
stage: verify
needs: []
variables:
SCAN_PATH: "."
EXITCODE: 1
TRIVY_EXTRA_ARGS: "--no-progress --ignore-unfixed --severity HIGH,CRITICAL"
cache:
paths:
- .trivycache/
artifacts:
reports:
junit: junit-report.xml
script:
# Builds report and puts it in the default workdir $CI_PROJECT_DIR, so artifacts: can take it from there
- trivy --cache-dir .trivycache/ fs --timeout 15m $TRIVY_EXTRA_ARGS --exit-code 0 --security-checks vuln,config --format template --format template --template "/contrib/junit.tpl" -o junit-report.xml $SCAN_PATH
- trivy --cache-dir .trivycache/ fs --timeout 15m $TRIVY_EXTRA_ARGS --exit-code $EXITCODE --security-checks vuln,config $SCAN_PATH