Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: trivy and ort implementation #34

Merged
merged 1 commit into from
Jul 12, 2024
Merged

feat: trivy and ort implementation #34

merged 1 commit into from
Jul 12, 2024

Conversation

sehaartuc
Copy link

@sehaartuc sehaartuc commented Jul 11, 2024

Summary by Sourcery

This pull request adds a new GitHub Actions workflow to automate weekly vulnerability scans on the latest two semantically versioned Docker images using Trivy and ORT. The workflow is scheduled to run every Monday and includes steps for setting up Docker, logging into the GitHub Container Registry, fetching the latest image tags, and performing vulnerability scans.

  • New Features:
    • Introduced a new GitHub Actions workflow to perform weekly vulnerability scans on the latest two semantically versioned Docker images using Trivy and ORT.
  • CI:
    • Added a scheduled GitHub Actions workflow that runs every Monday at 14:00 UTC to fetch and scan Docker images for vulnerabilities.

@sehaartuc sehaartuc requested a review from brunopacheco1 July 11, 2024 10:08
@sehaartuc sehaartuc self-assigned this Jul 11, 2024
Copy link

sourcery-ai bot commented Jul 11, 2024

Reviewer's Guide by Sourcery

This pull request introduces a new GitHub Actions workflow to perform weekly vulnerability scans on the latest two semantically versioned Docker images using Trivy and OSS Review Toolkit (ORT). The workflow is scheduled to run every Monday at 14:00 UTC and can also be triggered manually. The implementation includes steps to set up Docker, authenticate with GitHub Container Registry, fetch the latest two image tags, scan the images with Trivy, and perform an ORT analysis.

File-Level Changes

Files Changes
.github/workflows/weekly_vuln_scan.yml Introduced a new GitHub Actions workflow to automate weekly vulnerability scans and ORT analysis for the latest two semantically versioned Docker images.

Tips
  • Trigger a new Sourcery review by commenting @sourcery-ai review on the pull request.
  • Continue your discussion with Sourcery by replying directly to review comments.
  • You can change your review settings at any time by accessing your dashboard:
    • Enable or disable the Sourcery-generated pull request summary or reviewer's guide;
    • Change the review language;
  • You can always contact us if you have any questions or feedback.

Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @sehaartuc - I've reviewed your changes and they look great!

Here's what I looked at during the review
  • 🟡 General issues: 3 issues found
  • 🟡 Security: 1 issue found
  • 🟢 Testing: all looks good
  • 🟢 Complexity: all looks good
  • 🟢 Documentation: all looks good

Sourcery is free for open source - if you like our reviews please consider sharing them ✨
Help me be more useful! Please click 👍 or 👎 on each comment to tell me if it was helpful.

.github/workflows/weekly_vuln_scan.yml Show resolved Hide resolved
.github/workflows/weekly_vuln_scan.yml Show resolved Hide resolved
.github/workflows/weekly_vuln_scan.yml Show resolved Hide resolved
.github/workflows/weekly_vuln_scan.yml Show resolved Hide resolved
@brunopacheco1 brunopacheco1 merged commit 20f883f into main Jul 12, 2024
3 checks passed
@brunopacheco1 brunopacheco1 deleted the vulnscan branch July 12, 2024 07:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants