Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/edersonbrilhante/vilicus-github-action
GitHub Action to use Vilicus in your GitHub workflow
https://github.com/edersonbrilhante/vilicus-github-action
anchore cicd clair docker-image docker-scanner github-actions oci-image scan-images security security-scanner security-tools security-vulnerability trivy vilicus
Last synced: 6 days ago
JSON representation
GitHub Action to use Vilicus in your GitHub workflow
- Host: GitHub
- URL: https://github.com/edersonbrilhante/vilicus-github-action
- Owner: edersonbrilhante
- License: mit
- Created: 2021-02-18T15:50:55.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-04-13T13:00:07.000Z (over 3 years ago)
- Last Synced: 2024-10-31T10:43:51.956Z (15 days ago)
- Topics: anchore, cicd, clair, docker-image, docker-scanner, github-actions, oci-image, scan-images, security, security-scanner, security-tools, security-vulnerability, trivy, vilicus
- Homepage: https://vilicus.edersonbrilhante.com.br/
- Size: 16.6 KB
- Stars: 5
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
Awesome Lists containing this project
README
# Vilicus Scan
## Container scanning
Scan can be done using remote image and local image.
Using a remote repository such as docker.io the image will be `docker.io/your-organization/image:tag`:
```yaml
- name: Scan image
uses: edersonbrilhante/vilicus-github-action@main
with:
image: "docker.io/myorganization/myimage:tag"
```And to use a local image its need to tag as `localhost:5000/image:tag`:
```yaml
- name: Scan image
uses: edersonbrilhante/vilicus-github-action@main
with:
image: "localhost:5000/myimage:tag"
```## Action Inputs
| Input Name | Description | Default Value |
|-----------------|-------------|---------------|
| `image` | The image to scan | N/A |## Example Workflows
Complete example with steps for cleaning space, building local image, Vilicus scanning, and uploading results to GitHub Security
```yaml
name: Container Image CI
on: [push]
jobs:
build:
runs-on: ubuntu-latest
steps:
- name: Maximize build space
uses: easimon/maximize-build-space@v3
with:
remove-dotnet: 'true'
remove-android: 'true'
remove-haskell: 'true'- name: Checkout branch
uses: actions/checkout@v2- name: Build the Container image
run: docker build -t localhost:5000/local-image:${GITHUB_SHA} .
- name: Vilicus Scan
uses: edersonbrilhante/vilicus-github-action@main
with:
image: localhost:5000/local-image:${{ github.sha }}- name: Upload results to github security
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: artifacts/results.sarif
```