This image contains the following:
- docker
- docker-compose
- trivy
Version | Docker | Compose | Trivy |
---|---|---|---|
23-41-0(latest) | 23 | 1.29.2 | 0.41.0 |
20-24-0 | 20 | 1.29.2 | 0.24.0 |
20-19-1 | 20 | 1.29.2 | 0.19.1 |
20-18-3 | 20 | 1.29.2 | 0.18.3 |
You can use this image to build & security test your images.
GitLab example:
security:
stage: security
image: csib/docker-trivy-compose:latest
variables:
IMAGE: registry.gitlab.com/csibvpn/csibjoomla:$CI_COMMIT_SHA
allow_failure: true
script:
# Build image
- docker build -t $IMAGE .
# Build report
- trivy --cache-dir .trivycache/ image --exit-code 0 --no-progress --format template --template "@/contrib/gitlab.tpl" -o gl-container-scanning-report.json $IMAGE
# Print report
- trivy --cache-dir .trivycache/ image --exit-code 0 --no-progress --severity HIGH $IMAGE
# Fail on severe vulnerabilities
- trivy --cache-dir .trivycache/ image --exit-code 1 --severity CRITICAL --no-progress $IMAGE
cache:
paths:
- .trivycache/
# Enables https://docs.gitlab.com/ee/user/application_security/container_scanning/ (Container Scanning report is available on GitLab EE Ultimate or GitLab.com Gold)
artifacts:
reports:
container_scanning: gl-container-scanning-report.json