Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update docker images and command args for ci-cd intgreations #2382

Merged
merged 1 commit into from
Dec 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 12 additions & 6 deletions ci-cd-integrations/circleci/.circleci/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -42,8 +42,8 @@ jobs:
- run:
name: Run Deepfence Vulnerability Mapper
command: |
docker pull deepfenceio/deepfence_package_scanner_ce:v2
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_package_scanner_ce:v2 -source "$FULL_IMAGE_NAME" -console-url=$DEEPFENCE_CONSOLE_URL -deepfence-key=$DEEPFENCE_KEY -fail-on-count=$FAIL_CVE_COUNT -fail-on-critical-count=$FAIL_CRITICAL_CVE_COUNT -fail-on-high-count=$FAIL_HIGH_CVE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_CVE_COUNT -fail-on-low-count=$FAIL_LOW_CVE_COUNT -fail-on-score=$FAIL_CVE_SCORE -scan-type="base,java,python,ruby,php,nodejs,js,dotnet"
docker pull quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1 -source "$FULL_IMAGE_NAME" -console-url=$DEEPFENCE_CONSOLE_URL -deepfence-key=$DEEPFENCE_KEY -fail-on-count=$FAIL_CVE_COUNT -fail-on-critical-count=$FAIL_CRITICAL_CVE_COUNT -fail-on-high-count=$FAIL_HIGH_CVE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_CVE_COUNT -fail-on-low-count=$FAIL_LOW_CVE_COUNT -fail-on-score=$FAIL_CVE_SCORE -scan-type="base,java,python,ruby,php,nodejs,js,dotnet"
environment:
DEEPFENCE_KEY: ""
DEEPFENCE_CONSOLE_URL: ""
Expand All @@ -54,6 +54,8 @@ jobs:
FAIL_LOW_CVE_COUNT: 100
FAIL_CVE_SCORE: 10
FULL_IMAGE_NAME: "go-server:1.0"
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""

secret:
docker:
Expand All @@ -69,8 +71,8 @@ jobs:
- run:
name: Run Deepfence Secret Scanner
command: |
docker pull deepfenceio/deepfence_secret_scanner_ce:v2
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_secret_scanner_ce:v2 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_SECRET_COUNT -fail-on-high-count=$FAIL_HIGH_SECRET_COUNT -fail-on-medium-count=$FAIL_MEDIUM_SECRET_COUNT -fail-on-low-count=$FAIL_LOW_SECRET_COUNT
docker pull quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_SECRET_COUNT -fail-on-high-count=$FAIL_HIGH_SECRET_COUNT -fail-on-medium-count=$FAIL_MEDIUM_SECRET_COUNT -fail-on-low-count=$FAIL_LOW_SECRET_COUNT
environment:
DEEPFENCE_KEY: ""
DEEPFENCE_CONSOLE_URL: ""
Expand All @@ -79,6 +81,8 @@ jobs:
FAIL_MEDIUM_SECRET_COUNT: 100
FAIL_LOW_SECRET_COUNT: 100
FULL_IMAGE_NAME: "go-server:1.0"
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""

malware:
docker:
Expand All @@ -94,8 +98,8 @@ jobs:
- run:
name: Run Deepfence Malware Scanner
command: |
docker pull deepfenceio/deepfence_malware_scanner_ce:v2
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_malware_scanner_ce:v2 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_MALWARE_COUNT -fail-on-high-count=$FAIL_HIGH_MALWARE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_MALWARE_COUNT -fail-on-low-count=$FAIL_LOW_MALWARE_COUNT
docker pull quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_MALWARE_COUNT -fail-on-high-count=$FAIL_HIGH_MALWARE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_MALWARE_COUNT -fail-on-low-count=$FAIL_LOW_MALWARE_COUNT
environment:
DEEPFENCE_KEY: ""
DEEPFENCE_CONSOLE_URL: ""
Expand All @@ -104,6 +108,8 @@ jobs:
FAIL_MEDIUM_MALWARE_COUNT: 100
FAIL_LOW_MALWARE_COUNT: 100
FULL_IMAGE_NAME: "go-server:1.0"
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""

workflows:
version: 2
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,8 @@ jobs:
REPO: demo-app
DEEPFENCE_CONSOLE_URL: 127.0.0.1
DEEPFENCE_KEY: key
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
steps:
- uses: actions/checkout@v2

Expand All @@ -38,9 +40,11 @@ jobs:
FAIL_HIGH_MALWARE_COUNT: 10 # Fail build if number of high malwares found is >= this number. Set -1 to pass regardless of high malwares.
FAIL_MEDIUM_MALWARE_COUNT: 20 # Fail build if number of medium malwares found is >= this number. Set -1 to pass regardless of medium malwares.
FAIL_LOW_MALWARE_COUNT: 50 # Fail build if number of low malwares found is >= this number. Set -1 to pass regardless of low malwares.
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
run: |
docker pull deepfenceio/deepfence_malware_scanner_ce:v2
docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_malware_scanner_ce:v2 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_MALWARE_COUNT -fail-on-high-count=$FAIL_HIGH_MALWARE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_MALWARE_COUNT -fail-on-low-count=$FAIL_LOW_MALWARE_COUNT"
docker pull quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1
docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_MALWARE_COUNT -fail-on-high-count=$FAIL_HIGH_MALWARE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_MALWARE_COUNT -fail-on-low-count=$FAIL_LOW_MALWARE_COUNT"

# Push to dockerhub
- name: Push to Docker Hub
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,8 @@ jobs:
REPO: demo-app
DEEPFENCE_CONSOLE_URL: 127.0.0.1
DEEPFENCE_KEY: key
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
steps:
- uses: actions/checkout@v2

Expand All @@ -38,9 +40,11 @@ jobs:
FAIL_HIGH_SECRET_COUNT: 10 # Fail build if number of high secrets found is >= this number. Set -1 to pass regardless of high secrets.
FAIL_MEDIUM_SECRET_COUNT: 20 # Fail build if number of medium secrets found is >= this number. Set -1 to pass regardless of medium secrets.
FAIL_LOW_SECRET_COUNT: 50 # Fail build if number of low secrets found is >= this number. Set -1 to pass regardless of low secrets.
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
run: |
docker pull deepfenceio/deepfence_secret_scanner_ce:v2
docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_secret_scanner_ce:v2 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_SECRET_COUNT -fail-on-high-count=$FAIL_HIGH_SECRET_COUNT -fail-on-medium-count=$FAIL_MEDIUM_SECRET_COUNT -fail-on-low-count=$FAIL_LOW_SECRET_COUNT"
docker pull quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1
docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1 -image-name "$FULL_IMAGE_NAME" -fail-on-count=$FAIL_SECRET_COUNT -fail-on-high-count=$FAIL_HIGH_SECRET_COUNT -fail-on-medium-count=$FAIL_MEDIUM_SECRET_COUNT -fail-on-low-count=$FAIL_LOW_SECRET_COUNT"

# Push to dockerhub
- name: Push to Docker Hub
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,8 @@ jobs:
REPO: demo-app
DEEPFENCE_CONSOLE_URL: 127.0.0.1
DEEPFENCE_KEY: key
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
steps:
- uses: actions/checkout@v2

Expand All @@ -40,9 +42,11 @@ jobs:
FAIL_MEDIUM_CVE_COUNT: 100 # Fail build if number of medium vulnerabilities found is >= this number. Set -1 to pass regardless of medium vulnerabilities.
FAIL_LOW_CVE_COUNT: 100 # Fail build if number of low vulnerabilities found is >= this number. Set -1 to pass regardless of low vulnerabilities.
FAIL_CVE_SCORE: 10 # Fail build if cumulative CVE score is >= this value. Set -1 to pass regardless of cve score.
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
run: |
docker pull deepfenceio/deepfence_package_scanner_ce:v2
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_package_scanner_ce:v2 -source "$FULL_IMAGE_NAME" -console-url=$DEEPFENCE_CONSOLE_URL -deepfence-key=$DEEPFENCE_KEY -fail-on-count=$FAIL_CVE_COUNT -fail-on-critical-count=$FAIL_CRITICAL_CVE_COUNT -fail-on-high-count=$FAIL_HIGH_CVE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_CVE_COUNT -fail-on-low-count=$FAIL_LOW_CVE_COUNT -fail-on-score=$FAIL_CVE_SCORE -scan-type="base,java,python,ruby,php,nodejs,js,dotnet"
docker pull quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1
docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1 -source "$FULL_IMAGE_NAME" -console-url=$DEEPFENCE_CONSOLE_URL -deepfence-key=$DEEPFENCE_KEY -fail-on-count=$FAIL_CVE_COUNT -fail-on-critical-count=$FAIL_CRITICAL_CVE_COUNT -fail-on-high-count=$FAIL_HIGH_CVE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_CVE_COUNT -fail-on-low-count=$FAIL_LOW_CVE_COUNT -fail-on-score=$FAIL_CVE_SCORE -scan-type="base,java,python,ruby,php,nodejs,js,dotnet"

# Push to dockerhub
- name: Push to Docker Hub
Expand Down
18 changes: 12 additions & 6 deletions ci-cd-integrations/gitlab/.gitlab-ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -42,10 +42,12 @@ test-docker-build-and-vulnerabilities:
FAIL_MEDIUM_CVE_COUNT: 1000
FAIL_LOW_CVE_COUNT: 1000
FAIL_CVE_SCORE: -1
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
script:
- docker build -t $IMAGE_NAME .
- docker pull deepfenceio/deepfence_package_scanner_ce:v2
- docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_package_scanner_ce:v2 -source"$IMAGE_NAME" -console-url=$DEEPFENCE_CONSOLE_URL -deepfence-key=$DEEPFENCE_KEY -fail-on-count=$FAIL_CVE_COUNT -fail-on-critical-count=$FAIL_CRITICAL_CVE_COUNT -fail-on-high-count=$FAIL_HIGH_CVE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_CVE_COUNT -fail-on-low-count=$FAIL_LOW_CVE_COUNT -fail-on-score=$FAIL_CVE_SCORE -scan-type="base,java,python,ruby,php,nodejs,js,dotnet"
- docker pull quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1
- docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1 -source"$IMAGE_NAME" -product=${DEEPFENCE_PRODUCT} -license=${DEEPFENCE_LICENSE} -console-url=$DEEPFENCE_CONSOLE_URL -deepfence-key=$DEEPFENCE_KEY -fail-on-count=$FAIL_CVE_COUNT -fail-on-critical-count=$FAIL_CRITICAL_CVE_COUNT -fail-on-high-count=$FAIL_HIGH_CVE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_CVE_COUNT -fail-on-low-count=$FAIL_LOW_CVE_COUNT -fail-on-score=$FAIL_CVE_SCORE -scan-type="base,java,python,ruby,php,nodejs,js,dotnet"

test-docker-build-and-secrets:
image: docker:latest
Expand All @@ -60,10 +62,12 @@ test-docker-build-and-secrets:
FAIL_HIGH_SECRET_COUNT: 10
FAIL_MEDIUM_SECRET_COUNT: 20
FAIL_LOW_SECRET_COUNT: 50
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
script:
- docker build -t $IMAGE_NAME .
- docker pull deepfenceio/deepfence_secret_scanner_ce:v2
- docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_secret_scanner_ce:v2 -image-name "$IMAGE_NAME" -fail-on-count=$FAIL_SECRET_COUNT -fail-on-high-count=$FAIL_HIGH_SECRET_COUNT -fail-on-medium-count=$FAIL_MEDIUM_SECRET_COUNT -fail-on-low-count=$FAIL_LOW_SECRET_COUNT
- docker pull quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1
- docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1 -image-name "$IMAGE_NAME" -product=${DEEPFENCE_PRODUCT} -license=${DEEPFENCE_LICENSE} -fail-on-count=$FAIL_SECRET_COUNT -fail-on-high-count=$FAIL_HIGH_SECRET_COUNT -fail-on-medium-count=$FAIL_MEDIUM_SECRET_COUNT -fail-on-low-count=$FAIL_LOW_SECRET_COUNT

test-docker-build-and-malwares:
image: docker:latest
Expand All @@ -78,7 +82,9 @@ test-docker-build-and-malwares:
FAIL_HIGH_MALWARE_COUNT: 10
FAIL_MEDIUM_MALWARE_COUNT: 20
FAIL_LOW_MALWARE_COUNT: 50
DEEPFENCE_LICENSE: ""
DEEPFENCE_PRODUCT: ""
script:
- docker build -t $IMAGE_NAME .
- docker pull deepfenceio/deepfence_malware_scanner_ce:v2
- docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_malware_scanner_ce:v2 -image-name "$IMAGE_NAME" -fail-on-count=$FAIL_MALWARE_COUNT -fail-on-high-count=$FAIL_HIGH_MALWARE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_MALWARE_COUNT -fail-on-low-count=$FAIL_LOW_MALWARE_COUNT
- docker pull quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1
- docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1 -image-name "$IMAGE_NAME" -product=${DEEPFENCE_PRODUCT} -license=${DEEPFENCE_LICENSE} -fail-on-count=$FAIL_MALWARE_COUNT -fail-on-high-count=$FAIL_HIGH_MALWARE_COUNT -fail-on-medium-count=$FAIL_MEDIUM_MALWARE_COUNT -fail-on-low-count=$FAIL_LOW_MALWARE_COUNT
4 changes: 2 additions & 2 deletions ci-cd-integrations/hashicorp-packer/malwares/docker.pkr.hcl
Original file line number Diff line number Diff line change
Expand Up @@ -33,8 +33,8 @@ build {

post-processor "shell-local" {
inline = [
"docker pull deepfenceio/deepfence_malware_scanner_ce:v2",
"docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_malware_scanner_ce:v2 -image-name ${var.image_name}:${var.image_tag} -fail-on-count=${var.FAIL_MALWARE_COUNT} -fail-on-high-count=${var.FAIL_HIGH_MALWARE_COUNT} -fail-on-medium-count=${var.FAIL_MEDIUM_MALWARE_COUNT} -fail-on-low-count=${var.FAIL_LOW_MALWARE_COUNT}"
"docker pull quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1",
"docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_malware_scanner_ce:2.5.1 -product=${var.deepfence_product} -license=${var.deepfence_license} -image-name ${var.image_name}:${var.image_tag} -fail-on-count=${var.FAIL_MALWARE_COUNT} -fail-on-high-count=${var.FAIL_HIGH_MALWARE_COUNT} -fail-on-medium-count=${var.FAIL_MEDIUM_MALWARE_COUNT} -fail-on-low-count=${var.FAIL_LOW_MALWARE_COUNT}"
]
}
}
11 changes: 11 additions & 0 deletions ci-cd-integrations/hashicorp-packer/malwares/variables.pkr.hcl
Original file line number Diff line number Diff line change
Expand Up @@ -54,3 +54,14 @@ variable "image_tag" {
sensitive = false
}

# deepfence_license variable can be overidden in variables.pkrvars.hcl
variable "deepfence_license" {
type = string
sensitive = true
}

# deepfence_product variable can be overidden in variables.pkrvars.hcl
variable "deepfence_product" {
type = string
sensitive = false
}
4 changes: 2 additions & 2 deletions ci-cd-integrations/hashicorp-packer/secrets/docker.pkr.hcl
Original file line number Diff line number Diff line change
Expand Up @@ -33,8 +33,8 @@ build {

post-processor "shell-local" {
inline = [
"docker pull deepfenceio/deepfence_secret_scanner_ce:v2",
"docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_secret_scanner_ce:v2 -image-name ${var.image_name}:${var.image_tag} -fail-on-count=${var.FAIL_SECRET_COUNT} -fail-on-high-count=${var.FAIL_HIGH_SECRET_COUNT} -fail-on-medium-count=${var.FAIL_MEDIUM_SECRET_COUNT} -fail-on-low-count=${var.FAIL_LOW_SECRET_COUNT}"
"docker pull quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1",
"docker run -i --rm --net=host --privileged=true --cpus=\"0.3\" -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.1 -product=${var.deepfence_product} -license=${var.deepfence_license} -image-name ${var.image_name}:${var.image_tag} -fail-on-count=${var.FAIL_SECRET_COUNT} -fail-on-high-count=${var.FAIL_HIGH_SECRET_COUNT} -fail-on-medium-count=${var.FAIL_MEDIUM_SECRET_COUNT} -fail-on-low-count=${var.FAIL_LOW_SECRET_COUNT}"
]
}
}
11 changes: 11 additions & 0 deletions ci-cd-integrations/hashicorp-packer/secrets/variables.pkr.hcl
Original file line number Diff line number Diff line change
Expand Up @@ -54,3 +54,14 @@ variable "image_tag" {
sensitive = false
}

# deepfence_license variable can be overidden in variables.pkrvars.hcl
variable "deepfence_license" {
type = string
sensitive = true
}

# deepfence_product variable can be overidden in variables.pkrvars.hcl
variable "deepfence_product" {
type = string
sensitive = false
}
Original file line number Diff line number Diff line change
Expand Up @@ -33,8 +33,8 @@ build {

post-processor "shell-local" {
inline = [
"docker pull deepfenceio/deepfence_package_scanner_ce:v2",
"docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw deepfenceio/deepfence_package_scanner_ce:v2 -source ${var.image_name}:${var.image_tag} -console-url=${var.DEEPFENCE_CONSOLE_URL} -deepfence-key=${var.DEEPFENCE_KEY} -fail-on-count=${var.FAIL_CVE_COUNT} -fail-on-score=${var.FAIL_CVE_SCORE} -fail-on-critical-count ${var.FAIL_CRITICAL_CVE_COUNT} -scan-type=\"base,java,python,ruby,php,nodejs,js,dotnet\""
"docker pull quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1",
"docker run -i --rm --net=host --privileged=true -v /var/run/docker.sock:/var/run/docker.sock:rw quay.io/deepfenceio/deepfence_package_scanner_cli:2.5.1 -product=${var.deepfence_product} -license=${var.deepfence_license} -source ${var.image_name}:${var.image_tag} -console-url=${var.DEEPFENCE_CONSOLE_URL} -deepfence-key=${var.DEEPFENCE_KEY} -fail-on-count=${var.FAIL_CVE_COUNT} -fail-on-score=${var.FAIL_CVE_SCORE} -fail-on-critical-count ${var.FAIL_CRITICAL_CVE_COUNT} -scan-type=\"base,java,python,ruby,php,nodejs,js,dotnet\""
]
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -68,3 +68,14 @@ variable "image_tag" {
sensitive = false
}

# deepfence_license variable can be overidden in variables.pkrvars.hcl
variable "deepfence_license" {
type = string
sensitive = true
}

# deepfence_product variable can be overidden in variables.pkrvars.hcl
variable "deepfence_product" {
type = string
sensitive = false
}
Loading
Loading