github.com/GoogleContainerTools/skaffold@v1.39.18/deploy/lts-vuln-monitor/cloudbuild.yaml (about) 1 steps: 2 - id: Get github token. 3 name: gcr.io/cloud-builders/gcloud 4 entrypoint: /bin/bash 5 args: [ '-c', "gcloud secrets versions access latest --secret=$_GITHUB_TOKEN --format='get(payload.data)' | tr '_-' '/+' | base64 -d > token.txt" ] 6 - id: Check vulnerability report. 7 name: gcr.io/cloud-builders/gcloud 8 entrypoint: /bin/bash 9 args: 10 - ./deploy/lts-vuln-monitor/scan.sh 11 env: 12 - 'PROJECT_ID=$PROJECT_ID' 13 - '_IMAGE=$_IMAGE' 14 - '_TAG_FILTER=$_TAG_FILTER' 15 - '_SEVERITIES=$_SEVERITIES' 16 - id: Report vulnerability. 17 name: 'gcr.io/$PROJECT_ID/github' 18 entrypoint: /bin/bash 19 args: 20 - -c 21 - | 22 if test -f /workspace/os_vuln.txt; then ./deploy/lts-vuln-monitor/report.sh; fi 23 env: 24 - '_OS_VULN_LABEL=$_OS_VULN_LABEL' 25 - '_REPO=$_REPO' 26 substitutions: 27 _IMAGE: skaffold 28 _TAG_FILTER: v.*lts 29 _SEVERITIES: HIGH CRITICAL 30 _OS_VULN_LABEL: lts os vuln 31 _REPO: GoogleContainerTools/skaffold 32 _GITHUB_TOKEN: LTS_IMAGE_CD_BOT_GITHUB_TOKEN