scheduled-scan #392
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: scheduled-scan | |
on: | |
schedule: | |
- cron: "0 5 * * *" | |
workflow_dispatch: {} | |
jobs: | |
scan: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@v3 | |
- name: Run Trivy filesystem vulnerability scanner | |
id: scan | |
uses: aquasecurity/[email protected] | |
with: | |
scan-type: 'fs' | |
format: 'sarif' | |
output: 'trivy-filesystem-results.sarif' | |
exit-code: '1' | |
ignore-unfixed: true | |
severity: 'CRITICAL,HIGH' | |
- name: Upload Trivy filesystem scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@v2 | |
if: always() | |
with: | |
sarif_file: 'trivy-filesystem-results.sarif' | |
scan-image: | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@v3 | |
- name: Build image | |
run: make docker-image DOCKER_IMAGE=ekco:nightly | |
- name: Run Trivy image vulnerability scanner | |
uses: aquasecurity/[email protected] | |
with: | |
image-ref: 'ekco:nightly' | |
format: 'sarif' | |
exit-code: '1' | |
ignore-unfixed: true | |
severity: 'CRITICAL,HIGH' | |
output: 'trivy-image-results.sarif' | |
- name: Upload Trivy image scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@v2 | |
if: always() | |
with: | |
sarif_file: 'trivy-image-results.sarif' |