From f0a19e9bd9628ad9c06f8db42092284fda22d463 Mon Sep 17 00:00:00 2001 From: Oleg Bespalov Date: Thu, 7 Dec 2023 14:25:18 +0100 Subject: [PATCH] Adds trivy scheduled checks --- .github/workflows/trivy.yml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 .github/workflows/trivy.yml diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml new file mode 100644 index 000000000000..1c3af558c95a --- /dev/null +++ b/.github/workflows/trivy.yml @@ -0,0 +1,33 @@ +name: trivy scan + +on: + # Enable manually triggering this workflow via the API or web UI + workflow_dispatch: + schedule: + # At 10:00 UTC on every day-of-week from Monday through Friday. + - cron: '0 10 * * 1-5' + +permissions: + contents: read + +jobs: + build: + permissions: + contents: read # for actions/checkout to fetch code + security-events: write # for github/codeql-action/upload-sarif to upload SARIF results + actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status + name: Build + runs-on: ubuntu-latest + steps: + - name: Run Trivy vulnerability scanner + uses: aquasecurity/trivy-action@22d2755f774d925b191a185b74e782a4b0638a41 + with: + image-ref: 'grafana/k6:master' + format: 'sarif' + output: 'trivy-results.sarif' + severity: 'CRITICAL,HIGH,MEDIUM' + + - name: Upload Trivy scan results to GitHub Security tab + uses: github/codeql-action/upload-sarif@v2 + with: + sarif_file: 'trivy-results.sarif'