From 2c6dc804a6711eb2e73bcfc2e48c2d47d0d65b37 Mon Sep 17 00:00:00 2001 From: Thomas Carmet <8408330+tcarmet@users.noreply.github.com> Date: Tue, 16 Jul 2024 18:17:20 +0000 Subject: [PATCH] Trivy scan docker image --- .github/workflows/trivy.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 .github/workflows/trivy.yaml diff --git a/.github/workflows/trivy.yaml b/.github/workflows/trivy.yaml new file mode 100644 index 00000000..022548cf --- /dev/null +++ b/.github/workflows/trivy.yaml @@ -0,0 +1,28 @@ +--- +name: Trivy + +on: + push: + branches: + - main + workflow_dispatch: {} + schedule: + - cron: 0 0 * * 0 + +permissions: + contents: write + +jobs: + trivy: + runs-on: ubuntu-latest + steps: + - name: Scan image in a private registry and upload results to GitHub + uses: aquasecurity/trivy-action@0.24.0 + with: + image-ref: ghcr.io/${{ github.repository }}:${{ github.ref_name == 'main' && 'latest' || github.sha }} + scan-type: image + format: github + output: dependency-results.sbom.json + github-pat: ${{ secrets.GITHUB_TOKEN }} + severity: CRITICAL + scanners: vuln