-
Notifications
You must be signed in to change notification settings - Fork 0
33 lines (31 loc) · 990 Bytes
/
trivy-cron.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
---
name: Docker Image Trivy Image Vulnerability Scan Cron Job
on:
schedule:
# Runs "at 2 a.m. past every day" (see https://crontab.guru)
- cron: '0 2 * * *'
permissions:
# required for all workflows
security-events: write
# only required for workflows in private repositories
actions: read
contents: read
# Multi Image Repro GHA
jobs:
trivy_image_scan_cron:
strategy:
matrix:
image:
- infra-tools
- dbcmetrics
- awx-ee
uses: hpi-schul-cloud/infra-tools/.github/workflows/trivy-scan.yaml@master
with:
image-ref: 'docker.io/schulcloud/${{ matrix.image }}:latest'
# Template Single Image Repro GHA
# jobs:
# trivy_image_scan_cron:
# uses: hpi-schul-cloud/infra-tools/.github/workflows/trivy-scan.yaml@OPS-3814-add-Image-Vulnerability-Scanning
# # uses: hpi-schul-cloud/infra-tools/.github/workflows/trivy-scan.yaml@master
# with:
# image-ref: 'docker.io/schulcloud/<IMAGE_NAME>:latest'