Skip to content

Commit

Permalink
disable Trivy until SBOM 3.0 review (#6464)
Browse files Browse the repository at this point in the history
  • Loading branch information
pdabelf5 authored Sep 20, 2024
1 parent fcfb2bc commit 89858d6
Show file tree
Hide file tree
Showing 3 changed files with 40 additions and 40 deletions.
16 changes: 8 additions & 8 deletions .github/workflows/build-oss.yml
Original file line number Diff line number Diff line change
Expand Up @@ -183,14 +183,14 @@ jobs:
mkdir -p "${{ inputs.image }}-results/"
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
with:
image-ref: ${{ steps.meta.outputs.tags }}
format: "sarif"
output: "${{ inputs.image }}-results/trivy.sarif"
ignore-unfixed: "true"
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
# with:
# image-ref: ${{ steps.meta.outputs.tags }}
# format: "sarif"
# output: "${{ inputs.image }}-results/trivy.sarif"
# ignore-unfixed: "true"
# if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}

- name: DockerHub Login for Docker Scout
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
Expand Down
16 changes: 8 additions & 8 deletions .github/workflows/build-plus.yml
Original file line number Diff line number Diff line change
Expand Up @@ -204,14 +204,14 @@ jobs:
mkdir -p "${{ inputs.image }}-results/"
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
with:
image-ref: ${{ steps.meta.outputs.tags }}
format: "sarif"
output: "${{ inputs.image }}-results/trivy.sarif"
ignore-unfixed: "true"
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
# with:
# image-ref: ${{ steps.meta.outputs.tags }}
# format: "sarif"
# output: "${{ inputs.image }}-results/trivy.sarif"
# ignore-unfixed: "true"
# if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}

- name: DockerHub Login for Docker Scout
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
Expand Down
48 changes: 24 additions & 24 deletions .github/workflows/image-promotion.yml
Original file line number Diff line number Diff line change
Expand Up @@ -432,14 +432,14 @@ jobs:
username: oauth2accesstoken
password: ${{ steps.auth.outputs.access_token }}

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
continue-on-error: true
with:
image-ref: ${{ steps.meta.outputs.tags }}
format: "sarif"
output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
ignore-unfixed: "true"
# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
# continue-on-error: true
# with:
# image-ref: ${{ steps.meta.outputs.tags }}
# format: "sarif"
# output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
# ignore-unfixed: "true"

- name: DockerHub Login for Docker Scout
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
Expand Down Expand Up @@ -522,14 +522,14 @@ jobs:
username: oauth2accesstoken
password: ${{ steps.auth.outputs.access_token }}

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
continue-on-error: true
with:
image-ref: ${{ steps.meta.outputs.tags }}
format: "sarif"
output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
ignore-unfixed: "true"
# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
# continue-on-error: true
# with:
# image-ref: ${{ steps.meta.outputs.tags }}
# format: "sarif"
# output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
# ignore-unfixed: "true"

- name: DockerHub Login for Docker Scout
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
Expand Down Expand Up @@ -619,14 +619,14 @@ jobs:
username: oauth2accesstoken
password: ${{ steps.auth.outputs.access_token }}

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
continue-on-error: true
with:
image-ref: ${{ steps.meta.outputs.tags }}
format: "sarif"
output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
ignore-unfixed: "true"
# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
# continue-on-error: true
# with:
# image-ref: ${{ steps.meta.outputs.tags }}
# format: "sarif"
# output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
# ignore-unfixed: "true"

- name: DockerHub Login for Docker Scout
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
Expand Down

0 comments on commit 89858d6

Please sign in to comment.