Skip to content

Commit 8247df9

Browse files
ci: remove trivy
1 parent f6ebbd2 commit 8247df9

File tree

1 file changed

+0
-51
lines changed

1 file changed

+0
-51
lines changed

.github/workflows/node.yaml

Lines changed: 0 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -208,32 +208,6 @@ jobs:
208208
provenance: false
209209
labels: ${{ steps.dockerhub-tag.outputs.labels }}
210210
tags: ${{ steps.dockerhub-tag.outputs.tags }}
211-
- name: Get image for Trivy scanning
212-
id: trivy-image
213-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
214-
run: |
215-
image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
216-
echo "image=$image" >> $GITHUB_OUTPUT
217-
- name: Trivy scanning
218-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
219-
uses: aquasecurity/trivy-action@0.16.1
220-
with:
221-
image-ref: '${{ steps.trivy-image.outputs.image }}'
222-
format: 'table'
223-
output: trivy-scan-result.txt
224-
ignore-unfixed: true
225-
severity: 'CRITICAL,HIGH'
226-
- name: Post all Trivy scan results to Github Summary as a table
227-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
228-
env:
229-
CODE_BLOCK: "```"
230-
run: |
231-
echo "# Trivy scan results ~ core" >> $GITHUB_STEP_SUMMARY
232-
233-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
234-
cat trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
235-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
236-
237211

238212
build-gateways:
239213
# TODO - should this be dependant on tests or something passing if we are on a tag?
@@ -350,31 +324,6 @@ jobs:
350324
provenance: false
351325
labels: ${{ steps.dockerhub-tag.outputs.labels }}
352326
tags: "${{ steps.dockerhub-tag.outputs.tags }}"
353-
- name: Get image for Trivy scanning
354-
id: trivy-image
355-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
356-
run: |
357-
image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
358-
echo "image=$image" >> $GITHUB_OUTPUT
359-
- name: Trivy scanning
360-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
361-
uses: aquasecurity/trivy-action@0.16.1
362-
with:
363-
image-ref: '${{ steps.trivy-image.outputs.image }}'
364-
format: 'table'
365-
output: ${{ matrix.gateway-name }}-trivy-scan-result.txt
366-
ignore-unfixed: true
367-
severity: 'CRITICAL,HIGH'
368-
- name: Post all Trivy scan results to Github Summary as a table
369-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
370-
env:
371-
CODE_BLOCK: "```"
372-
run: |
373-
echo "# Trivy scan results ~ ${{ matrix.gateway-name }}" >> $GITHUB_STEP_SUMMARY
374-
375-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
376-
cat ${{ matrix.gateway-name }}-trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
377-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
378327

379328
lint-packages:
380329
name: Lint Package

0 commit comments

Comments
 (0)