@@ -208,32 +208,6 @@ jobs:
208208 provenance : false
209209 labels : ${{ steps.dockerhub-tag.outputs.labels }}
210210 tags : ${{ steps.dockerhub-tag.outputs.tags }}
211- - name : Get image for Trivy scanning
212- id : trivy-image
213- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
214- run : |
215- image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
216- echo "image=$image" >> $GITHUB_OUTPUT
217- - name : Trivy scanning
218- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
219- uses : aquasecurity/trivy-action@0.16.1
220- with :
221- image-ref : ' ${{ steps.trivy-image.outputs.image }}'
222- format : ' table'
223- output : trivy-scan-result.txt
224- ignore-unfixed : true
225- severity : ' CRITICAL,HIGH'
226- - name : Post all Trivy scan results to Github Summary as a table
227- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
228- env :
229- CODE_BLOCK : " ```"
230- run : |
231- echo "# Trivy scan results ~ core" >> $GITHUB_STEP_SUMMARY
232-
233- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
234- cat trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
235- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
236-
237211
238212 build-gateways :
239213 # TODO - should this be dependant on tests or something passing if we are on a tag?
@@ -350,31 +324,6 @@ jobs:
350324 provenance : false
351325 labels : ${{ steps.dockerhub-tag.outputs.labels }}
352326 tags : " ${{ steps.dockerhub-tag.outputs.tags }}"
353- - name : Get image for Trivy scanning
354- id : trivy-image
355- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
356- run : |
357- image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
358- echo "image=$image" >> $GITHUB_OUTPUT
359- - name : Trivy scanning
360- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
361- uses : aquasecurity/trivy-action@0.16.1
362- with :
363- image-ref : ' ${{ steps.trivy-image.outputs.image }}'
364- format : ' table'
365- output : ${{ matrix.gateway-name }}-trivy-scan-result.txt
366- ignore-unfixed : true
367- severity : ' CRITICAL,HIGH'
368- - name : Post all Trivy scan results to Github Summary as a table
369- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
370- env :
371- CODE_BLOCK : " ```"
372- run : |
373- echo "# Trivy scan results ~ ${{ matrix.gateway-name }}" >> $GITHUB_STEP_SUMMARY
374-
375- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
376- cat ${{ matrix.gateway-name }}-trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
377- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
378327
379328 lint-packages :
380329 name : Lint Package
0 commit comments