@@ -265,35 +265,6 @@ jobs:
265265 labels : ${{ steps.dockerhub-tag.outputs.labels }}
266266 tags : ${{ steps.dockerhub-tag.outputs.tags }}
267267
268- # Trivy scanning
269- - name : Get image for Trivy scanning
270- id : trivy-image
271- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
272- run : |
273- image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
274- echo "image=$image" >> $GITHUB_OUTPUT
275- - name : Trivy scanning
276- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
277- uses : aquasecurity/trivy-action@0.33.1
278- env :
279- TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db
280- with :
281- image-ref : " ${{ steps.trivy-image.outputs.image }}"
282- format : " table"
283- output : trivy-scan-result.txt
284- ignore-unfixed : true
285- severity : " CRITICAL,HIGH"
286- - name : Post all Trivy scan results to Github Summary as a table
287- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
288- env :
289- CODE_BLOCK : " ```"
290- run : |
291- echo "# Trivy scan results ~ core" >> $GITHUB_STEP_SUMMARY
292-
293- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
294- cat trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
295- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
296-
297268 build-gateways :
298269 # TODO - should this be dependant on tests or something passing if we are on a tag?
299270 name : Build gateways
@@ -437,35 +408,6 @@ jobs:
437408 labels : ${{ steps.dockerhub-tag.outputs.labels }}
438409 tags : " ${{ steps.dockerhub-tag.outputs.tags }}"
439410
440- # Trivy scanning
441- - name : Get image for Trivy scanning
442- id : trivy-image
443- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
444- run : |
445- image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
446- echo "image=$image" >> $GITHUB_OUTPUT
447- - name : Trivy scanning
448- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
449- uses : aquasecurity/trivy-action@0.33.1
450- env :
451- TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db
452- with :
453- image-ref : " ${{ steps.trivy-image.outputs.image }}"
454- format : " table"
455- output : ${{ matrix.gateway-name }}-trivy-scan-result.txt
456- ignore-unfixed : true
457- severity : " CRITICAL,HIGH"
458- - name : Post all Trivy scan results to Github Summary as a table
459- if : steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
460- env :
461- CODE_BLOCK : " ```"
462- run : |
463- echo "# Trivy scan results ~ ${{ matrix.gateway-name }}" >> $GITHUB_STEP_SUMMARY
464-
465- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
466- cat ${{ matrix.gateway-name }}-trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
467- echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
468-
469411 lint-packages :
470412 name : Lint Package ${{ matrix.package-name }}
471413 runs-on : ubuntu-latest
0 commit comments