Skip to content

Commit c786a35

Browse files
ci: remove trivy
1 parent a22a0a0 commit c786a35

File tree

1 file changed

+0
-58
lines changed

1 file changed

+0
-58
lines changed

.github/workflows/node.yaml

Lines changed: 0 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -265,35 +265,6 @@ jobs:
265265
labels: ${{ steps.dockerhub-tag.outputs.labels }}
266266
tags: ${{ steps.dockerhub-tag.outputs.tags }}
267267

268-
# Trivy scanning
269-
- name: Get image for Trivy scanning
270-
id: trivy-image
271-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
272-
run: |
273-
image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
274-
echo "image=$image" >> $GITHUB_OUTPUT
275-
- name: Trivy scanning
276-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
277-
uses: aquasecurity/trivy-action@0.33.1
278-
env:
279-
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
280-
with:
281-
image-ref: "${{ steps.trivy-image.outputs.image }}"
282-
format: "table"
283-
output: trivy-scan-result.txt
284-
ignore-unfixed: true
285-
severity: "CRITICAL,HIGH"
286-
- name: Post all Trivy scan results to Github Summary as a table
287-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
288-
env:
289-
CODE_BLOCK: "```"
290-
run: |
291-
echo "# Trivy scan results ~ core" >> $GITHUB_STEP_SUMMARY
292-
293-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
294-
cat trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
295-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
296-
297268
build-gateways:
298269
# TODO - should this be dependant on tests or something passing if we are on a tag?
299270
name: Build gateways
@@ -437,35 +408,6 @@ jobs:
437408
labels: ${{ steps.dockerhub-tag.outputs.labels }}
438409
tags: "${{ steps.dockerhub-tag.outputs.tags }}"
439410

440-
# Trivy scanning
441-
- name: Get image for Trivy scanning
442-
id: trivy-image
443-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
444-
run: |
445-
image=$(echo ${{ steps.ghcr-tag.outputs.tags }} | head -n 1)
446-
echo "image=$image" >> $GITHUB_OUTPUT
447-
- name: Trivy scanning
448-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
449-
uses: aquasecurity/trivy-action@0.33.1
450-
env:
451-
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
452-
with:
453-
image-ref: "${{ steps.trivy-image.outputs.image }}"
454-
format: "table"
455-
output: ${{ matrix.gateway-name }}-trivy-scan-result.txt
456-
ignore-unfixed: true
457-
severity: "CRITICAL,HIGH"
458-
- name: Post all Trivy scan results to Github Summary as a table
459-
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
460-
env:
461-
CODE_BLOCK: "```"
462-
run: |
463-
echo "# Trivy scan results ~ ${{ matrix.gateway-name }}" >> $GITHUB_STEP_SUMMARY
464-
465-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
466-
cat ${{ matrix.gateway-name }}-trivy-scan-result.txt >> $GITHUB_STEP_SUMMARY
467-
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
468-
469411
lint-packages:
470412
name: Lint Package ${{ matrix.package-name }}
471413
runs-on: ubuntu-latest

0 commit comments

Comments
 (0)