@@ -240,18 +240,18 @@ jobs:
240240 org.opencontainers.image.version=${{ inputs.image_tag2 }}
241241 org.opencontainers.image.created=${{ inputs.build_time }}
242242 org.opencontainers.image.revision=${{ github.sha }}
243- - name : scan image
244- id : get-ecr-scan-result
245- uses : ./tmp/github-workflows/.github/actions/get-ecr-scan-result
246- with :
247- aws_role : ${{ vars.DV_AWS_ECR_ROLE }}
248- aws_region : ${{ vars.DV_AWS_REGION }}
249- ecr_registry : ${{ vars.DV_AWS_ECR_REGISTRY }}
250- ecr_repository : ${{ steps.get-parameters.outputs.ecr_repo }}
251- image_tag : ${{ inputs.image_tag1 }}
252- - name : check scan results
253- run : |
254- if [ "${{ steps.get-ecr-scan-result.outputs.critical }}" != "null" ] || [ "${{ steps.get-ecr-scan-result.outputs.high }}" != "null" ]; then
255- echo "Docker image contains vulnerabilities at critical or high level"
256- exit 1 #exit execution due to docker image vulnerabilities
257- fi
243+ # - name: scan image
244+ # id: get-ecr-scan-result
245+ # uses: ./tmp/github-workflows/.github/actions/get-ecr-scan-result
246+ # with:
247+ # aws_role: ${{ vars.DV_AWS_ECR_ROLE }}
248+ # aws_region: ${{ vars.DV_AWS_REGION }}
249+ # ecr_registry: ${{ vars.DV_AWS_ECR_REGISTRY }}
250+ # ecr_repository: ${{ steps.get-parameters.outputs.ecr_repo }}
251+ # image_tag: ${{ inputs.image_tag1 }}
252+ # - name: check scan results
253+ # run: |
254+ # if [ "${{ steps.get-ecr-scan-result.outputs.critical }}" != "null" ] || [ "${{ steps.get-ecr-scan-result.outputs.high }}" != "null" ]; then
255+ # echo "Docker image contains vulnerabilities at critical or high level"
256+ # exit 1 #exit execution due to docker image vulnerabilities
257+ # fi
0 commit comments