@@ -246,18 +246,18 @@ jobs:
246246 org.opencontainers.image.version=${{ inputs.image_tag2 }}
247247 org.opencontainers.image.created=${{ inputs.build_time }}
248248 org.opencontainers.image.revision=${{ github.sha }}
249- # - name: scan image
250- # id: get-ecr-scan-result
251- # uses: ./tmp/github-workflows/.github/actions/get-ecr-scan-result
252- # with:
253- # aws_role: ${{ secrets.DV_AWS_ECR_ROLE }}
254- # aws_region: ${{ secrets.DV_AWS_REGION }}
255- # ecr_registry: ${{ secrets.DV_AWS_ECR_REGISTRY }}
256- # ecr_repository: ${{ steps.get-parameters.outputs.ecr_repo }}
257- # image_tag: ${{ inputs.image_tag1 }}
258- # - name: check scan results
259- # run: |
260- # if [ "${{ steps.get-ecr-scan-result.outputs.critical }}" != "null" ] || [ "${{ steps.get-ecr-scan-result.outputs.high }}" != "null" ]; then
261- # echo "Docker image contains vulnerabilities at critical or high level"
262- # exit 1 #exit execution due to docker image vulnerabilities
263- # fi
249+ - name : scan image
250+ id : get-ecr-scan-result
251+ uses : ./tmp/github-workflows/.github/actions/get-ecr-scan-result
252+ with :
253+ aws_role : ${{ secrets.DV_AWS_ECR_ROLE }}
254+ aws_region : ${{ secrets.DV_AWS_REGION }}
255+ ecr_registry : ${{ secrets.DV_AWS_ECR_REGISTRY }}
256+ ecr_repository : ${{ steps.get-parameters.outputs.ecr_repo }}
257+ image_tag : ${{ inputs.image_tag1 }}
258+ - name : check scan results
259+ run : |
260+ if [ "${{ steps.get-ecr-scan-result.outputs.critical }}" != "null" ] || [ "${{ steps.get-ecr-scan-result.outputs.high }}" != "null" ]; then
261+ echo "Docker image contains vulnerabilities at critical or high level"
262+ exit 1 #exit execution due to docker image vulnerabilities
263+ fi
0 commit comments