|
42 | 42 | TIME_ZONE: "Europe/Vienna" |
43 | 43 | NODE_VERSION: "20.9" |
44 | 44 | PYTHON_VERSION: "3.10" |
45 | | - WORKFLOW_BRANCH: "vstoiber-fix-secrets-inherit" |
| 45 | + WORKFLOW_BRANCH: "new_deployment" |
46 | 46 | PYTHON_BASE_IMAGE: "python:3.10.8-slim-bullseye" |
47 | 47 | DATAVISYN_PYTHON_BASE_IMAGE: "188237246440.dkr.ecr.eu-central-1.amazonaws.com/datavisyn/base/python:main" |
48 | 48 | DATAVISYN_NGINX_BASE_IMAGE: "188237246440.dkr.ecr.eu-central-1.amazonaws.com/datavisyn/base/nginx:main" |
@@ -240,18 +240,18 @@ jobs: |
240 | 240 | org.opencontainers.image.version=${{ inputs.image_tag2 }} |
241 | 241 | org.opencontainers.image.created=${{ inputs.build_time }} |
242 | 242 | org.opencontainers.image.revision=${{ github.sha }} |
243 | | - # - name: scan image |
244 | | - # id: get-ecr-scan-result |
245 | | - # uses: ./tmp/github-workflows/.github/actions/get-ecr-scan-result |
246 | | - # with: |
247 | | - # aws_role: ${{ vars.DV_AWS_ECR_ROLE }} |
248 | | - # aws_region: ${{ vars.DV_AWS_REGION }} |
249 | | - # ecr_registry: ${{ vars.DV_AWS_ECR_REGISTRY }} |
250 | | - # ecr_repository: ${{ steps.get-parameters.outputs.ecr_repo }} |
251 | | - # image_tag: ${{ inputs.image_tag1 }} |
252 | | - # - name: check scan results |
253 | | - # run: | |
254 | | - # if [ "${{ steps.get-ecr-scan-result.outputs.critical }}" != "null" ] || [ "${{ steps.get-ecr-scan-result.outputs.high }}" != "null" ]; then |
255 | | - # echo "Docker image contains vulnerabilities at critical or high level" |
256 | | - # exit 1 #exit execution due to docker image vulnerabilities |
257 | | - # fi |
| 243 | + - name: scan image |
| 244 | + id: get-ecr-scan-result |
| 245 | + uses: ./tmp/github-workflows/.github/actions/get-ecr-scan-result |
| 246 | + with: |
| 247 | + aws_role: ${{ vars.DV_AWS_ECR_ROLE }} |
| 248 | + aws_region: ${{ vars.DV_AWS_REGION }} |
| 249 | + ecr_registry: ${{ vars.DV_AWS_ECR_REGISTRY }} |
| 250 | + ecr_repository: ${{ steps.get-parameters.outputs.ecr_repo }} |
| 251 | + image_tag: ${{ inputs.image_tag1 }} |
| 252 | + - name: check scan results |
| 253 | + run: | |
| 254 | + if [ "${{ steps.get-ecr-scan-result.outputs.critical }}" != "null" ] || [ "${{ steps.get-ecr-scan-result.outputs.high }}" != "null" ]; then |
| 255 | + echo "Docker image contains vulnerabilities at critical or high level" |
| 256 | + exit 1 #exit execution due to docker image vulnerabilities |
| 257 | + fi |
0 commit comments