diff --git a/.github/workflows/build-docker-artifacts-config.schema.json b/.github/workflows/build-docker-artifacts-config.schema.json index 4d0d6102..05e63e49 100644 --- a/.github/workflows/build-docker-artifacts-config.schema.json +++ b/.github/workflows/build-docker-artifacts-config.schema.json @@ -35,11 +35,6 @@ "type": "string", "description": "ECR repository to push the image to" }, - "skip_image_scan": { - "type": "boolean", - "default": false, - "description": "[Deprecated: use scan_high_severity or the .trivyignore file instead] Skip scanning the image for vulnerabilities" - }, "scan_high_severity": { "type": "boolean", "default": true, diff --git a/.github/workflows/build-docker-artifacts.yml b/.github/workflows/build-docker-artifacts.yml index a899594a..2d71600a 100644 --- a/.github/workflows/build-docker-artifacts.yml +++ b/.github/workflows/build-docker-artifacts.yml @@ -22,10 +22,6 @@ on: type: boolean required: false default: true - skip_image_scan: - type: boolean - required: false - default: false scan_high_severity: description: 'Include high severity' type: boolean @@ -258,7 +254,6 @@ jobs: echo "severity=HIGH,CRITICAL" >> "$GITHUB_OUTPUT" fi - name: Run Trivy vulnerability scanner - if: ${{ inputs.skip_image_scan != true && fromJson(vars.SKIP_IMAGE_SCAN || 'false') != true && matrix.component.skip_image_scan != true }} uses: aquasecurity/trivy-action@0.32.0 with: image-ref: ${{ vars.DV_AWS_ECR_REGISTRY }}/${{ matrix.component.ecr_repository }}:${{ matrix.component.image_tag }}