@@ -101,39 +101,39 @@ jobs:
101101 load : true
102102 tags : ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
103103
104- - name : Run Trivy vulnerability scanner (json output)
105- uses : aquasecurity/trivy-action@v0.35.0
106- with :
107- image-ref : ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
108- format : json
109- output : trivy-results.json
110- scanners : vuln
111-
112- - name : Upload Trivy scan results to Security Agent
113- uses : hasura/security-agent-tools/upload-file@v1
114- with :
115- file_path : trivy-results.json
116- security_agent_api_key : ${{ secrets.SECURITY_AGENT_API_KEY }}
117- tags : |
118- service=ndc-python-lambda
119- source_code_path=.
120- docker_file_path=Dockerfile
121- scanner=trivy
122- image_name=${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
123- product_domain=hasura-ddn-data-plane,promptql-data-plane
124- team=engine
125-
126- - name : Fail build on High/Critical Vulnerabilities
127- uses : aquasecurity/trivy-action@v0.35.0
128- with :
129- skip-setup-trivy : true
130- image-ref : ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
131- format : table
132- severity : CRITICAL,HIGH
133- scanners : vuln
134- ignore-unfixed : true
135- exit-code : 1
136-
104+ # - name: Run Trivy vulnerability scanner (json output)
105+ # uses: aquasecurity/trivy-action@v0.35.0
106+ # with:
107+ # image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
108+ # format: json
109+ # output: trivy-results.json
110+ # scanners: vuln
111+ #
112+ # - name: Upload Trivy scan results to Security Agent
113+ # uses: hasura/security-agent-tools/upload-file@v1
114+ # with:
115+ # file_path: trivy-results.json
116+ # security_agent_api_key: ${{ secrets.SECURITY_AGENT_API_KEY }}
117+ # tags: |
118+ # service=ndc-python-lambda
119+ # source_code_path=.
120+ # docker_file_path=Dockerfile
121+ # scanner=trivy
122+ # image_name=${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
123+ # product_domain=hasura-ddn-data-plane,promptql-data-plane
124+ # team=engine
125+ #
126+ # - name: Fail build on High/Critical Vulnerabilities
127+ # uses: aquasecurity/trivy-action@v0.35.0
128+ # with:
129+ # skip-setup-trivy: true
130+ # image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
131+ # format: table
132+ # severity: CRITICAL,HIGH
133+ # scanners: vuln
134+ # ignore-unfixed: true
135+ # exit-code: 1
136+ #
137137 build-and-push-docker :
138138 name : Build and push Docker image
139139 needs : build-connector
@@ -176,39 +176,39 @@ jobs:
176176 IMAGE_TAG="${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${GITHUB_REF#refs/tags/}"
177177 echo "image_tag=$IMAGE_TAG" >> $GITHUB_OUTPUT
178178
179- - name : Run Trivy vulnerability scanner (json output)
180- uses : aquasecurity/trivy-action@v0.35.0
181- with :
182- image-ref : ${{ steps.get-image-tag.outputs.image_tag }}
183- format : json
184- output : trivy-results.json
185- scanners : vuln
186-
187- - name : Upload Trivy scan results to Security Agent
188- uses : hasura/security-agent-tools/upload-file@v1
189- with :
190- file_path : trivy-results.json
191- security_agent_api_key : ${{ secrets.SECURITY_AGENT_API_KEY }}
192- tags : |
193- service=ndc-python-lambda
194- source_code_path=.
195- docker_file_path=Dockerfile
196- scanner=trivy
197- image_name=${{ steps.get-image-tag.outputs.image_tag }}
198- product_domain=hasura-ddn-data-plane,promptql-data-plane
199- team=engine
200-
201- - name : Fail build on High/Critical Vulnerabilities
202- uses : aquasecurity/trivy-action@v0.35.0
203- with :
204- skip-setup-trivy : true
205- image-ref : ${{ steps.get-image-tag.outputs.image_tag }}
206- format : table
207- severity : CRITICAL,HIGH
208- scanners : vuln
209- ignore-unfixed : true
210- exit-code : 1
211-
179+ # - name: Run Trivy vulnerability scanner (json output)
180+ # uses: aquasecurity/trivy-action@v0.35.0
181+ # with:
182+ # image-ref: ${{ steps.get-image-tag.outputs.image_tag }}
183+ # format: json
184+ # output: trivy-results.json
185+ # scanners: vuln
186+ #
187+ # - name: Upload Trivy scan results to Security Agent
188+ # uses: hasura/security-agent-tools/upload-file@v1
189+ # with:
190+ # file_path: trivy-results.json
191+ # security_agent_api_key: ${{ secrets.SECURITY_AGENT_API_KEY }}
192+ # tags: |
193+ # service=ndc-python-lambda
194+ # source_code_path=.
195+ # docker_file_path=Dockerfile
196+ # scanner=trivy
197+ # image_name=${{ steps.get-image-tag.outputs.image_tag }}
198+ # product_domain=hasura-ddn-data-plane,promptql-data-plane
199+ # team=engine
200+ #
201+ # - name: Fail build on High/Critical Vulnerabilities
202+ # uses: aquasecurity/trivy-action@v0.35.0
203+ # with:
204+ # skip-setup-trivy: true
205+ # image-ref: ${{ steps.get-image-tag.outputs.image_tag }}
206+ # format: table
207+ # severity: CRITICAL,HIGH
208+ # scanners: vuln
209+ # ignore-unfixed: true
210+ # exit-code: 1
211+ #
212212 release-connector :
213213 name : Release connector
214214 runs-on : ubuntu-latest
0 commit comments