Skip to content

Commit 937f5d0

Browse files
ci: disable trivy vulnerability scanning (#20)
1 parent 9f82b64 commit 937f5d0

File tree

1 file changed

+66
-66
lines changed

1 file changed

+66
-66
lines changed

.github/workflows/ndc-python-lambda-connector.yaml

Lines changed: 66 additions & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -101,39 +101,39 @@ jobs:
101101
load: true
102102
tags: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
103103

104-
- name: Run Trivy vulnerability scanner (json output)
105-
uses: aquasecurity/trivy-action@v0.35.0
106-
with:
107-
image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
108-
format: json
109-
output: trivy-results.json
110-
scanners: vuln
111-
112-
- name: Upload Trivy scan results to Security Agent
113-
uses: hasura/security-agent-tools/upload-file@v1
114-
with:
115-
file_path: trivy-results.json
116-
security_agent_api_key: ${{ secrets.SECURITY_AGENT_API_KEY }}
117-
tags: |
118-
service=ndc-python-lambda
119-
source_code_path=.
120-
docker_file_path=Dockerfile
121-
scanner=trivy
122-
image_name=${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
123-
product_domain=hasura-ddn-data-plane,promptql-data-plane
124-
team=engine
125-
126-
- name: Fail build on High/Critical Vulnerabilities
127-
uses: aquasecurity/trivy-action@v0.35.0
128-
with:
129-
skip-setup-trivy: true
130-
image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
131-
format: table
132-
severity: CRITICAL,HIGH
133-
scanners: vuln
134-
ignore-unfixed: true
135-
exit-code: 1
136-
104+
# - name: Run Trivy vulnerability scanner (json output)
105+
# uses: aquasecurity/trivy-action@v0.35.0
106+
# with:
107+
# image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
108+
# format: json
109+
# output: trivy-results.json
110+
# scanners: vuln
111+
#
112+
# - name: Upload Trivy scan results to Security Agent
113+
# uses: hasura/security-agent-tools/upload-file@v1
114+
# with:
115+
# file_path: trivy-results.json
116+
# security_agent_api_key: ${{ secrets.SECURITY_AGENT_API_KEY }}
117+
# tags: |
118+
# service=ndc-python-lambda
119+
# source_code_path=.
120+
# docker_file_path=Dockerfile
121+
# scanner=trivy
122+
# image_name=${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
123+
# product_domain=hasura-ddn-data-plane,promptql-data-plane
124+
# team=engine
125+
#
126+
# - name: Fail build on High/Critical Vulnerabilities
127+
# uses: aquasecurity/trivy-action@v0.35.0
128+
# with:
129+
# skip-setup-trivy: true
130+
# image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${{ github.sha }}
131+
# format: table
132+
# severity: CRITICAL,HIGH
133+
# scanners: vuln
134+
# ignore-unfixed: true
135+
# exit-code: 1
136+
#
137137
build-and-push-docker:
138138
name: Build and push Docker image
139139
needs: build-connector
@@ -176,39 +176,39 @@ jobs:
176176
IMAGE_TAG="${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:${GITHUB_REF#refs/tags/}"
177177
echo "image_tag=$IMAGE_TAG" >> $GITHUB_OUTPUT
178178
179-
- name: Run Trivy vulnerability scanner (json output)
180-
uses: aquasecurity/trivy-action@v0.35.0
181-
with:
182-
image-ref: ${{ steps.get-image-tag.outputs.image_tag }}
183-
format: json
184-
output: trivy-results.json
185-
scanners: vuln
186-
187-
- name: Upload Trivy scan results to Security Agent
188-
uses: hasura/security-agent-tools/upload-file@v1
189-
with:
190-
file_path: trivy-results.json
191-
security_agent_api_key: ${{ secrets.SECURITY_AGENT_API_KEY }}
192-
tags: |
193-
service=ndc-python-lambda
194-
source_code_path=.
195-
docker_file_path=Dockerfile
196-
scanner=trivy
197-
image_name=${{ steps.get-image-tag.outputs.image_tag }}
198-
product_domain=hasura-ddn-data-plane,promptql-data-plane
199-
team=engine
200-
201-
- name: Fail build on High/Critical Vulnerabilities
202-
uses: aquasecurity/trivy-action@v0.35.0
203-
with:
204-
skip-setup-trivy: true
205-
image-ref: ${{ steps.get-image-tag.outputs.image_tag }}
206-
format: table
207-
severity: CRITICAL,HIGH
208-
scanners: vuln
209-
ignore-unfixed: true
210-
exit-code: 1
211-
179+
# - name: Run Trivy vulnerability scanner (json output)
180+
# uses: aquasecurity/trivy-action@v0.35.0
181+
# with:
182+
# image-ref: ${{ steps.get-image-tag.outputs.image_tag }}
183+
# format: json
184+
# output: trivy-results.json
185+
# scanners: vuln
186+
#
187+
# - name: Upload Trivy scan results to Security Agent
188+
# uses: hasura/security-agent-tools/upload-file@v1
189+
# with:
190+
# file_path: trivy-results.json
191+
# security_agent_api_key: ${{ secrets.SECURITY_AGENT_API_KEY }}
192+
# tags: |
193+
# service=ndc-python-lambda
194+
# source_code_path=.
195+
# docker_file_path=Dockerfile
196+
# scanner=trivy
197+
# image_name=${{ steps.get-image-tag.outputs.image_tag }}
198+
# product_domain=hasura-ddn-data-plane,promptql-data-plane
199+
# team=engine
200+
#
201+
# - name: Fail build on High/Critical Vulnerabilities
202+
# uses: aquasecurity/trivy-action@v0.35.0
203+
# with:
204+
# skip-setup-trivy: true
205+
# image-ref: ${{ steps.get-image-tag.outputs.image_tag }}
206+
# format: table
207+
# severity: CRITICAL,HIGH
208+
# scanners: vuln
209+
# ignore-unfixed: true
210+
# exit-code: 1
211+
#
212212
release-connector:
213213
name: Release connector
214214
runs-on: ubuntu-latest

0 commit comments

Comments
 (0)