Skip to content

Commit fc3f354

Browse files
committed
ci: update workflow
1 parent 4e1c6a2 commit fc3f354

File tree

1 file changed

+0
-42
lines changed

1 file changed

+0
-42
lines changed

.github/workflows/container.yml

Lines changed: 0 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -216,46 +216,4 @@ jobs:
216216
path: sbom.spdx.json
217217
retention-days: 90
218218

219-
# Scan container for vulnerabilities
220-
scan:
221-
name: Scan
222-
needs: manifest
223-
runs-on: ubuntu-latest
224-
if: github.event_name != 'pull_request'
225-
permissions:
226-
contents: read
227-
packages: read
228-
security-events: write
229-
steps:
230-
- name: Harden the runner (Audit all outbound calls)
231-
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
232-
with:
233-
egress-policy: audit
234-
235-
- name: Log in to GitHub Container Registry
236-
uses: step-security/docker-login-action@c3e677aae8393bc9c81cfdf9709648720ea4bd4d # v3.6.0
237-
with:
238-
registry: ${{ env.REGISTRY }}
239-
username: ${{ github.actor }}
240-
password: ${{ secrets.GITHUB_TOKEN }}
241219

242-
- name: Extract metadata
243-
id: meta
244-
uses: docker/metadata-action@c299e40c65443455700f0fdfc63efafe5b349051 # v5.10.0
245-
with:
246-
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
247-
tags: |
248-
type=sha,prefix=sha-
249-
250-
- name: Run Trivy vulnerability scanner
251-
uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # 0.34.1
252-
with:
253-
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ steps.meta.outputs.version }}
254-
format: "sarif"
255-
output: "trivy-results.sarif"
256-
severity: "CRITICAL,HIGH"
257-
258-
- name: Upload Trivy scan results
259-
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
260-
with:
261-
sarif_file: "trivy-results.sarif"

0 commit comments

Comments
 (0)