Skip to content

Commit 89858d6

Browse files
authored
disable Trivy until SBOM 3.0 review (#6464)
1 parent fcfb2bc commit 89858d6

File tree

3 files changed

+40
-40
lines changed

3 files changed

+40
-40
lines changed

.github/workflows/build-oss.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -183,14 +183,14 @@ jobs:
183183
mkdir -p "${{ inputs.image }}-results/"
184184
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
185185

186-
- name: Run Trivy vulnerability scanner
187-
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
188-
with:
189-
image-ref: ${{ steps.meta.outputs.tags }}
190-
format: "sarif"
191-
output: "${{ inputs.image }}-results/trivy.sarif"
192-
ignore-unfixed: "true"
193-
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
186+
# - name: Run Trivy vulnerability scanner
187+
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
188+
# with:
189+
# image-ref: ${{ steps.meta.outputs.tags }}
190+
# format: "sarif"
191+
# output: "${{ inputs.image }}-results/trivy.sarif"
192+
# ignore-unfixed: "true"
193+
# if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
194194

195195
- name: DockerHub Login for Docker Scout
196196
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0

.github/workflows/build-plus.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -204,14 +204,14 @@ jobs:
204204
mkdir -p "${{ inputs.image }}-results/"
205205
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
206206

207-
- name: Run Trivy vulnerability scanner
208-
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
209-
with:
210-
image-ref: ${{ steps.meta.outputs.tags }}
211-
format: "sarif"
212-
output: "${{ inputs.image }}-results/trivy.sarif"
213-
ignore-unfixed: "true"
214-
if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
207+
# - name: Run Trivy vulnerability scanner
208+
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
209+
# with:
210+
# image-ref: ${{ steps.meta.outputs.tags }}
211+
# format: "sarif"
212+
# output: "${{ inputs.image }}-results/trivy.sarif"
213+
# ignore-unfixed: "true"
214+
# if: ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
215215

216216
- name: DockerHub Login for Docker Scout
217217
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0

.github/workflows/image-promotion.yml

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -432,14 +432,14 @@ jobs:
432432
username: oauth2accesstoken
433433
password: ${{ steps.auth.outputs.access_token }}
434434

435-
- name: Run Trivy vulnerability scanner
436-
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
437-
continue-on-error: true
438-
with:
439-
image-ref: ${{ steps.meta.outputs.tags }}
440-
format: "sarif"
441-
output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
442-
ignore-unfixed: "true"
435+
# - name: Run Trivy vulnerability scanner
436+
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
437+
# continue-on-error: true
438+
# with:
439+
# image-ref: ${{ steps.meta.outputs.tags }}
440+
# format: "sarif"
441+
# output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
442+
# ignore-unfixed: "true"
443443

444444
- name: DockerHub Login for Docker Scout
445445
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
@@ -522,14 +522,14 @@ jobs:
522522
username: oauth2accesstoken
523523
password: ${{ steps.auth.outputs.access_token }}
524524

525-
- name: Run Trivy vulnerability scanner
526-
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
527-
continue-on-error: true
528-
with:
529-
image-ref: ${{ steps.meta.outputs.tags }}
530-
format: "sarif"
531-
output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
532-
ignore-unfixed: "true"
525+
# - name: Run Trivy vulnerability scanner
526+
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
527+
# continue-on-error: true
528+
# with:
529+
# image-ref: ${{ steps.meta.outputs.tags }}
530+
# format: "sarif"
531+
# output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
532+
# ignore-unfixed: "true"
533533

534534
- name: DockerHub Login for Docker Scout
535535
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
@@ -619,14 +619,14 @@ jobs:
619619
username: oauth2accesstoken
620620
password: ${{ steps.auth.outputs.access_token }}
621621

622-
- name: Run Trivy vulnerability scanner
623-
uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
624-
continue-on-error: true
625-
with:
626-
image-ref: ${{ steps.meta.outputs.tags }}
627-
format: "sarif"
628-
output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
629-
ignore-unfixed: "true"
622+
# - name: Run Trivy vulnerability scanner
623+
# uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
624+
# continue-on-error: true
625+
# with:
626+
# image-ref: ${{ steps.meta.outputs.tags }}
627+
# format: "sarif"
628+
# output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
629+
# ignore-unfixed: "true"
630630

631631
- name: DockerHub Login for Docker Scout
632632
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0

0 commit comments

Comments
 (0)