@@ -432,14 +432,14 @@ jobs:
432
432
username : oauth2accesstoken
433
433
password : ${{ steps.auth.outputs.access_token }}
434
434
435
- - name : Run Trivy vulnerability scanner
436
- uses : aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
437
- continue-on-error : true
438
- with :
439
- image-ref : ${{ steps.meta.outputs.tags }}
440
- format : " sarif"
441
- output : " ${{ steps.directory.outputs.directory }}/trivy.sarif"
442
- ignore-unfixed : " true"
435
+ # - name: Run Trivy vulnerability scanner
436
+ # uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
437
+ # continue-on-error: true
438
+ # with:
439
+ # image-ref: ${{ steps.meta.outputs.tags }}
440
+ # format: "sarif"
441
+ # output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
442
+ # ignore-unfixed: "true"
443
443
444
444
- name : DockerHub Login for Docker Scout
445
445
uses : docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
@@ -522,14 +522,14 @@ jobs:
522
522
username : oauth2accesstoken
523
523
password : ${{ steps.auth.outputs.access_token }}
524
524
525
- - name : Run Trivy vulnerability scanner
526
- uses : aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
527
- continue-on-error : true
528
- with :
529
- image-ref : ${{ steps.meta.outputs.tags }}
530
- format : " sarif"
531
- output : " ${{ steps.directory.outputs.directory }}/trivy.sarif"
532
- ignore-unfixed : " true"
525
+ # - name: Run Trivy vulnerability scanner
526
+ # uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
527
+ # continue-on-error: true
528
+ # with:
529
+ # image-ref: ${{ steps.meta.outputs.tags }}
530
+ # format: "sarif"
531
+ # output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
532
+ # ignore-unfixed: "true"
533
533
534
534
- name : DockerHub Login for Docker Scout
535
535
uses : docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
@@ -619,14 +619,14 @@ jobs:
619
619
username : oauth2accesstoken
620
620
password : ${{ steps.auth.outputs.access_token }}
621
621
622
- - name : Run Trivy vulnerability scanner
623
- uses : aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
624
- continue-on-error : true
625
- with :
626
- image-ref : ${{ steps.meta.outputs.tags }}
627
- format : " sarif"
628
- output : " ${{ steps.directory.outputs.directory }}/trivy.sarif"
629
- ignore-unfixed : " true"
622
+ # - name: Run Trivy vulnerability scanner
623
+ # uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # 0.24.0
624
+ # continue-on-error: true
625
+ # with:
626
+ # image-ref: ${{ steps.meta.outputs.tags }}
627
+ # format: "sarif"
628
+ # output: "${{ steps.directory.outputs.directory }}/trivy.sarif"
629
+ # ignore-unfixed: "true"
630
630
631
631
- name : DockerHub Login for Docker Scout
632
632
uses : docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
0 commit comments