Skip to content

Commit aff7344

Browse files
author
igor.grzankowski
committed
Comment out vurneability-scan
1 parent 07bcdff commit aff7344

File tree

1 file changed

+53
-53
lines changed

1 file changed

+53
-53
lines changed

.github/workflows/distroless-build-test-push-workflow.yml

Lines changed: 53 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -107,60 +107,60 @@ jobs:
107107
env:
108108
COSIGN_PRIVATE_KEY: ${{ secrets.COSIGN_PRIVATE_KEY }}
109109
COSIGN_PASSWORD: ${{ secrets.COSIGN_PASSWORD }}
110-
vulnerability-scan:
111-
permissions:
112-
actions: read
113-
contents: read
114-
security-events: write
115-
runs-on: ubuntu-latest
116-
needs: build-operator-image-distroless
117-
env:
118-
SPLUNK_ENTERPRISE_IMAGE: ${{ secrets.SPLUNK_ENTERPRISE_IMAGE }}
119-
SPLUNK_OPERATOR_IMAGE_NAME: splunk/splunk-operator
120-
ECR_REPOSITORY: ${{ secrets.ECR_REPOSITORY }}
121-
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
122-
IMAGE_NAME: ${{ secrets.ECR_REPOSITORY }}/splunk/splunk-operator:${{ github.sha }}-distroless
123-
steps:
124-
- name: Set up cosign
125-
uses: sigstore/cosign-installer@main
126-
- uses: actions/checkout@v2
127-
- name: Dotenv Action
128-
id: dotenv
129-
uses: falti/dotenv-action@d4d12eaa0e1dd06d5bdc3d7af3bf4c8c93cb5359
130-
- name: Set up Docker Buildx
131-
uses: docker/[email protected]
132-
- name: Configure AWS credentials
133-
uses: aws-actions/configure-aws-credentials@v1
134-
with:
135-
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
136-
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
137-
aws-region: ${{ secrets.AWS_DEFAULT_REGION }}
138-
139-
- name: Login to Amazon ECR
140-
uses: aws-actions/amazon-ecr-login@v1
141-
- name: Pull Splunk Operator Image Locally
142-
run: |
143-
docker pull ${{ env.IMAGE_NAME }}
144-
- name: Verify Signed Splunk Operator image
145-
run: |
146-
cosign verify --key env://COSIGN_PUBLIC_KEY ${{ env.IMAGE_NAME }}
147-
env:
148-
COSIGN_PUBLIC_KEY: ${{ secrets.COSIGN_PUBLIC_KEY }}
149-
- name: Run Trivy vulnerability scanner
150-
uses: aquasecurity/trivy-action@master
151-
with:
152-
image-ref: '${{ env.IMAGE_NAME }}'
153-
format: sarif
154-
#exit-code: 1
155-
severity: 'CRITICAL'
156-
ignore-unfixed: true
157-
output: 'trivy-results.sarif'
158-
- name: Upload Trivy scan results to GitHub Security tab
159-
uses: github/codeql-action/upload-sarif@v3
160-
with:
161-
sarif_file: 'trivy-results.sarif'
110+
# vulnerability-scan:
111+
# permissions:
112+
# actions: read
113+
# contents: read
114+
# security-events: write
115+
# runs-on: ubuntu-latest
116+
# needs: build-operator-image-distroless
117+
# env:
118+
# SPLUNK_ENTERPRISE_IMAGE: ${{ secrets.SPLUNK_ENTERPRISE_IMAGE }}
119+
# SPLUNK_OPERATOR_IMAGE_NAME: splunk/splunk-operator
120+
# ECR_REPOSITORY: ${{ secrets.ECR_REPOSITORY }}
121+
# S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
122+
# IMAGE_NAME: ${{ secrets.ECR_REPOSITORY }}/splunk/splunk-operator:${{ github.sha }}-distroless
123+
# steps:
124+
# - name: Set up cosign
125+
# uses: sigstore/cosign-installer@main
126+
# - uses: actions/checkout@v2
127+
# - name: Dotenv Action
128+
# id: dotenv
129+
# uses: falti/dotenv-action@d4d12eaa0e1dd06d5bdc3d7af3bf4c8c93cb5359
130+
# - name: Set up Docker Buildx
131+
# uses: docker/[email protected]
132+
# - name: Configure AWS credentials
133+
# uses: aws-actions/configure-aws-credentials@v1
134+
# with:
135+
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
136+
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
137+
# aws-region: ${{ secrets.AWS_DEFAULT_REGION }}
138+
#
139+
# - name: Login to Amazon ECR
140+
# uses: aws-actions/amazon-ecr-login@v1
141+
# - name: Pull Splunk Operator Image Locally
142+
# run: |
143+
# docker pull ${{ env.IMAGE_NAME }}
144+
# - name: Verify Signed Splunk Operator image
145+
# run: |
146+
# cosign verify --key env://COSIGN_PUBLIC_KEY ${{ env.IMAGE_NAME }}
147+
# env:
148+
# COSIGN_PUBLIC_KEY: ${{ secrets.COSIGN_PUBLIC_KEY }}
149+
# - name: Run Trivy vulnerability scanner
150+
# uses: aquasecurity/trivy-action@master
151+
# with:
152+
# image-ref: '${{ env.IMAGE_NAME }}'
153+
# format: sarif
154+
# #exit-code: 1
155+
# severity: 'CRITICAL'
156+
# ignore-unfixed: true
157+
# output: 'trivy-results.sarif'
158+
# - name: Upload Trivy scan results to GitHub Security tab
159+
# uses: github/codeql-action/upload-sarif@v3
160+
# with:
161+
# sarif_file: 'trivy-results.sarif'
162162
smoke-tests-arm-ubuntu:
163-
needs: vulnerability-scan
163+
# needs: vulnerability-scan
164164
strategy:
165165
fail-fast: false
166166
matrix:

0 commit comments

Comments
 (0)