From e4f2b1a29fdfa3bdcdff09554f1ef00c44cd41d6 Mon Sep 17 00:00:00 2001 From: Giorgi <740702+giorgi1324@users.noreply.github.com> Date: Thu, 14 Nov 2024 17:57:33 +0000 Subject: [PATCH] Temporarily disable triby checks because of TOOMANYREQUESTS errors. --- .github/workflows/base_image_workflow.yaml | 66 +++++++++++----------- 1 file changed, 33 insertions(+), 33 deletions(-) diff --git a/.github/workflows/base_image_workflow.yaml b/.github/workflows/base_image_workflow.yaml index 0195c72b..62b262f1 100644 --- a/.github/workflows/base_image_workflow.yaml +++ b/.github/workflows/base_image_workflow.yaml @@ -104,39 +104,39 @@ jobs: image: localhost:5000/dockle-examine-image:test dockle-ignores: CIS-DI-0005 # Ignore `Enable Content trust for Docker` - - name: Run Trivy vulnerability scanner - human readable output - uses: aquasecurity/trivy-action@master - with: - image-ref: localhost:5000/dockle-examine-image:test - scan-type: 'image' - format: 'table' - exit-code: '0' - ignore-unfixed: true - vuln-type: 'os,library' - severity: 'CRITICAL,HIGH' - scanners: 'vuln,secret,config' - env: - TRIVY_NON_SSL: true - - - name: Run Trivy vulnerability scanner (sarif report) - uses: aquasecurity/trivy-action@master - with: - image-ref: localhost:5000/dockle-examine-image:test - scan-type: 'image' - format: 'sarif' - exit-code: '0' - ignore-unfixed: true - vuln-type: 'os,library' - severity: 'CRITICAL,HIGH' - scanners: 'vuln,secret,config' - output: 'trivy-results-os.sarif' - env: - TRIVY_NON_SSL: true - - - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3 - with: - sarif_file: 'trivy-results-os.sarif' + # - name: Run Trivy vulnerability scanner - human readable output + # uses: aquasecurity/trivy-action@master + # with: + # image-ref: localhost:5000/dockle-examine-image:test + # scan-type: 'image' + # format: 'table' + # exit-code: '0' + # ignore-unfixed: true + # vuln-type: 'os,library' + # severity: 'CRITICAL,HIGH' + # scanners: 'vuln,secret,config' + # env: + # TRIVY_NON_SSL: true + + # - name: Run Trivy vulnerability scanner (sarif report) + # uses: aquasecurity/trivy-action@master + # with: + # image-ref: localhost:5000/dockle-examine-image:test + # scan-type: 'image' + # format: 'sarif' + # exit-code: '0' + # ignore-unfixed: true + # vuln-type: 'os,library' + # severity: 'CRITICAL,HIGH' + # scanners: 'vuln,secret,config' + # output: 'trivy-results-os.sarif' + # env: + # TRIVY_NON_SSL: true + + # - name: Upload Trivy scan results to GitHub Security tab + # uses: github/codeql-action/upload-sarif@v3 + # with: + # sarif_file: 'trivy-results-os.sarif' - name: Push Service Image to repo # if: github.ref == 'refs/heads/main' || github.ref == 'refs/heads/master'