@@ -461,30 +461,29 @@ jobs:
461
461
uses : github/codeql-action/upload-sarif@v1
462
462
with :
463
463
sarif_file : " trivy-image-results.sarif"
464
-
464
+ # NOTE@jsjoeio 5/10/2021
465
+ # Disabling until fixed upstream
466
+ # See: https://github.com/aquasecurity/trivy-action/issues/22#issuecomment-833768084
465
467
# We have to use two trivy jobs
466
468
# because GitHub only allows
467
469
# codeql/upload-sarif action per job
468
- trivy-scan-repo :
469
- runs-on : ubuntu-20.04
470
-
471
- steps :
472
- - name : Checkout code
473
- uses : actions/checkout@v2
474
-
475
- - name : Run Trivy vulnerability scanner in repo mode
476
- # Commit SHA for v0.0.14
477
- uses : aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
478
- with :
479
- scan-type : " fs"
480
- scan-ref : " ."
481
- ignore-unfixed : true
482
- format : " template"
483
- template : " @/contrib/sarif.tpl"
484
- output : " trivy-repo-results.sarif"
485
- severity : " HIGH,CRITICAL"
486
-
487
- - name : Upload Trivy scan results to GitHub Security tab
488
- uses : github/codeql-action/upload-sarif@v1
489
- with :
490
- sarif_file : " trivy-repo-results.sarif"
470
+ # trivy-scan-repo:
471
+ # runs-on: ubuntu-20.04
472
+ # steps:
473
+ # - name: Checkout code
474
+ # uses: actions/checkout@v2
475
+ # - name: Run Trivy vulnerability scanner in repo mode
476
+ # Commit SHA for v0.0.14
477
+ # uses: aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
478
+ # with:
479
+ # scan-type: "fs"
480
+ # scan-ref: "."
481
+ # ignore-unfixed: true
482
+ # format: "template"
483
+ # template: "@/contrib/sarif.tpl"
484
+ # output: "trivy-repo-results.sarif"
485
+ # severity: "HIGH,CRITICAL"
486
+ # - name: Upload Trivy scan results to GitHub Security tab
487
+ # uses: github/codeql-action/upload-sarif@v1
488
+ # with:
489
+ # sarif_file: "trivy-repo-results.sarif"
0 commit comments