@@ -461,30 +461,30 @@ jobs:
461
461
uses : github/codeql-action/upload-sarif@v1
462
462
with :
463
463
sarif_file : " trivy-image-results.sarif"
464
-
465
464
# We have to use two trivy jobs
466
465
# because GitHub only allows
467
466
# codeql/upload-sarif action per job
468
467
trivy-scan-repo :
469
468
runs-on : ubuntu-20.04
470
-
469
+ # NOTE@jsjoeio 5/10/2021
470
+ # Disabling until fixed upstream
471
+ # See: https://github.com/aquasecurity/trivy-action/issues/22#issuecomment-833768084
472
+ if : " 1 == 2"
471
473
steps :
472
474
- name : Checkout code
473
475
uses : actions/checkout@v2
474
-
475
476
- name : Run Trivy vulnerability scanner in repo mode
476
- # Commit SHA for v0.0.14
477
- uses : aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
478
- with :
479
- scan-type : " fs"
480
- scan-ref : " ."
481
- ignore-unfixed : true
482
- format : " template"
483
- template : " @/contrib/sarif.tpl"
484
- output : " trivy-repo-results.sarif"
485
- severity : " HIGH,CRITICAL"
486
-
487
- - name : Upload Trivy scan results to GitHub Security tab
488
- uses : github/codeql-action/upload-sarif@v1
489
- with :
490
- sarif_file : " trivy-repo-results.sarif"
477
+ Commit SHA for v0.0.14
478
+ uses : aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
479
+ with :
480
+ scan-type : " fs"
481
+ scan-ref : " ."
482
+ ignore-unfixed : true
483
+ format : " template"
484
+ template : " @/contrib/sarif.tpl"
485
+ output : " trivy-repo-results.sarif"
486
+ severity : " HIGH,CRITICAL"
487
+ - name : Upload Trivy scan results to GitHub Security tab
488
+ uses : github/codeql-action/upload-sarif@v1
489
+ with :
490
+ sarif_file : " trivy-repo-results.sarif"
0 commit comments