Skip to content

Commit 510ff9c

Browse files
committed
fix(ci): disable trivy-scan-repo
1 parent 3df771f commit 510ff9c

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

.github/workflows/ci.yaml

+18-18
Original file line numberDiff line numberDiff line change
@@ -461,30 +461,30 @@ jobs:
461461
uses: github/codeql-action/upload-sarif@v1
462462
with:
463463
sarif_file: "trivy-image-results.sarif"
464-
465464
# We have to use two trivy jobs
466465
# because GitHub only allows
467466
# codeql/upload-sarif action per job
468467
trivy-scan-repo:
469468
runs-on: ubuntu-20.04
470-
469+
# NOTE@jsjoeio 5/10/2021
470+
# Disabling until fixed upstream
471+
# See: https://github.com/aquasecurity/trivy-action/issues/22#issuecomment-833768084
472+
if: "1 == 2"
471473
steps:
472474
- name: Checkout code
473475
uses: actions/checkout@v2
474-
475476
- name: Run Trivy vulnerability scanner in repo mode
476-
# Commit SHA for v0.0.14
477-
uses: aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
478-
with:
479-
scan-type: "fs"
480-
scan-ref: "."
481-
ignore-unfixed: true
482-
format: "template"
483-
template: "@/contrib/sarif.tpl"
484-
output: "trivy-repo-results.sarif"
485-
severity: "HIGH,CRITICAL"
486-
487-
- name: Upload Trivy scan results to GitHub Security tab
488-
uses: github/codeql-action/upload-sarif@v1
489-
with:
490-
sarif_file: "trivy-repo-results.sarif"
477+
Commit SHA for v0.0.14
478+
uses: aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
479+
with:
480+
scan-type: "fs"
481+
scan-ref: "."
482+
ignore-unfixed: true
483+
format: "template"
484+
template: "@/contrib/sarif.tpl"
485+
output: "trivy-repo-results.sarif"
486+
severity: "HIGH,CRITICAL"
487+
- name: Upload Trivy scan results to GitHub Security tab
488+
uses: github/codeql-action/upload-sarif@v1
489+
with:
490+
sarif_file: "trivy-repo-results.sarif"

0 commit comments

Comments
 (0)