Skip to content

Commit

Permalink
chore: remove trivy scans due to aquasecurity/trivy-action#408
Browse files Browse the repository at this point in the history
  • Loading branch information
DarkAtra committed Jan 22, 2025
1 parent 5efec21 commit e3ee3b4
Show file tree
Hide file tree
Showing 2 changed files with 0 additions and 62 deletions.
18 changes: 0 additions & 18 deletions .github/workflows/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,6 @@ permissions:
pull-requests: write
# used to publish the docker image
packages: write
# used by trivy
security-events: write

jobs:
verify:
Expand Down Expand Up @@ -88,19 +86,3 @@ jobs:
@semantic-release/exec
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

- name: Get Image Name
id: get-image-name
run: echo "image-name=$(mvn help:evaluate -Dexpression=image.name -q -DforceStdout)" >> $GITHUB_OUTPUT

- name: Scan Docker Image for Vulnerabilities
uses: aquasecurity/trivy-action@0.29.0
with:
image-ref: ${{ steps.get-image-name.outputs.image-name }}
format: sarif
output: trivy-results.sarif

- name: Upload Trivy Results to GitHub Security Tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: trivy-results.sarif
44 changes: 0 additions & 44 deletions .github/workflows/scan-docker-image.yml

This file was deleted.

0 comments on commit e3ee3b4

Please sign in to comment.