@@ -128,40 +128,40 @@ jobs:
128128 load : true
129129 tags : ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:scan
130130
131- - name : Run Trivy vulnerability scanner (json output)
132- uses : aquasecurity/trivy-action@v0.35.0
133- with :
134- image-ref : ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:scan
135- format : json
136- output : trivy-results.json
137- scanners : vuln
138-
139- - name : Upload Trivy scan results to Security Agent
140- if : always()
141- uses : hasura/security-agent-tools/upload-file@v1
142- with :
143- file_path : trivy-results.json
144- security_agent_api_key : ${{ secrets.SECURITY_AGENT_API_KEY }}
145- tags : |
146- service=ndc-nodejs-lambda
147- source_code_path=.
148- docker_file_path=Dockerfile
149- scanner=trivy
150- image_name=${{ steps.docker-metadata.outputs.tags }}
151- product_domain=hasura-ddn-data-plane
152- team=engine
153-
154- - name : Fail build on High/Critical Vulnerabilities
155- uses : aquasecurity/trivy-action@v0.35.0
156- with :
157- skip-setup-trivy : true
158- image-ref : ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:scan
159- format : table
160- severity : CRITICAL,HIGH
161- scanners : vuln
162- ignore-unfixed : true
163- exit-code : 1
164-
131+ # - name: Run Trivy vulnerability scanner (json output)
132+ # uses: aquasecurity/trivy-action@v0.35.0
133+ # with:
134+ # image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:scan
135+ # format: json
136+ # output: trivy-results.json
137+ # scanners: vuln
138+ #
139+ # - name: Upload Trivy scan results to Security Agent
140+ # if: always()
141+ # uses: hasura/security-agent-tools/upload-file@v1
142+ # with:
143+ # file_path: trivy-results.json
144+ # security_agent_api_key: ${{ secrets.SECURITY_AGENT_API_KEY }}
145+ # tags: |
146+ # service=ndc-nodejs-lambda
147+ # source_code_path=.
148+ # docker_file_path=Dockerfile
149+ # scanner=trivy
150+ # image_name=${{ steps.docker-metadata.outputs.tags }}
151+ # product_domain=hasura-ddn-data-plane
152+ # team=engine
153+ #
154+ # - name: Fail build on High/Critical Vulnerabilities
155+ # uses: aquasecurity/trivy-action@v0.35.0
156+ # with:
157+ # skip-setup-trivy: true
158+ # image-ref: ${{ env.DOCKER_REGISTRY }}/${{ env.DOCKER_IMAGE_NAME }}:scan
159+ # format: table
160+ # severity: CRITICAL,HIGH
161+ # scanners: vuln
162+ # ignore-unfixed: true
163+ # exit-code: 1
164+ #
165165 - name : Push docker image
166166 uses : docker/build-push-action@v6
167167 if : ${{ startsWith(github.ref, 'refs/tags/v') }}
0 commit comments