Skip to content

Commit ca371e6

Browse files
update ci
1 parent f7eb252 commit ca371e6

File tree

1 file changed

+40
-40
lines changed

1 file changed

+40
-40
lines changed

.github/workflows/ci.yml

Lines changed: 40 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -82,37 +82,37 @@ jobs:
8282
run: |
8383
curl -o wpm.zip ${{ secrets.WPM_DOWNLOAD_URI }} && unzip wpm.zip
8484
85-
# Build and push Docker image with Buildx
86-
# https://github.com/docker/build-push-action
87-
- name: Build and push Docker image
88-
id: build-before-sec-scans
89-
uses: docker/build-push-action@v6
90-
with:
91-
context: .
92-
file: Dockerfile
93-
platforms: linux/amd64
94-
build-args: |
95-
BASE_IMAGE=${{ env.WEBMETHODS_BASE_REGISTRY }}/${{ env.WEBMETHODS_BASE_REPOSITORY }}:${{ env.WEBMETHODS_BASE_TAG }}
96-
WPM_TOKEN=${{ secrets.WPM_TOKEN }}
97-
WPM_PACKAGES=${{ env.WPM_PACKAGES }}
98-
load: true
99-
tags: ${{ steps.meta.outputs.tags }}
100-
labels: ${{ steps.meta.outputs.labels }}
101-
102-
- name: Run Trivy vulnerability scanner HTML
103-
continue-on-error: true
104-
uses: aquasecurity/trivy-action@0.30.0
105-
with:
106-
image-ref: ${{ steps.build-before-sec-scans.outputs.digest }}
107-
# For now, always succeed when vulns are detected.
108-
# Later, we can flip this to '1' to fail builds.
109-
exit-code: '0'
110-
ignore-unfixed: true
111-
vuln-type: 'os,library'
112-
severity: 'CRITICAL,HIGH,MEDIUM'
113-
format: template
114-
template: "@$HOME/.local/bin/trivy-bin/contrib/html.tpl"
115-
output: trivy-${{ github.workflow }}.html
85+
# # Build image for scanning
86+
# # https://github.com/docker/build-push-action
87+
# - name: Build and push Docker image
88+
# id: build-before-sec-scans
89+
# uses: docker/build-push-action@v6
90+
# with:
91+
# context: .
92+
# file: Dockerfile
93+
# platforms: linux/amd64
94+
# build-args: |
95+
# BASE_IMAGE=${{ env.WEBMETHODS_BASE_REGISTRY }}/${{ env.WEBMETHODS_BASE_REPOSITORY }}:${{ env.WEBMETHODS_BASE_TAG }}
96+
# WPM_TOKEN=${{ secrets.WPM_TOKEN }}
97+
# WPM_PACKAGES=${{ env.WPM_PACKAGES }}
98+
# load: true
99+
# tags: ${{ steps.meta.outputs.tags }}
100+
# labels: ${{ steps.meta.outputs.labels }}
101+
102+
# - name: Run Trivy vulnerability scanner HTML
103+
# continue-on-error: true
104+
# uses: aquasecurity/trivy-action@0.30.0
105+
# with:
106+
# image-ref: ${{ steps.build-before-sec-scans.outputs.digest }}
107+
# # For now, always succeed when vulns are detected.
108+
# # Later, we can flip this to '1' to fail builds.
109+
# exit-code: '0'
110+
# ignore-unfixed: true
111+
# vuln-type: 'os,library'
112+
# severity: 'CRITICAL,HIGH,MEDIUM'
113+
# format: template
114+
# template: "@$HOME/.local/bin/trivy-bin/contrib/html.tpl"
115+
# output: trivy-${{ github.workflow }}.html
116116

117117
- name: Build and push Docker image
118118
id: build-and-push-after-sec-scans
@@ -130,14 +130,14 @@ jobs:
130130
labels: ${{ steps.meta.outputs.labels }}
131131

132132

133-
- name: Simple digest descriptor
134-
run: echo "Container Digest=${{ steps.build-and-push-after-sec-scans.outputs.digest }}" > digest-${{ github.workflow }}.txt
133+
# - name: Simple digest descriptor
134+
# run: echo "Container Digest=${{ steps.build-and-push-after-sec-scans.outputs.digest }}" > digest-${{ github.workflow }}.txt
135135

136-
- name: Create Release
137-
if: ${{ startsWith(github.ref, 'refs/tags/') }}
138-
uses: softprops/action-gh-release@v2
139-
with:
140-
files: |
141-
digest-${{ github.workflow }}.txt
142-
trivy-${{ github.workflow }}.html
136+
# - name: Create Release
137+
# if: ${{ startsWith(github.ref, 'refs/tags/') }}
138+
# uses: softprops/action-gh-release@v2
139+
# with:
140+
# files: |
141+
# digest-${{ github.workflow }}.txt
142+
# trivy-${{ github.workflow }}.html
143143

0 commit comments

Comments
 (0)