@@ -82,37 +82,37 @@ jobs:
8282 run : |
8383 curl -o wpm.zip ${{ secrets.WPM_DOWNLOAD_URI }} && unzip wpm.zip
8484
85- # Build and push Docker image with Buildx
86- # https://github.com/docker/build-push-action
87- - name : Build and push Docker image
88- id : build-before-sec-scans
89- uses : docker/build-push-action@v6
90- with :
91- context : .
92- file : Dockerfile
93- platforms : linux/amd64
94- build-args : |
95- BASE_IMAGE=${{ env.WEBMETHODS_BASE_REGISTRY }}/${{ env.WEBMETHODS_BASE_REPOSITORY }}:${{ env.WEBMETHODS_BASE_TAG }}
96- WPM_TOKEN=${{ secrets.WPM_TOKEN }}
97- WPM_PACKAGES=${{ env.WPM_PACKAGES }}
98- load : true
99- tags : ${{ steps.meta.outputs.tags }}
100- labels : ${{ steps.meta.outputs.labels }}
101-
102- - name : Run Trivy vulnerability scanner HTML
103- continue-on-error : true
104- uses : aquasecurity/trivy-action@0.30.0
105- with :
106- image-ref : ${{ steps.build-before-sec-scans.outputs.digest }}
107- # For now, always succeed when vulns are detected.
108- # Later, we can flip this to '1' to fail builds.
109- exit-code : ' 0'
110- ignore-unfixed : true
111- vuln-type : ' os,library'
112- severity : ' CRITICAL,HIGH,MEDIUM'
113- format : template
114- template : " @$HOME/.local/bin/trivy-bin/contrib/html.tpl"
115- output : trivy-${{ github.workflow }}.html
85+ # # Build image for scanning
86+ # # https://github.com/docker/build-push-action
87+ # - name: Build and push Docker image
88+ # id: build-before-sec-scans
89+ # uses: docker/build-push-action@v6
90+ # with:
91+ # context: .
92+ # file: Dockerfile
93+ # platforms: linux/amd64
94+ # build-args: |
95+ # BASE_IMAGE=${{ env.WEBMETHODS_BASE_REGISTRY }}/${{ env.WEBMETHODS_BASE_REPOSITORY }}:${{ env.WEBMETHODS_BASE_TAG }}
96+ # WPM_TOKEN=${{ secrets.WPM_TOKEN }}
97+ # WPM_PACKAGES=${{ env.WPM_PACKAGES }}
98+ # load: true
99+ # tags: ${{ steps.meta.outputs.tags }}
100+ # labels: ${{ steps.meta.outputs.labels }}
101+
102+ # - name: Run Trivy vulnerability scanner HTML
103+ # continue-on-error: true
104+ # uses: aquasecurity/trivy-action@0.30.0
105+ # with:
106+ # image-ref: ${{ steps.build-before-sec-scans.outputs.digest }}
107+ # # For now, always succeed when vulns are detected.
108+ # # Later, we can flip this to '1' to fail builds.
109+ # exit-code: '0'
110+ # ignore-unfixed: true
111+ # vuln-type: 'os,library'
112+ # severity: 'CRITICAL,HIGH,MEDIUM'
113+ # format: template
114+ # template: "@$HOME/.local/bin/trivy-bin/contrib/html.tpl"
115+ # output: trivy-${{ github.workflow }}.html
116116
117117 - name : Build and push Docker image
118118 id : build-and-push-after-sec-scans
@@ -130,14 +130,14 @@ jobs:
130130 labels : ${{ steps.meta.outputs.labels }}
131131
132132
133- - name : Simple digest descriptor
134- run : echo "Container Digest=${{ steps.build-and-push-after-sec-scans.outputs.digest }}" > digest-${{ github.workflow }}.txt
133+ # - name: Simple digest descriptor
134+ # run: echo "Container Digest=${{ steps.build-and-push-after-sec-scans.outputs.digest }}" > digest-${{ github.workflow }}.txt
135135
136- - name : Create Release
137- if : ${{ startsWith(github.ref, 'refs/tags/') }}
138- uses : softprops/action-gh-release@v2
139- with :
140- files : |
141- digest-${{ github.workflow }}.txt
142- trivy-${{ github.workflow }}.html
136+ # - name: Create Release
137+ # if: ${{ startsWith(github.ref, 'refs/tags/') }}
138+ # uses: softprops/action-gh-release@v2
139+ # with:
140+ # files: |
141+ # digest-${{ github.workflow }}.txt
142+ # trivy-${{ github.workflow }}.html
143143
0 commit comments