@@ -461,30 +461,29 @@ jobs:
461461 uses : github/codeql-action/upload-sarif@v1
462462 with :
463463 sarif_file : " trivy-image-results.sarif"
464-
464+ # NOTE@jsjoeio 5/10/2021
465+ # Disabling until fixed upstream
466+ # See: https://github.com/aquasecurity/trivy-action/issues/22#issuecomment-833768084
465467 # We have to use two trivy jobs
466468 # because GitHub only allows
467469 # codeql/upload-sarif action per job
468- trivy-scan-repo :
469- runs-on : ubuntu-20.04
470-
471- steps :
472- - name : Checkout code
473- uses : actions/checkout@v2
474-
475- - name : Run Trivy vulnerability scanner in repo mode
476- # Commit SHA for v0.0.14
477- uses : aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
478- with :
479- scan-type : " fs"
480- scan-ref : " ."
481- ignore-unfixed : true
482- format : " template"
483- template : " @/contrib/sarif.tpl"
484- output : " trivy-repo-results.sarif"
485- severity : " HIGH,CRITICAL"
486-
487- - name : Upload Trivy scan results to GitHub Security tab
488- uses : github/codeql-action/upload-sarif@v1
489- with :
490- sarif_file : " trivy-repo-results.sarif"
470+ # trivy-scan-repo:
471+ # runs-on: ubuntu-20.04
472+ # steps:
473+ # - name: Checkout code
474+ # uses: actions/checkout@v2
475+ # - name: Run Trivy vulnerability scanner in repo mode
476+ # Commit SHA for v0.0.14
477+ # uses: aquasecurity/trivy-action@341f810bd602419f966a081da3f4debedc3e5c8e
478+ # with:
479+ # scan-type: "fs"
480+ # scan-ref: "."
481+ # ignore-unfixed: true
482+ # format: "template"
483+ # template: "@/contrib/sarif.tpl"
484+ # output: "trivy-repo-results.sarif"
485+ # severity: "HIGH,CRITICAL"
486+ # - name: Upload Trivy scan results to GitHub Security tab
487+ # uses: github/codeql-action/upload-sarif@v1
488+ # with:
489+ # sarif_file: "trivy-repo-results.sarif"
0 commit comments