Skip to content

Commit b34c53e

Browse files
authored
chore: remove Trivy scan (#422)
Removing the Trivy vulnerability scanner from the security-scans action. Related to cloudnative-pg/cloudnative-pg#10343 Signed-off-by: Niccolò Fei <niccolo.fei@enterprisedb.com>
1 parent b5e2403 commit b34c53e

File tree

2 files changed

+0
-30
lines changed

2 files changed

+0
-30
lines changed

.github/actions/security-scans/README.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,6 @@ permissions:
2828
- Detects vulnerabilities in OS packages, libraries, and dependencies.
2929
- Generates a `snyk.sarif` that gets uploaded to GitHub Code Scanning
3030

31-
- [Trivy](https://github.com/aquasecurity/trivy-action):
32-
- Detects vulnerabilities in OS packages, misconfigurations, sensitive information, licenses etc.
33-
- Generates a `trivy-results.sarif` that gets uploaded to GitHub Code Scanning
34-
3531
---
3632

3733
## Inputs
@@ -48,9 +44,6 @@ Note:
4844
- If a `snyk_token` is not provided, Snyk scans won't be performed.
4945
- The `dockerfile` path is currently only required by Snyk.
5046

51-
Important:
52-
- The action will fail if none of the vulnerability scanners is able to generate a Sarif output.
53-
5447
---
5548

5649
## Usage

.github/actions/security-scans/action.yml

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -62,26 +62,3 @@ runs:
6262
if: ${{ hashFiles('snyk.sarif') != '' }}
6363
with:
6464
sarif_file: snyk.sarif
65-
66-
- name: Run Trivy vulnerability scanner
67-
uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2
68-
id: trivy
69-
continue-on-error: true
70-
with:
71-
version: 'latest'
72-
image-ref: '${{ inputs.image }}'
73-
format: 'sarif'
74-
output: 'trivy-results.sarif'
75-
76-
- name: Upload Trivy scan results to GitHub Security tab
77-
uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4
78-
if: ${{ hashFiles('trivy-results.sarif') != '' }}
79-
with:
80-
sarif_file: 'trivy-results.sarif'
81-
82-
- name: Review Security checks
83-
if: ${{ hashFiles('snyk.sarif') == '' && hashFiles('trivy-results.sarif') == '' }}
84-
shell: bash
85-
run: |
86-
echo "None of the security checks produced results (Snyk and Trivy)"
87-
exit 1

0 commit comments

Comments
 (0)