From a9fb4ae7efeeefc710766c0fda077ead65047c9b Mon Sep 17 00:00:00 2001 From: Mark Sagi-Kazar Date: Fri, 22 Apr 2022 14:21:28 +0200 Subject: [PATCH] revert: move container scan back to the container build step Signed-off-by: Mark Sagi-Kazar --- .github/workflows/artifacts.yaml | 28 ++-------------------------- 1 file changed, 2 insertions(+), 26 deletions(-) diff --git a/.github/workflows/artifacts.yaml b/.github/workflows/artifacts.yaml index 9eafb324..09662c62 100644 --- a/.github/workflows/artifacts.yaml +++ b/.github/workflows/artifacts.yaml @@ -17,8 +17,6 @@ jobs: variant: - alpine - distroless - outputs: - version: ${{ steps.details.outputs.version }} steps: - name: Checkout @@ -103,38 +101,16 @@ jobs: org.opencontainers.image.licenses=${{ github.event.repository.license.spdx_id }} org.opencontainers.image.documentation=https://dexidp.io/docs/ - container-scan: - name: Container scan - runs-on: ubuntu-latest - needs: container-images - if: github.event_name == 'push' - strategy: - matrix: - variant: - - alpine - - distroless - - steps: - # Workaround for lack of matrix output support - - name: Calculate container image details - id: details - run: | - VERSION="${{ needs.container-images.outputs.version }}" - - if [[ "${{ matrix.variant }}" != "alpine" ]]; then - VERSION="${VERSION}-${{ matrix.variant }}" - fi - - echo ::set-output name=version::${VERSION} - - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@0.2.5 with: image-ref: "ghcr.io/dexidp/dex:${{ steps.details.outputs.version }}" format: "sarif" output: "trivy-results.sarif" + if: github.event_name == 'push' - name: Upload Trivy scan results to GitHub Security tab uses: github/codeql-action/upload-sarif@v1 with: sarif_file: "trivy-results.sarif" + if: github.event_name == 'push'