Skip to content

Commit

Permalink
EVEREST-107 remove trivy (#835)
Browse files Browse the repository at this point in the history
  • Loading branch information
oksana-grishchenko authored Nov 14, 2024
1 parent aa33dcc commit 32c9a64
Show file tree
Hide file tree
Showing 3 changed files with 0 additions and 79 deletions.
7 changes: 0 additions & 7 deletions .github/workflows/dev-be-ci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -375,13 +375,6 @@ jobs:
kubectl -n everest describe pods
kubectl -n everest-system logs deploy/percona-everest
# commenting bc it's failing to download the image bc of too many requests too often
# - name: Everest - run Trivy vulnerability scanner
# uses: aquasecurity/[email protected]
# with:
# image-ref: "localhost:5000/perconalab/everest:0.0.0"
# format: 'table'
# severity: 'CRITICAL,HIGH'
Expand Down
18 changes: 0 additions & 18 deletions .github/workflows/dev-build.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -64,21 +64,3 @@ jobs:
push: true
tags: ${{ steps.meta.outputs.tags }}

- name: Run Trivy vulnerability scanner
uses: aquasecurity/[email protected]
with:
image-ref: "perconalab/everest:0.0.0"
format: "table"
exit-code: "1"
severity: "CRITICAL,HIGH"
scan:
runs-on: ubuntu-latest
needs: [build]
steps:
- name: Run Trivy vulnerability scanner
uses: aquasecurity/[email protected]
with:
image-ref: "docker.io/perconalab/everest:0.0.0"
format: "table"
exit-code: "1"
severity: "CRITICAL,HIGH"
54 changes: 0 additions & 54 deletions .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -168,19 +168,6 @@ jobs:
push: false
tags: ${{ steps.operator_meta.outputs.tags }}

- name: Operator - set everest-operator image to scan
id: set_operator_image
run: |
# taking the first tag to check with trivy. Since the build is the same, no need to check the rest of them
echo "::set-output name=image_to_check::$(echo "${{ steps.operator_meta.outputs.tags }}" | head -n 1)"
- name: Operator - run Trivy vulnerability scanner
uses: aquasecurity/[email protected]
with:
image-ref: ${{ steps.set_operator_image.outputs.image_to_check }}
format: "table"
exit-code: "1"
severity: "CRITICAL,HIGH"

- name: Operator - push everest-operator image
uses: docker/build-push-action@v6
Expand All @@ -197,19 +184,6 @@ jobs:
tags: ${{ steps.bundle_meta.outputs.tags }}
file: everest-operator/bundle.Dockerfile

- name: Operator - set everest-operator-bundle image to scan
id: set_operator_bundle_image
run: |
# taking the first tag to check with trivy. Since the build is the same, no need to check the rest of them
echo "::set-output name=image_to_check::$(echo "${{ steps.bundle_meta.outputs.tags }}" | head -n 1)"
- name: Operator - Run Trivy vulnerability scanner
uses: aquasecurity/[email protected]
with:
image-ref: ${{ steps.set_operator_bundle_image.outputs.image_to_check }}
format: "table"
exit-code: "1"
severity: "CRITICAL,HIGH"

- name: Operator - push everest-operator-bundle image
uses: docker/build-push-action@v6
Expand Down Expand Up @@ -306,20 +280,6 @@ jobs:
tags: ${{ steps.catalog_meta.outputs.tags }}
file: everest-catalog/everest-catalog.Dockerfile

- name: Catalog - set catalog image to scan
id: set_catalog_image
run: |
# taking the first tag to check with trivy. Since the build is the same, no need to check the rest of them
echo "::set-output name=image_to_check::$(echo "${{ steps.catalog_meta.outputs.tags }}" | head -n 1)"
# TODO: fix the vulnerabilities in main and enable this check
# - name: Catalog - run Trivy vulnerability scanner
# uses: aquasecurity/[email protected]
# with:
# image-ref: ${{ steps.set_catalog_image.outputs.image_to_check }}
# format: 'table'
# exit-code: '1'
# severity: 'CRITICAL,HIGH'

- name: Catalog - push image
uses: docker/build-push-action@v6
Expand Down Expand Up @@ -435,20 +395,6 @@ jobs:
push: false
tags: ${{ steps.everest_meta.outputs.tags }}

- name: Everest - set everest image to scan
id: set_everest_image
run: |
# taking the first tag to check with trivy. Since the build is the same, no need to check the rest of them
echo "::set-output name=image_to_check::$(echo "${{ steps.everest_meta.outputs.tags }}" | head -n 1)"
# TODO: fix the vulnerabilities in main and enable this check
# - name: Everest - run Trivy vulnerability scanner
# uses: aquasecurity/[email protected]
# with:
# image-ref: ${{ steps.set_everest_image.outputs.image_to_check }}
# format: 'table'
# exit-code: '1'
# severity: 'CRITICAL,HIGH'

- name: Everest - push Everest image
uses: docker/build-push-action@v6
Expand Down

0 comments on commit 32c9a64

Please sign in to comment.