Skip to content

Commit ccd09ca

Browse files
authored
Merge pull request #50 from sir-gon/develop
[CONFIG] Docker: snyk disabled.
2 parents 4f736dc + 40b988f commit ccd09ca

File tree

1 file changed

+49
-46
lines changed

1 file changed

+49
-46
lines changed

.github/workflows/docker-image.yml

Lines changed: 49 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -121,53 +121,56 @@ jobs:
121121
run --rm ${{ env.IMAGE_NAME }}-test
122122
make test
123123
124-
security:
125-
name: "Snyk Container"
126-
runs-on: ubuntu-24.04
127-
needs: build
128-
permissions:
129-
actions: read
130-
contents: read
131-
security-events: write
132-
steps:
133-
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
134-
- name: Download artifact
135-
uses: actions/download-artifact@v4
136-
with:
137-
name: ${{ env.ARTIFACT_NAME }}_prod
138-
path: /tmp/
139-
140-
- name: Load image
141-
run: |
142-
docker load --input /tmp/${{ env.ARTIFACT_NAME }}_prod.tar
143-
docker image ls -a
124+
# yamllint disable rule:line-length
125+
# security:
126+
# name: "Snyk Container"
127+
# runs-on: ubuntu-24.04
128+
# needs: build
129+
# permissions:
130+
# actions: read
131+
# contents: read
132+
# security-events: write
133+
# steps:
134+
# - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
135+
# - name: Download artifact
136+
# uses: actions/download-artifact@v4
137+
# with:
138+
# name: ${{ env.ARTIFACT_NAME }}_prod
139+
# path: /tmp/
140+
141+
# - name: Load image
142+
# run: |
143+
# docker load --input /tmp/${{ env.ARTIFACT_NAME }}_prod.tar
144+
# docker image ls -a
145+
146+
# - name: Run Snyk to check Docker image for vulnerabilities
147+
# # Snyk can be used to break the build when it detects vulnerabilities.
148+
# # In this case we want to upload the issues to GitHub Code Scanning
149+
# continue-on-error: true
150+
# uses: snyk/actions/docker@master
151+
# env:
152+
# # yamllint disable rule:line-length
153+
# # In order to use the Snyk Action you will need to have a Snyk API token.
154+
# # See https://docs.snyk.io/integrations/ci-cd-integrations/github-actions-integration#getting-your-snyk-token
155+
# # or you can sign up for free at https://snyk.io/login
156+
# # yamllint enable rule:line-length
157+
# SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
158+
# with:
159+
# image: ${{ env.IMAGE_NAME }}:${{ github.sha }}
160+
# args: --file=Dockerfile
161+
# # yamllint disable rule:line-length
162+
# # https://github.com/github/codeql-action/issues/2187#issuecomment-2043220400
163+
# - name: Replace security-severity undefined for license-related findings
164+
# run: |
165+
# sed -i 's/"security-severity": "undefined"/"security-severity": "0"/g' snyk.sarif
166+
# sed -i 's/"security-severity": "null"/"security-severity": "0"/g' snyk.sarif
167+
# # yamllint enable rule:line-length
168+
# - name: Upload result to GitHub Code Scanning
169+
# uses: github/codeql-action/upload-sarif@v3
170+
# with:
171+
# sarif_file: 'snyk.sarif'
172+
# yamllint enable rule:line-length
144173

145-
- name: Run Snyk to check Docker image for vulnerabilities
146-
# Snyk can be used to break the build when it detects vulnerabilities.
147-
# In this case we want to upload the issues to GitHub Code Scanning
148-
continue-on-error: true
149-
uses: snyk/actions/docker@master
150-
env:
151-
# yamllint disable rule:line-length
152-
# In order to use the Snyk Action you will need to have a Snyk API token.
153-
# See https://docs.snyk.io/integrations/ci-cd-integrations/github-actions-integration#getting-your-snyk-token
154-
# or you can sign up for free at https://snyk.io/login
155-
# yamllint enable rule:line-length
156-
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
157-
with:
158-
image: ${{ env.IMAGE_NAME }}:${{ github.sha }}
159-
args: --file=Dockerfile
160-
# yamllint disable rule:line-length
161-
# https://github.com/github/codeql-action/issues/2187#issuecomment-2043220400
162-
- name: Replace security-severity undefined for license-related findings
163-
run: |
164-
sed -i 's/"security-severity": "undefined"/"security-severity": "0"/g' snyk.sarif
165-
sed -i 's/"security-severity": "null"/"security-severity": "0"/g' snyk.sarif
166-
# yamllint enable rule:line-length
167-
- name: Upload result to GitHub Code Scanning
168-
uses: github/codeql-action/upload-sarif@v3
169-
with:
170-
sarif_file: 'snyk.sarif'
171174
scan:
172175
name: "Trivy"
173176
runs-on: ubuntu-24.04

0 commit comments

Comments
 (0)