From 9293af852cd71d32d45da834b6208cfbce6cc7cb Mon Sep 17 00:00:00 2001 From: zepatrik Date: Fri, 2 Aug 2024 15:30:05 +0200 Subject: [PATCH 1/2] ci: disable faulty scanner --- .github/workflows/cve-scan.yaml | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/.github/workflows/cve-scan.yaml b/.github/workflows/cve-scan.yaml index 0e938f43e..2f8643bff 100644 --- a/.github/workflows/cve-scan.yaml +++ b/.github/workflows/cve-scan.yaml @@ -49,15 +49,15 @@ jobs: uses: github/codeql-action/upload-sarif@v2 with: sarif_file: ${{ steps.grype-scan.outputs.sarif }} - - name: Kubescape scanner - uses: kubescape/github-action@main - id: kubescape - with: - image: oryd/keto:${{ env.SHA_SHORT }} - verbose: true - format: pretty-printer - # can't whitelist CVE yet: https://github.com/kubescape/kubescape/pull/1568 - severityThreshold: critical +# - name: Kubescape scanner +# uses: kubescape/github-action@main +# id: kubescape +# with: +# image: oryd/keto:${{ env.SHA_SHORT }} +# verbose: true +# format: pretty-printer +# # can't whitelist CVE yet: https://github.com/kubescape/kubescape/pull/1568 +# severityThreshold: critical - name: Trivy Scanner uses: aquasecurity/trivy-action@master if: ${{ always() }} From d7a2d4d9185da13f6b3eaff23a1f98293cbd9db3 Mon Sep 17 00:00:00 2001 From: zepatrik Date: Fri, 2 Aug 2024 15:35:23 +0200 Subject: [PATCH 2/2] chore: format --- .github/workflows/cve-scan.yaml | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/.github/workflows/cve-scan.yaml b/.github/workflows/cve-scan.yaml index 2f8643bff..ea1fe8df7 100644 --- a/.github/workflows/cve-scan.yaml +++ b/.github/workflows/cve-scan.yaml @@ -49,15 +49,15 @@ jobs: uses: github/codeql-action/upload-sarif@v2 with: sarif_file: ${{ steps.grype-scan.outputs.sarif }} -# - name: Kubescape scanner -# uses: kubescape/github-action@main -# id: kubescape -# with: -# image: oryd/keto:${{ env.SHA_SHORT }} -# verbose: true -# format: pretty-printer -# # can't whitelist CVE yet: https://github.com/kubescape/kubescape/pull/1568 -# severityThreshold: critical + # - name: Kubescape scanner + # uses: kubescape/github-action@main + # id: kubescape + # with: + # image: oryd/keto:${{ env.SHA_SHORT }} + # verbose: true + # format: pretty-printer + # # can't whitelist CVE yet: https://github.com/kubescape/kubescape/pull/1568 + # severityThreshold: critical - name: Trivy Scanner uses: aquasecurity/trivy-action@master if: ${{ always() }}