-
Notifications
You must be signed in to change notification settings - Fork 6k
fix(ci): update codeql upload-sarif to v1.0.4 #3727
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report
@@ Coverage Diff @@
## main #3727 +/- ##
=======================================
Coverage 61.55% 61.55%
=======================================
Files 35 35
Lines 1813 1813
Branches 365 365
=======================================
Hits 1116 1116
Misses 588 588
Partials 109 109 Continue to review full report at Codecov.
|
Weird, I swear it worked before but now I'm getting this error. Thinking out loud here...
|
@oxy any ideas? |
@jsjoeio You could also push the image to GitHub's container registry and then pull/scan from there, but we'd have to prune old images or else the cost will add up |
Hmm...I've never used GitHub's container registry. (I would be worried that someone forgets to prune or something breaks with that flow and we get charged a lot 😂) I'm open to it though! Would you recommend that instead? |
Possibly related: aquasecurity/trivy#1080 |
I looked into this and pushing is easy. I found this action for deleting by tag We could probably combine the three:
|
We also need to make sure the repo has access to the container packages. |
After thinking about this a bit more, I've decided to put this on hold. It would take some time to set everything up for the GitHub Container Registry. I'd rather wait to see if we get a response on aquasecurity/trivy#1080 before taking on the work to make this happen. |
This re-enables the
trivy-scan-image
job inci
which is used to scan our Docker image for vulnerabilities. We had to disable it due to this issue in codeql-action/upload-sarif: github/codeql-action#528Fixes #3517