@@ -198,36 +198,37 @@ jobs:
198
198
run : |
199
199
echo "${{ secrets.ROOT_CA_CERTIFICATE_BASE64 }}" | base64 -d > rootCA.crt
200
200
201
- - name : Build and push image to scan
202
- if : ${{ needs.needs-scan-for-vulnerabilities.outputs.skip == 'false' && inputs.scan_image_enabled && ( github.ref_type != 'tag' || steps.check-ref.outputs.has_alpha == 'false' ) }}
203
- uses : docker/build-push-action@v5
204
- with :
205
- # If your Dockerfile is not present in the root directory
206
- # change it to the correct subdirectory name
207
- context : ${{ inputs.docker_context }}
208
- file : ${{ inputs.docker_file }}
209
- target : ${{ inputs.docker_target }}
210
- push : true
211
- tags : ${{ inputs.image }}:scan-${{ github.sha }}-${{ github.run_id }}-${{ github.run_attempt }}
212
- labels : ${{ steps.meta.outputs.labels }}
213
- cache-from : ${{ steps.should-cache.outputs.cache-from }}
214
- cache-to : ${{ steps.should-cache.outputs.cache-to }}
215
- secrets : |
216
- "oban_key_fingerprint=${{ secrets.OBAN_KEY_FINGERPRINT }}"
217
- "oban_license_key=${{ secrets.OBAN_LICENSE_KEY }}"
218
- "IBM_CLOUD_API_KEY=${{ secrets.IBM_CLOUD_API_KEY }}"
219
- ${{ inputs.docker_secrets }}
220
- build-args : |-
221
- SN_GITHUB_NPM_TOKEN=${{ secrets.GHEC_NPM_REGISTRY_TOKEN }}
222
- SN_GITHUB_NPM_REGISTRY=https://npm.pkg.github.com
201
+ # TODO: Re enable when Twistlock is back up
202
+ # - name: Build and push image to scan
203
+ # if: ${{ needs.needs-scan-for-vulnerabilities.outputs.skip == 'false' && inputs.scan_image_enabled && ( github.ref_type != 'tag' || steps.check-ref.outputs.has_alpha == 'false' ) }}
204
+ # uses: docker/build-push-action@v5
205
+ # with:
206
+ # # If your Dockerfile is not present in the root directory
207
+ # # change it to the correct subdirectory name
208
+ # context: ${{ inputs.docker_context }}
209
+ # file: ${{ inputs.docker_file }}
210
+ # target: ${{ inputs.docker_target }}
211
+ # push: true
212
+ # tags: ${{ inputs.image }}:scan-${{ github.sha }}-${{ github.run_id }}-${{ github.run_attempt }}
213
+ # labels: ${{ steps.meta.outputs.labels }}
214
+ # cache-from: ${{ steps.should-cache.outputs.cache-from }}
215
+ # cache-to: ${{ steps.should-cache.outputs.cache-to }}
216
+ # secrets: |
217
+ # "oban_key_fingerprint=${{ secrets.OBAN_KEY_FINGERPRINT }}"
218
+ # "oban_license_key=${{ secrets.OBAN_LICENSE_KEY }}"
219
+ # "IBM_CLOUD_API_KEY=${{ secrets.IBM_CLOUD_API_KEY }}"
220
+ # ${{ inputs.docker_secrets }}
221
+ # build-args: |-
222
+ # SN_GITHUB_NPM_TOKEN=${{ secrets.GHEC_NPM_REGISTRY_TOKEN }}
223
+ # SN_GITHUB_NPM_REGISTRY=https://npm.pkg.github.com
223
224
224
- - name : Scan image
225
- if : ${{ needs.needs-scan-for-vulnerabilities.outputs.skip == 'false' && inputs.scan_image_enabled && ( github.ref_type != 'tag' || steps.check-ref.outputs.has_alpha == 'false' ) }}
226
- uses : ibm-skills-network/action-scan-container-image@main
227
- with :
228
- image : ${{ inputs.image }}:scan-${{ github.sha }}-${{ github.run_id }}-${{ github.run_attempt }}
229
- image_scan_cos_sps_toolchain_api_token : ${{ secrets.CONTAINER_IMAGE_SCAN_RESULT_COS_API_KEY }}
230
- fail_if_overdue : ${{ inputs.scan_fail_if_overdue }}
225
+ # - name: Scan image
226
+ # if: ${{ needs.needs-scan-for-vulnerabilities.outputs.skip == 'false' && inputs.scan_image_enabled && ( github.ref_type != 'tag' || steps.check-ref.outputs.has_alpha == 'false' ) }}
227
+ # uses: ibm-skills-network/action-scan-container-image@main
228
+ # with:
229
+ # image: ${{ inputs.image }}:scan-${{ github.sha }}-${{ github.run_id }}-${{ github.run_attempt }}
230
+ # image_scan_cos_sps_toolchain_api_token: ${{ secrets.CONTAINER_IMAGE_SCAN_RESULT_COS_API_KEY }}
231
+ # fail_if_overdue: ${{ inputs.scan_fail_if_overdue }}
231
232
232
233
- name : Check image exist on ICR
233
234
id : check-image
0 commit comments