From 81ffe5662003eb85871a714c6a6461a99bdad48d Mon Sep 17 00:00:00 2001 From: Tommy Date: Fri, 21 Apr 2023 22:19:51 -0400 Subject: [PATCH] Remove trivvy scanning since environment is not supported --- .github/workflows/build.yml | 23 ----------------------- .github/workflows/scan.yml | 29 ----------------------------- README.md | 1 - 3 files changed, 53 deletions(-) delete mode 100644 .github/workflows/scan.yml diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml index 9ba663e..d305594 100644 --- a/.github/workflows/build.yml +++ b/.github/workflows/build.yml @@ -67,26 +67,3 @@ jobs: env: COSIGN_EXPERIMENTAL: "true" TAGS: ${{ steps.meta.outputs.tags }} - - scan: - name: Scan current image & report results - needs: build - runs-on: "ubuntu-latest" - steps: - - name: Checkout code - uses: actions/checkout@v2 - - - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@master - with: - image-ref: 'ghcr.io/tommytran732/synapse' - format: 'template' - template: '@/contrib/sarif.tpl' - output: 'trivy-results.sarif' - severity: 'CRITICAL,HIGH' - vuln-type: "os" - - - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v2 - with: - sarif_file: 'trivy-results.sarif' diff --git a/.github/workflows/scan.yml b/.github/workflows/scan.yml deleted file mode 100644 index face5b6..0000000 --- a/.github/workflows/scan.yml +++ /dev/null @@ -1,29 +0,0 @@ -name: Scan - -on: - schedule: - # Scan the image regularly (once a day) - - cron: '0 23 * * *' - -jobs: - scan: - name: Scan current image & report results - runs-on: "ubuntu-latest" - steps: - - name: Checkout code - uses: actions/checkout@v2 - - - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@master - with: - image-ref: 'ghcr.io/tommytran732/matrix.to' - format: 'template' - template: '@/contrib/sarif.tpl' - output: 'trivy-results.sarif' - severity: 'CRITICAL,HIGH' - vuln-type: "os" - - - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v2 - with: - sarif_file: 'trivy-results.sarif' \ No newline at end of file diff --git a/README.md b/README.md index 6b8e0dd..0b96544 100644 --- a/README.md +++ b/README.md @@ -9,4 +9,3 @@ This is my own Docker image building from [the official repository](https://gith - Don't trust random images: build yourself if you can. - Default Element instance is changed from [Element.io](https://app.element.io) to [ArcticFoxes.net](https://element.arcticfoxes.net) - The Dockerfile builds from the main branch, as releases do not come out frequently. -- Images from `ghcr.io` are built every week and scanned every day for critical vulnerabilities with Trivy. I recommend that you use these images.