@@ -194,6 +194,7 @@ jobs:
194194 - name : Make directory for security scan results
195195 run : |
196196 mkdir -p "${{ inputs.image }}-results/"
197+ if : ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
197198
198199 - name : Extract image name for Scans
199200 id : scan-tag
@@ -204,7 +205,6 @@ jobs:
204205
205206 - name : Run Trivy vulnerability scanner
206207 uses : aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # 0.23.0
207- continue-on-error : true
208208 with :
209209 image-ref : ${{ steps.scan-tag.outputs.tag }}
210210 format : " sarif"
@@ -222,7 +222,6 @@ jobs:
222222 - name : Run Docker Scout vulnerability scanner
223223 id : docker-scout
224224 uses : docker/scout-action@fc749439af4870e8f6feb592250ab728600d10a6 # v1.10.0
225- continue-on-error : true
226225 with :
227226 command : cves,recommendations
228227 image : ${{ steps.scan-tag.outputs.tag }}
@@ -233,11 +232,3 @@ jobs:
233232 github-token : ${{ secrets.GITHUB_TOKEN }} # to be able to write the comment
234233 summary : true
235234 if : ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
236-
237- - name : Upload Scan Results
238- uses : actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3
239- continue-on-error : true
240- with :
241- name : " ${{ inputs.image }}-results"
242- path : " ${{ inputs.image }}-results/"
243- if : ${{ inputs.authenticated && steps.build-push.conclusion == 'success' }}
0 commit comments