From fde51391920aa269891b9de0cf7e4ea7773c4e17 Mon Sep 17 00:00:00 2001 From: Surya Sameer Datta Vaddadi Date: Thu, 26 Mar 2026 03:25:25 +0530 Subject: [PATCH] Remove trivy - model-regitsry Signed-off-by: Surya Sameer Datta Vaddadi --- .github/workflows/trivy-image-scanning.yaml | 51 --------------------- 1 file changed, 51 deletions(-) delete mode 100644 .github/workflows/trivy-image-scanning.yaml diff --git a/.github/workflows/trivy-image-scanning.yaml b/.github/workflows/trivy-image-scanning.yaml deleted file mode 100644 index c794e717d9..0000000000 --- a/.github/workflows/trivy-image-scanning.yaml +++ /dev/null @@ -1,51 +0,0 @@ -name: Trivy image scanning -on: - workflow_dispatch: - schedule: - - cron: '0 0 * * 1' # Every Monday at 00:00 - -permissions: # set contents: read at top-level, per OpenSSF ScoreCard rule TokenPermissionsID - contents: read - -jobs: - image-scanning: - runs-on: ubuntu-latest - permissions: - contents: read - security-events: write - strategy: - matrix: - IMAGE: [ - 'ghcr.io/kubeflow/model-registry/server:latest', - 'ghcr.io/kubeflow/model-registry/ui:latest', - 'ghcr.io/kubeflow/model-registry/job/async-upload:latest', - 'ghcr.io/kubeflow/model-registry/storage-initializer:latest', - 'ghcr.io/kubeflow/model-registry/ui-standalone:latest' - ] - steps: - - name: Checkout code - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6 - - - name: Sanitize image name for SARIF filename - run: | - # Replace special characters with hyphens and convert to lowercase - SANITIZED_NAME=$(echo "${{ matrix.IMAGE }}" | sed 's/[^a-zA-Z0-9._-]/-/g' | tr '[:upper:]' '[:lower:]') - echo "SANITIZED_IMAGE_NAME=${SANITIZED_NAME}" >> $GITHUB_ENV - echo "Sanitized image name: ${SANITIZED_NAME}" - - - name: trivy scan for github security tab - uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 - with: - image-ref: '${{ matrix.IMAGE }}' - format: 'sarif' - ignore-unfixed: true - vuln-type: 'os,library' - severity: 'CRITICAL,HIGH' - output: 'trivy-results-${{ env.SANITIZED_IMAGE_NAME }}.sarif' - timeout: 30m0s - - - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@05b1a5d28f8763fd11e77388fe57846f1ba8e766 # v4 - if: always() - with: - sarif_file: 'trivy-results-${{ env.SANITIZED_IMAGE_NAME }}.sarif'