From 83dfbb76149a0b5ab8bb991f7fc6b71a1eb7b9ca Mon Sep 17 00:00:00 2001 From: Maksim Nabokikh Date: Sun, 15 Feb 2026 22:36:57 +0100 Subject: [PATCH] Debug trivy scans Signed-off-by: Maksim Nabokikh --- .github/workflows/artifacts.yaml | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/.github/workflows/artifacts.yaml b/.github/workflows/artifacts.yaml index df8a6bfe..e4e511c9 100644 --- a/.github/workflows/artifacts.yaml +++ b/.github/workflows/artifacts.yaml @@ -204,6 +204,11 @@ jobs: key: trivy-cache-${{ steps.date.outputs.date }} restore-keys: trivy-cache- + - name: Debug - list extracted files + run: | + ls -la image/ + find image -type f | head -20 + - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0 with: @@ -214,9 +219,9 @@ jobs: scan-ref: "." cache-dir: "./cache" # Disable skipping trivy cache for now - # env: - # TRIVY_SKIP_DB_UPDATE: true - # TRIVY_SKIP_JAVA_DB_UPDATE: true + env: + TRIVY_SKIP_DB_UPDATE: true + TRIVY_SKIP_JAVA_DB_UPDATE: true ## Trivy-db uses `0600` permissions. ## But `action/cache` use `runner` user by default