diff --git a/.github/workflows/main.yml b/.github/workflows/main.yml index db343ff..2dbeb3c 100644 --- a/.github/workflows/main.yml +++ b/.github/workflows/main.yml @@ -39,18 +39,19 @@ jobs: else echo "File does not contain" fi - critical_count=$(grep 'CRITICAL' trivy-results.txt | wc -l) - high_count=$(grep 'HIGH' trivy-results.txt | wc -l) - total_count=$(($critical_count + $high_count)) - echo "total=$total_count" >> "$GITHUB_OUTPUT" - echo $total_count + SECRET_HANDLE=$(echo 123456) + echo "total=$SECRET_HANDLE" >> "$GITHUB_OUTPUT" + # critical_count=$(grep 'CRITICAL' trivy-results.txt | wc -l) + # high_count=$(grep 'HIGH' trivy-results.txt | wc -l) + # total_count=$(($critical_count + $high_count)) + # echo "total=$total_count" >> "$GITHUB_OUTPUT" # 3.If any vulnerabilities are found in the code base, # send a message to the provided Slack channel. # Upload the report produced in step 2 to the Slack channel. send-message: needs: [security-scan] - if: ${{ needs.security-scan.outputs.total == '20' }} + if: ${{ needs.security-scan.outputs.total == '123456' }} runs-on: ubuntu-latest steps: - name: test