diff --git a/.github/workflows/build-plus.yml b/.github/workflows/build-plus.yml index 3176d0240d..ecd60fc951 100644 --- a/.github/workflows/build-plus.yml +++ b/.github/workflows/build-plus.yml @@ -117,6 +117,7 @@ jobs: secrets: | "nginx-repo.crt=${{ inputs.nap_modules != '' && secrets.NGINX_AP_CRT || secrets.NGINX_CRT }}" "nginx-repo.key=${{ inputs.nap_modules != '' && secrets.NGINX_AP_KEY || secrets.NGINX_KEY }}" + ${{ inputs.nap_modules != '' && contains(inputs.image, 'ubi') && format('"rhel_license={0}"', secrets.RHEL_LICENSE) || '' }} - name: Load image for Trivy uses: docker/build-push-action@v3 @@ -136,6 +137,7 @@ jobs: secrets: | "nginx-repo.crt=${{ inputs.nap_modules != '' && secrets.NGINX_AP_CRT || secrets.NGINX_CRT }}" "nginx-repo.key=${{ inputs.nap_modules != '' && secrets.NGINX_AP_KEY || secrets.NGINX_KEY }}" + ${{ inputs.nap_modules != '' && contains(inputs.image, 'ubi') && format('"rhel_license={0}"', secrets.RHEL_LICENSE) || '' }} - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@0.8.0 diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 8fd41fadb0..a1486a0d42 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -378,7 +378,7 @@ jobs: strategy: fail-fast: false matrix: - image: [debian-plus-nap] + image: [debian-plus-nap, ubi-plus-nap] platforms: ["linux/amd64"] target: [goreleaser, aws] nap_modules: [dos, waf, "waf,dos"]