From 257308b89bddbab5f9e342034a6cd96beb209c77 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Oct 2024 22:22:12 +0000 Subject: [PATCH] chore(deps-dev): update aquasecurity/trivy-action action to v0.26.0 --- .github/workflows/pr-trivy.yaml | 2 +- .github/workflows/report-on-vulnerabilities.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/pr-trivy.yaml b/.github/workflows/pr-trivy.yaml index 0dd92ce5..974be519 100644 --- a/.github/workflows/pr-trivy.yaml +++ b/.github/workflows/pr-trivy.yaml @@ -13,7 +13,7 @@ jobs: egress-policy: audit - name: Trivy fs scan - uses: aquasecurity/trivy-action@f781cce5aab226378ee181d764ab90ea0be3cdd8 # 0.25.0 + uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb # 0.26.0 with: scan-type: 'fs' ignore-unfixed: true diff --git a/.github/workflows/report-on-vulnerabilities.yaml b/.github/workflows/report-on-vulnerabilities.yaml index 9def5e05..4a6c7394 100644 --- a/.github/workflows/report-on-vulnerabilities.yaml +++ b/.github/workflows/report-on-vulnerabilities.yaml @@ -19,7 +19,7 @@ jobs: egress-policy: audit - name: Scan for vulnerabilities - uses: aquasecurity/trivy-action@f781cce5aab226378ee181d764ab90ea0be3cdd8 # 0.25.0 + uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb # 0.26.0 with: image-ref: ghcr.io/doodlescheduling/webhook-controller:latest format: json