Skip to content

Commit

Permalink
chore(deps): bump aquasecurity/trivy-action from 0.2.1 to 0.2.2 (#355)
Browse files Browse the repository at this point in the history
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
  • Loading branch information
dependabot[bot] committed Feb 3, 2022
1 parent 1d4c557 commit d39230f
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/nightly.yml
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ jobs:
-t $DOCKER_IMAGE_NAME:ci-scan \
.
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.2.1
uses: aquasecurity/trivy-action@0.2.2
with:
image-ref: '${{ env.DOCKER_IMAGE_NAME }}:ci-scan'
format: 'table'
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ jobs:
-t $DOCKER_IMAGE_NAME:ci-scan \
.
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.2.1
uses: aquasecurity/trivy-action@0.2.2
with:
image-ref: '${{ env.DOCKER_IMAGE_NAME }}:ci-scan'
format: 'table'
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/security.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ jobs:
uses: actions/checkout@v2

- name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/trivy-action@0.2.1
uses: aquasecurity/trivy-action@0.2.2
if: ${{ ! github.event.schedule }} # Do not run inline checks when running periodically
with:
scan-type: fs
Expand All @@ -28,7 +28,7 @@ jobs:
severity: 'HIGH,CRITICAL'

- name: Run Trivy vulnerability scanner sarif output
uses: aquasecurity/trivy-action@0.2.1
uses: aquasecurity/trivy-action@0.2.2
if: ${{ github.event.schedule }} # Generate sarif when running periodically
with:
scan-type: fs
Expand Down

0 comments on commit d39230f

Please sign in to comment.