From 32fa94d2f24b2033a7946987e23285f52fd120ba Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Sun, 9 Jun 2024 18:25:55 +0200 Subject: [PATCH] chore(ci): bump aquasecurity/trivy-action from 0.21.0 to 0.22.0 (#88) Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.21.0 to 0.22.0. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](https://github.com/aquasecurity/trivy-action/compare/0.21.0...0.22.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> --- .github/workflows/release-container.yaml | 8 ++++---- .github/workflows/schedule-trivy.yaml | 6 +++--- 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/.github/workflows/release-container.yaml b/.github/workflows/release-container.yaml index 278f3a6..76b4537 100644 --- a/.github/workflows/release-container.yaml +++ b/.github/workflows/release-container.yaml @@ -124,7 +124,7 @@ jobs: DOCKER_CONTENT_TRUST: 1 - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@0.21.0 + uses: aquasecurity/trivy-action@0.22.0 with: image-ref: '${{ inputs.image }}:${{ steps.meta.outputs.version }}' format: 'json' @@ -133,7 +133,7 @@ jobs: output: 'trivy.json' - name: Convert trivy results to sarif - uses: aquasecurity/trivy-action@0.21.0 + uses: aquasecurity/trivy-action@0.22.0 with: image-ref: trivy.json scan-type: 'convert' @@ -181,7 +181,7 @@ jobs: TAGS: ${{ steps.meta.outputs.tags }} - name: Convert trivy results to CycloneDX - uses: aquasecurity/trivy-action@0.21.0 + uses: aquasecurity/trivy-action@0.22.0 with: image-ref: trivy.json scan-type: 'convert' @@ -197,7 +197,7 @@ jobs: if: github.event_name != 'pull_request' && startsWith(github.event.ref, 'refs/tags/v') - name: Convert trivy results to cosign-vuln - uses: aquasecurity/trivy-action@0.21.0 + uses: aquasecurity/trivy-action@0.22.0 with: image-ref: trivy.json scan-type: 'convert' diff --git a/.github/workflows/schedule-trivy.yaml b/.github/workflows/schedule-trivy.yaml index 0f88fdf..4eec576 100644 --- a/.github/workflows/schedule-trivy.yaml +++ b/.github/workflows/schedule-trivy.yaml @@ -35,7 +35,7 @@ jobs: uses: sigstore/cosign-installer@v3.5.0 - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@0.21.0 + uses: aquasecurity/trivy-action@0.22.0 with: image-ref: ${{ inputs.image-ref }} timeout: ${{ inputs.timeout }} @@ -46,7 +46,7 @@ jobs: output: 'trivy.json' - name: Convert trivy results to sarif - uses: aquasecurity/trivy-action@0.21.0 + uses: aquasecurity/trivy-action@0.22.0 with: image-ref: trivy.json scan-type: 'convert' @@ -64,7 +64,7 @@ jobs: sarif_file: 'trivy.sarif' - name: Convert trivy results to cosign-vuln - uses: aquasecurity/trivy-action@0.21.0 + uses: aquasecurity/trivy-action@0.22.0 with: image-ref: trivy.json scan-type: 'convert'