From 3e0f1e4e8eb53ab89b8eeae663b7ae6a5d0e47d4 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Thu, 23 May 2024 19:34:52 +0000 Subject: [PATCH] Bump aquasecurity/trivy-action from 0.16.1 to 0.21.0 Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.16.1 to 0.21.0. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](https://github.com/aquasecurity/trivy-action/compare/0.16.1...0.21.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] --- .github/workflows/trivy_scan.yml | 4 ++-- .github/workflows/trivy_scan_before_release.yml | 6 +++--- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/.github/workflows/trivy_scan.yml b/.github/workflows/trivy_scan.yml index cc97e03a9bb..1f95703b5ca 100644 --- a/.github/workflows/trivy_scan.yml +++ b/.github/workflows/trivy_scan.yml @@ -36,7 +36,7 @@ jobs: docker pull antrea/antrea-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }} - name: Run Trivy vulnerability scanner on latest Antrea Docker image if: ${{ always() && steps.pull.conclusion == 'success' }} - uses: aquasecurity/trivy-action@0.16.1 + uses: aquasecurity/trivy-action@0.21.0 # we cannot use .trivy.yml as we need to override some config parameters # and that is not supported by aquasecurity/trivy-action with: @@ -51,7 +51,7 @@ jobs: output: 'trivy.latest.txt' - name: Run Trivy vulnerability scanner on Antrea Docker image for latest released version if: ${{ always() && steps.pull.conclusion == 'success' }} - uses: aquasecurity/trivy-action@0.16.1 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}' diff --git a/.github/workflows/trivy_scan_before_release.yml b/.github/workflows/trivy_scan_before_release.yml index b26573e505f..4c9a4387dc9 100644 --- a/.github/workflows/trivy_scan_before_release.yml +++ b/.github/workflows/trivy_scan_before_release.yml @@ -15,19 +15,19 @@ jobs: run: | ./hack/build-antrea-linux-all.sh --pull - name: Run Trivy vulnerability scanner on Antrea unified Docker image - uses: aquasecurity/trivy-action@0.16.1 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-ubuntu:latest' trivy-config: '.trivy.yml' - name: Run Trivy vulnerability scanner on the antrea-agent Docker image - uses: aquasecurity/trivy-action@0.16.1 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-agent-ubuntu:latest' trivy-config: '.trivy.yml' - name: Run Trivy vulnerability scanner on the antrea-controller Docker image - uses: aquasecurity/trivy-action@0.16.1 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-controller-ubuntu:latest'