68
68
key : ${{ steps.restore-db-cache.outputs.cache-primary-key }}
69
69
- name : Run Trivy vulnerability scanner on latest antrea-agent Docker image
70
70
if : ${{ always() && steps.pull.conclusion == 'success' }}
71
- uses : aquasecurity/trivy-action@0.29 .0
71
+ uses : aquasecurity/trivy-action@0.30 .0
72
72
# we cannot use .trivy.yml as we need to override some config parameters
73
73
# and that is not supported by aquasecurity/trivy-action
74
74
with :
87
87
TRIVY_SKIP_JAVA_DB_UPDATE : true
88
88
- name : Run Trivy vulnerability scanner on latest antrea-controller Docker image
89
89
if : ${{ always() && steps.pull.conclusion == 'success' }}
90
- uses : aquasecurity/trivy-action@0.29 .0
90
+ uses : aquasecurity/trivy-action@0.30 .0
91
91
# we cannot use .trivy.yml as we need to override some config parameters
92
92
# and that is not supported by aquasecurity/trivy-action
93
93
with :
@@ -105,7 +105,7 @@ jobs:
105
105
TRIVY_SKIP_JAVA_DB_UPDATE : true
106
106
- name : Run Trivy vulnerability scanner on antrea-agent Docker image for latest released version
107
107
if : ${{ always() && steps.pull.conclusion == 'success' }}
108
- uses : aquasecurity/trivy-action@0.29 .0
108
+ uses : aquasecurity/trivy-action@0.30 .0
109
109
with :
110
110
scan-type : ' image'
111
111
image-ref : ' antrea/antrea-agent-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}'
@@ -121,7 +121,7 @@ jobs:
121
121
TRIVY_SKIP_JAVA_DB_UPDATE : true
122
122
- name : Run Trivy vulnerability scanner on antrea-controller Docker image for latest released version
123
123
if : ${{ always() && steps.pull.conclusion == 'success' }}
124
- uses : aquasecurity/trivy-action@0.29 .0
124
+ uses : aquasecurity/trivy-action@0.30 .0
125
125
with :
126
126
scan-type : ' image'
127
127
image-ref : ' antrea/antrea-controller-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}'
0 commit comments