Skip to content

Commit 2d25dc5

Browse files
Bump aquasecurity/trivy-action in the trivy-actions group (#7062)
Bumps the trivy-actions group with 1 update: [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action). Updates `aquasecurity/trivy-action` from 0.29.0 to 0.30.0 - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@0.29.0...0.30.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: trivy-actions ... Signed-off-by: dependabot[bot] <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent 65875d2 commit 2d25dc5

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

.github/workflows/trivy_scan.yml

+4-4
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ jobs:
6868
key: ${{ steps.restore-db-cache.outputs.cache-primary-key }}
6969
- name: Run Trivy vulnerability scanner on latest antrea-agent Docker image
7070
if: ${{ always() && steps.pull.conclusion == 'success' }}
71-
uses: aquasecurity/trivy-action@0.29.0
71+
uses: aquasecurity/trivy-action@0.30.0
7272
# we cannot use .trivy.yml as we need to override some config parameters
7373
# and that is not supported by aquasecurity/trivy-action
7474
with:
@@ -87,7 +87,7 @@ jobs:
8787
TRIVY_SKIP_JAVA_DB_UPDATE: true
8888
- name: Run Trivy vulnerability scanner on latest antrea-controller Docker image
8989
if: ${{ always() && steps.pull.conclusion == 'success' }}
90-
uses: aquasecurity/trivy-action@0.29.0
90+
uses: aquasecurity/trivy-action@0.30.0
9191
# we cannot use .trivy.yml as we need to override some config parameters
9292
# and that is not supported by aquasecurity/trivy-action
9393
with:
@@ -105,7 +105,7 @@ jobs:
105105
TRIVY_SKIP_JAVA_DB_UPDATE: true
106106
- name: Run Trivy vulnerability scanner on antrea-agent Docker image for latest released version
107107
if: ${{ always() && steps.pull.conclusion == 'success' }}
108-
uses: aquasecurity/trivy-action@0.29.0
108+
uses: aquasecurity/trivy-action@0.30.0
109109
with:
110110
scan-type: 'image'
111111
image-ref: 'antrea/antrea-agent-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}'
@@ -121,7 +121,7 @@ jobs:
121121
TRIVY_SKIP_JAVA_DB_UPDATE: true
122122
- name: Run Trivy vulnerability scanner on antrea-controller Docker image for latest released version
123123
if: ${{ always() && steps.pull.conclusion == 'success' }}
124-
uses: aquasecurity/trivy-action@0.29.0
124+
uses: aquasecurity/trivy-action@0.30.0
125125
with:
126126
scan-type: 'image'
127127
image-ref: 'antrea/antrea-controller-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}'

.github/workflows/trivy_scan_before_release.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
run: |
2929
for i in {1..5}; do trivy image --download-db-only --cache-dir $GITHUB_WORKSPACE/.cache/trivy && break || sleep 1; done
3030
- name: Run Trivy vulnerability scanner on the antrea-agent Docker image
31-
uses: aquasecurity/trivy-action@0.29.0
31+
uses: aquasecurity/trivy-action@0.30.0
3232
with:
3333
scan-type: 'image'
3434
image-ref: 'antrea/antrea-agent-ubuntu:latest'
@@ -39,7 +39,7 @@ jobs:
3939
TRIVY_SKIP_DB_UPDATE: true
4040
TRIVY_SKIP_JAVA_DB_UPDATE: true
4141
- name: Run Trivy vulnerability scanner on the antrea-controller Docker image
42-
uses: aquasecurity/trivy-action@0.29.0
42+
uses: aquasecurity/trivy-action@0.30.0
4343
with:
4444
scan-type: 'image'
4545
image-ref: 'antrea/antrea-controller-ubuntu:latest'

0 commit comments

Comments
 (0)