Skip to content

Commit

Permalink
Update aquasecurity/trivy-action digest to 8078967 (#2246)
Browse files Browse the repository at this point in the history
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
  • Loading branch information
renovate[bot] authored Oct 10, 2024
1 parent c656753 commit 33e1256
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions .github/workflows/scan.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,14 +25,14 @@ jobs:
# with:
# scan-type: "image"
- name: Download trivy vulnerabilities DB
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
TRIVY_DEBUG: true
TRIVY_DOWNLOAD_DB_ONLY: true
with:
scan-type: "image"
- name: Download trivy Java index DB
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
TRIVY_DEBUG: true
TRIVY_DOWNLOAD_JAVA_DB_ONLY: true
Expand All @@ -51,7 +51,7 @@ jobs:
- name: Run Trivy vulnerability scanner
# Third-party action, pin to commit SHA!
# See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
TRIVY_USERNAME: ${{ github.actor }}
TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}
Expand All @@ -76,7 +76,7 @@ jobs:
- name: Generate cosign vulnerability scan record
# Third-party action, pin to commit SHA!
# See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
TRIVY_USERNAME: ${{ github.actor }}
TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}
Expand Down Expand Up @@ -119,7 +119,7 @@ jobs:
- name: Run Trivy vulnerability image scanner
# Third-party action, pin to commit SHA!
# See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
with:
image-ref: ${{ env.CONTAINER_REGISTRY }}/${{ env.CONTAINER_IMAGE_NAME }}/frontend:${{ env.CONTAINER_IMAGE_VERSION }}
format: "sarif"
Expand All @@ -142,7 +142,7 @@ jobs:
- name: Run Trivy vulnerability file scanner
# Third-party action, pin to commit SHA!
# See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
with:
scan-type: "fs"
scan-ref: "./frontend"
Expand All @@ -167,7 +167,7 @@ jobs:
- name: Generate cosign vulnerability scan record
# Third-party action, pin to commit SHA!
# See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
TRIVY_USERNAME: ${{ github.actor }}
TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}
Expand Down

0 comments on commit 33e1256

Please sign in to comment.