Skip to content

Commit

Permalink
Merge pull request #672 from digitalservicebund/renovate/aquasecurity…
Browse files Browse the repository at this point in the history
…-trivy-action-digest

chore(deps): update aquasecurity/trivy-action digest to 8078967
  • Loading branch information
andreasphil authored Oct 10, 2024
2 parents e5ab275 + 06a27b8 commit 105f512
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 6 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/create-docker-image-job.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ jobs:
- name: Build docker image
run: docker build --tag ${{ inputs.container-registry }}/${{ inputs.container-image-name }}:${{ inputs.container-image-version }} -f DockerfileApp .
- name: Run Trivy vulnerability image scanner
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
ACTIONS_RUNTIME_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
Expand Down Expand Up @@ -57,7 +57,7 @@ jobs:
sarif_file: "trivy-results.sarif"
category: trivy-image-scan
- name: Generate cosign vulnerability scan record
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
ACTIONS_RUNTIME_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/early-daily-trivy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ jobs:
- name: Run Trivy vulnerability file scanner
# Third-party action, pin to commit SHA!
# See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
ACTIONS_RUNTIME_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
Expand Down Expand Up @@ -69,7 +69,7 @@ jobs:
steps:
- uses: actions/checkout@v4
- name: Run Trivy vulnerability image scanner
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
ACTIONS_RUNTIME_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
Expand All @@ -94,7 +94,7 @@ jobs:
sarif_file: "trivy-results.sarif"
category: trivy-image-scan
- name: Generate cosign vulnerability scan record
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
ACTIONS_RUNTIME_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TRIVY_USERNAME: ${{ github.actor }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/pipeline.yml
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,7 @@ jobs:
- name: Checkout code
uses: actions/checkout@v4
- name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/trivy-action@a20de5420d57c4102486cdd9578b45609c99d7eb
uses: aquasecurity/trivy-action@807896715e16054f9ae275ea68a15ee3908f0124
env:
ACTIONS_RUNTIME_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
Expand Down

0 comments on commit 105f512

Please sign in to comment.