Skip to content

Commit f5996af

Browse files
Bump aquasecurity/trivy-action from 0.26.0 to 0.27.0 (antrea-io#6736)
Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.26.0 to 0.27.0. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@0.26.0...0.27.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent cb3a00e commit f5996af

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

.github/workflows/trivy_scan.yml

+4-4
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ jobs:
3737
docker pull antrea/antrea-controller-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}
3838
- name: Run Trivy vulnerability scanner on latest antrea-agent Docker image
3939
if: ${{ always() && steps.pull.conclusion == 'success' }}
40-
uses: aquasecurity/trivy-action@0.26.0
40+
uses: aquasecurity/trivy-action@0.27.0
4141
# we cannot use .trivy.yml as we need to override some config parameters
4242
# and that is not supported by aquasecurity/trivy-action
4343
with:
@@ -50,7 +50,7 @@ jobs:
5050
output: 'trivy.agent.latest.txt'
5151
- name: Run Trivy vulnerability scanner on latest antrea-controller Docker image
5252
if: ${{ always() && steps.pull.conclusion == 'success' }}
53-
uses: aquasecurity/trivy-action@0.26.0
53+
uses: aquasecurity/trivy-action@0.27.0
5454
# we cannot use .trivy.yml as we need to override some config parameters
5555
# and that is not supported by aquasecurity/trivy-action
5656
with:
@@ -63,7 +63,7 @@ jobs:
6363
output: 'trivy.controller.latest.txt'
6464
- name: Run Trivy vulnerability scanner on antrea-agent Docker image for latest released version
6565
if: ${{ always() && steps.pull.conclusion == 'success' }}
66-
uses: aquasecurity/trivy-action@0.26.0
66+
uses: aquasecurity/trivy-action@0.27.0
6767
with:
6868
scan-type: 'image'
6969
image-ref: 'antrea/antrea-agent-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}'
@@ -74,7 +74,7 @@ jobs:
7474
output: 'trivy.agent.${{ steps.find-antrea-greatest-version.outputs.antrea_version }}.txt'
7575
- name: Run Trivy vulnerability scanner on antrea-controller Docker image for latest released version
7676
if: ${{ always() && steps.pull.conclusion == 'success' }}
77-
uses: aquasecurity/trivy-action@0.26.0
77+
uses: aquasecurity/trivy-action@0.27.0
7878
with:
7979
scan-type: 'image'
8080
image-ref: 'antrea/antrea-controller-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}'

.github/workflows/trivy_scan_before_release.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ jobs:
1919
run: |
2020
./hack/build-antrea-linux-all.sh --pull
2121
- name: Run Trivy vulnerability scanner on the antrea-agent Docker image
22-
uses: aquasecurity/trivy-action@0.26.0
22+
uses: aquasecurity/trivy-action@0.27.0
2323
with:
2424
scan-type: 'image'
2525
image-ref: 'antrea/antrea-agent-ubuntu:latest'
2626
trivy-config: '.trivy.yml'
2727
- name: Run Trivy vulnerability scanner on the antrea-controller Docker image
28-
uses: aquasecurity/trivy-action@0.26.0
28+
uses: aquasecurity/trivy-action@0.27.0
2929
with:
3030
scan-type: 'image'
3131
image-ref: 'antrea/antrea-controller-ubuntu:latest'

0 commit comments

Comments
 (0)