From ac3eaa00d10558646371bf9629339e8d48a6fe95 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Mon, 14 Oct 2024 05:40:59 +0000 Subject: [PATCH] build(deps): bump aquasecurity/trivy-action from 0.24.0 to 0.27.0 Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.24.0 to 0.27.0. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](https://github.com/aquasecurity/trivy-action/compare/0.24.0...0.27.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] --- .github/workflows/ci-image-scanning-on-schedule.yml | 4 ++-- .github/workflows/ci-image-scanning.yaml | 4 ++-- .github/workflows/release.yml | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/.github/workflows/ci-image-scanning-on-schedule.yml b/.github/workflows/ci-image-scanning-on-schedule.yml index 5261657c058e..fb967d228590 100644 --- a/.github/workflows/ci-image-scanning-on-schedule.yml +++ b/.github/workflows/ci-image-scanning-on-schedule.yml @@ -47,7 +47,7 @@ jobs: export REGISTRY="docker.io/karmada" make image-${{ matrix.target }} - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@0.24.0 + uses: aquasecurity/trivy-action@0.27.0 with: image-ref: 'docker.io/karmada/${{ matrix.target }}:${{ matrix.karmada-version }}' format: 'sarif' @@ -55,7 +55,7 @@ jobs: vuln-type: 'os,library' output: '${{ matrix.target }}:${{ matrix.karmada-version }}.trivy-results.sarif' - name: display scan results - uses: aquasecurity/trivy-action@0.24.0 + uses: aquasecurity/trivy-action@0.27.0 with: image-ref: 'docker.io/karmada/${{ matrix.target }}:${{ matrix.karmada-version }}' format: 'table' diff --git a/.github/workflows/ci-image-scanning.yaml b/.github/workflows/ci-image-scanning.yaml index acfece19404f..630606275ce8 100644 --- a/.github/workflows/ci-image-scanning.yaml +++ b/.github/workflows/ci-image-scanning.yaml @@ -42,7 +42,7 @@ jobs: export REGISTRY="docker.io/karmada" make image-${{ matrix.target }} - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@0.24.0 + uses: aquasecurity/trivy-action@0.27.0 with: image-ref: 'docker.io/karmada/${{ matrix.target }}:latest' format: 'sarif' @@ -50,7 +50,7 @@ jobs: vuln-type: 'os,library' output: 'trivy-results.sarif' - name: display scan results - uses: aquasecurity/trivy-action@0.24.0 + uses: aquasecurity/trivy-action@0.27.0 with: image-ref: 'docker.io/karmada/${{ matrix.target }}:latest' format: 'table' diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index ba88fd6b3890..3af121986ff0 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -167,7 +167,7 @@ jobs: steps: - uses: actions/checkout@v4 - name: Generate sbom for karmada file system - uses: aquasecurity/trivy-action@0.24.0 + uses: aquasecurity/trivy-action@0.27.0 with: scan-type: 'fs' format: 'spdx'