Skip to content

Commit 3652e4a

Browse files
dependabot[bot]siljekristensen
authored andcommitted
chore(deps): bump aquasecurity/trivy-action from 0.21.0 to 0.22.0
Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.21.0 to 0.22.0. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@0.21.0...0.22.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <[email protected]>
1 parent a7a547b commit 3652e4a

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

.github/workflows/node.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ jobs:
231231
echo "image=$image" >> $GITHUB_OUTPUT
232232
- name: Trivy scanning
233233
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
234-
uses: aquasecurity/trivy-action@0.21.0
234+
uses: aquasecurity/trivy-action@0.22.0
235235
with:
236236
image-ref: "${{ steps.trivy-image.outputs.image }}"
237237
format: "table"
@@ -380,7 +380,7 @@ jobs:
380380
echo "image=$image" >> $GITHUB_OUTPUT
381381
- name: Trivy scanning
382382
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
383-
uses: aquasecurity/trivy-action@0.21.0
383+
uses: aquasecurity/trivy-action@0.22.0
384384
with:
385385
image-ref: "${{ steps.trivy-image.outputs.image }}"
386386
format: "table"

.github/workflows/trivy.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,14 @@ jobs:
1313
image: ["server-core", "playout-gateway", "mos-gateway"]
1414
steps:
1515
- name: Run Trivy vulnerability scanner (json)
16-
uses: aquasecurity/trivy-action@0.21.0
16+
uses: aquasecurity/trivy-action@0.22.0
1717
with:
1818
image-ref: ghcr.io/nrkno/sofie-core-${{ matrix.image }}:latest
1919
format: json
2020
output: '${{ matrix.image }}-trivy-scan-results.json'
2121

2222
- name: Run Trivy vulnerability scanner (table)
23-
uses: aquasecurity/trivy-action@0.21.0
23+
uses: aquasecurity/trivy-action@0.22.0
2424
with:
2525
image-ref: ghcr.io/nrkno/sofie-core-${{ matrix.image }}:latest
2626
output: '${{ matrix.image }}-trivy-scan-results.txt'
@@ -36,7 +36,7 @@ jobs:
3636
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
3737
3838
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
39-
uses: aquasecurity/trivy-action@0.21.0
39+
uses: aquasecurity/trivy-action@0.22.0
4040
with:
4141
format: 'github'
4242
output: 'dependency-results-${{ matrix.image }}.sbom.json'

0 commit comments

Comments
 (0)