Skip to content

Commit d3245d8

Browse files
chore(deps): bump aquasecurity/trivy-action from 0.16.1 to 0.17.0 (Sofie-Automation#1144)
Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.16.1 to 0.17.0. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@0.16.1...0.17.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent 4cc3da0 commit d3245d8

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

.github/workflows/node.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ jobs:
218218
echo "image=$image" >> $GITHUB_OUTPUT
219219
- name: Trivy scanning
220220
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
221-
uses: aquasecurity/trivy-action@0.16.1
221+
uses: aquasecurity/trivy-action@0.17.0
222222
with:
223223
image-ref: '${{ steps.trivy-image.outputs.image }}'
224224
format: 'table'
@@ -360,7 +360,7 @@ jobs:
360360
echo "image=$image" >> $GITHUB_OUTPUT
361361
- name: Trivy scanning
362362
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
363-
uses: aquasecurity/trivy-action@0.16.1
363+
uses: aquasecurity/trivy-action@0.17.0
364364
with:
365365
image-ref: '${{ steps.trivy-image.outputs.image }}'
366366
format: 'table'

.github/workflows/trivy.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,14 @@ jobs:
1313
image: ["server-core", "playout-gateway", "mos-gateway"]
1414
steps:
1515
- name: Run Trivy vulnerability scanner (json)
16-
uses: aquasecurity/trivy-action@0.16.1
16+
uses: aquasecurity/trivy-action@0.17.0
1717
with:
1818
image-ref: ghcr.io/nrkno/sofie-core-${{ matrix.image }}:latest
1919
format: json
2020
output: '${{ matrix.image }}-trivy-scan-results.json'
2121

2222
- name: Run Trivy vulnerability scanner (table)
23-
uses: aquasecurity/trivy-action@0.16.1
23+
uses: aquasecurity/trivy-action@0.17.0
2424
with:
2525
image-ref: ghcr.io/nrkno/sofie-core-${{ matrix.image }}:latest
2626
output: '${{ matrix.image }}-trivy-scan-results.txt'
@@ -36,7 +36,7 @@ jobs:
3636
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
3737
3838
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
39-
uses: aquasecurity/trivy-action@0.16.1
39+
uses: aquasecurity/trivy-action@0.17.0
4040
with:
4141
format: 'github'
4242
output: 'dependency-results-${{ matrix.image }}.sbom.json'

0 commit comments

Comments
 (0)