@@ -149,6 +149,13 @@ runs:
149149 # Scan for security vulnerabilities
150150 #
151151
152+ - name : Install Trivy
153+ uses : aquasecurity/setup-trivy@v0.2.4
154+ with :
155+ # renovate: datasource=github-tags depName=aquasecurity/trivy
156+ version : v0.65.0
157+ cache : true
158+
152159 - name : Restore trivy cache
153160 id : cache-trivy-restore
154161 uses : actions/cache/restore@0057852bfaa89a56745cba8c7296529d2fc39830 # v4.3.0
@@ -172,6 +179,7 @@ runs:
172179 cache : ' false' # use our own cache handling
173180 trivy-config : ${{ env.TRIVY_CONFIG_PATH }}
174181 trivyignores : ${{ env.TRIVY_IGNORES_PATH }}
182+ skip-setup-trivy : true
175183 - name : Use existing SBOM
176184 if : " ${{ inputs.scan-ref != '' }}"
177185 shell : bash
@@ -209,6 +217,7 @@ runs:
209217 cache : ' false' # use our own cache handling
210218 trivy-config : ${{ env.TRIVY_CONFIG_PATH }}
211219 trivyignores : ${{ env.TRIVY_IGNORES_PATH }}
220+ skip-setup-trivy : true
212221
213222 - name : Create vulnerability report as HTML
214223 uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
@@ -227,6 +236,7 @@ runs:
227236 cache : ' false' # use our own cache handling
228237 trivy-config : ${{ env.TRIVY_CONFIG_PATH }}
229238 trivyignores : ${{ env.TRIVY_IGNORES_PATH }}
239+ skip-setup-trivy : true
230240 - name : Upload vulnerability report
231241 uses : actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5.0.0
232242 if : always()
@@ -258,6 +268,7 @@ runs:
258268 cache : ' false' # use our own cache handling
259269 trivy-config : ${{ env.TRIVY_CONFIG_PATH }}
260270 trivyignores : ${{ env.TRIVY_IGNORES_PATH }}
271+ skip-setup-trivy : true
261272 - name : Add to job summary
262273 if : ${{ inputs.create-summary == 'true' }}
263274 shell : bash
0 commit comments