diff --git a/.github/workflows/chart-ci.yml b/.github/workflows/chart-ci.yml index 9da2003..7c86129 100644 --- a/.github/workflows/chart-ci.yml +++ b/.github/workflows/chart-ci.yml @@ -185,7 +185,7 @@ jobs: path: ${{ inputs.chart-dir }} - name: Build Trivy Vulnerability report - uses: aquasecurity/trivy-action@0.35.0 + uses: aquasecurity/trivy-action@v0.35.0 env: TRIVY_HELM_KUBE_VERSION: ${{ inputs.kubernetes-version }} TRIVY_HELM_SET_FILE: ${{ inputs.chart-values }} @@ -203,7 +203,7 @@ jobs: sarif_file: 'trivy-vuln-results.sarif' - name: Run Trivy Vulnerability scan - uses: aquasecurity/trivy-action@0.35.0 + uses: aquasecurity/trivy-action@v0.35.0 env: TRIVY_HELM_KUBE_VERSION: ${{ inputs.kubernetes-version }} TRIVY_HELM_SET_FILE: ${{ inputs.chart-values }} diff --git a/.github/workflows/container-ci.yml b/.github/workflows/container-ci.yml index 7f890cf..373ce83 100644 --- a/.github/workflows/container-ci.yml +++ b/.github/workflows/container-ci.yml @@ -283,7 +283,7 @@ jobs: cat "$IGNORE_FILE" - name: Generate SBOM (SPDX JSON) - uses: aquasecurity/trivy-action@0.33.1 + uses: aquasecurity/trivy-action@v0.35.0 with: scan-type: 'image' image-ref: "${{ inputs.image-name }}:sha-${{ steps.short-sha.outputs.sha }}" @@ -297,7 +297,7 @@ jobs: filePath: 'image-sbom.spdx.json' - name: Build Trivy Vulnerability report - uses: aquasecurity/trivy-action@0.33.1 + uses: aquasecurity/trivy-action@v0.35.0 with: image-ref: "${{ inputs.image-name }}:sha-${{ steps.short-sha.outputs.sha }}" skip-setup-trivy: true @@ -317,7 +317,7 @@ jobs: category: vulnerability - name: Build Trivy License report - uses: aquasecurity/trivy-action@0.33.1 + uses: aquasecurity/trivy-action@v0.35.0 with: image-ref: "${{ inputs.image-name }}:sha-${{ steps.short-sha.outputs.sha }}" skip-setup-trivy: true @@ -337,7 +337,7 @@ jobs: category: license - name: Run Trivy Vulnerability scan - uses: aquasecurity/trivy-action@0.33.1 + uses: aquasecurity/trivy-action@v0.35.0 # Overriding env vars from previous steps for them not to interfere with the scan env: TRIVY_FORMAT: 'table' @@ -354,7 +354,7 @@ jobs: trivyignores: 'ci-trivy-ignore.txt' - name: Run Trivy License scan - uses: aquasecurity/trivy-action@0.33.1 + uses: aquasecurity/trivy-action@v0.35.0 # Overriding env vars from previous steps for them not to interfere with the scan env: TRIVY_FORMAT: 'table'