Skip to content

Commit 4d0de2f

Browse files
dependabot[bot]siljekristensen
authored andcommitted
chore(deps): bump aquasecurity/trivy-action from 0.33.1 to 0.34.0
Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.33.1 to 0.34.0. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@0.33.1...0.34.0) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-version: 0.34.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <[email protected]>
1 parent 098224b commit 4d0de2f

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

.github/workflows/node.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,7 @@ jobs:
274274
echo "image=$image" >> $GITHUB_OUTPUT
275275
- name: Trivy scanning
276276
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
277-
uses: aquasecurity/trivy-action@0.33.1
277+
uses: aquasecurity/trivy-action@0.34.0
278278
env:
279279
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
280280
with:
@@ -446,7 +446,7 @@ jobs:
446446
echo "image=$image" >> $GITHUB_OUTPUT
447447
- name: Trivy scanning
448448
if: steps.check-build-and-push.outputs.enable == 'true' && steps.check-ghcr.outputs.enable == 'true' && steps.ghcr-tag.outputs.tags != 0
449-
uses: aquasecurity/trivy-action@0.33.1
449+
uses: aquasecurity/trivy-action@0.34.0
450450
env:
451451
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
452452
with:

.github/workflows/trivy.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ jobs:
2121

2222
steps:
2323
- name: Run Trivy vulnerability scanner (json)
24-
uses: aquasecurity/trivy-action@0.33.1
24+
uses: aquasecurity/trivy-action@0.34.0
2525
env:
2626
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
2727
with:
@@ -30,7 +30,7 @@ jobs:
3030
output: "${{ matrix.image }}-trivy-scan-results.json"
3131

3232
- name: Run Trivy vulnerability scanner (table)
33-
uses: aquasecurity/trivy-action@0.33.1
33+
uses: aquasecurity/trivy-action@0.34.0
3434
env:
3535
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
3636
with:
@@ -48,7 +48,7 @@ jobs:
4848
echo $CODE_BLOCK >> $GITHUB_STEP_SUMMARY
4949
5050
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
51-
uses: aquasecurity/trivy-action@0.33.1
51+
uses: aquasecurity/trivy-action@0.34.0
5252
env:
5353
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db
5454
with:

0 commit comments

Comments
 (0)