53
53
uses : actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
54
54
55
55
- name : Run Trivy vulnerability scanner in repo mode
56
- uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # v0.20 .0
56
+ uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
57
57
with :
58
58
scan-type : " config"
59
59
hide-progress : false
64
64
timeout : " 3600s"
65
65
66
66
- name : Upload Trivy scan results to GitHub Security tab
67
- uses : github/codeql-action/upload-sarif@b7cec7526559c32f1616476ff32d17ba4c59b2d6 # v3.25.5
67
+ uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
68
68
if : always()
69
69
with :
70
70
sarif_file : " trivy-results1.sarif"
87
87
# For public images, no ENV vars must be set.
88
88
- name : Run Trivy vulnerability scanner
89
89
if : always()
90
- uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # v0.20 .0
90
+ uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
91
91
with :
92
92
# Path to Docker image
93
93
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-issuer-service:latest"
97
97
98
98
- name : Upload Trivy scan results to GitHub Security tab
99
99
if : always()
100
- uses : github/codeql-action/upload-sarif@b7cec7526559c32f1616476ff32d17ba4c59b2d6 # v3.25.5
100
+ uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
101
101
with :
102
102
sarif_file : " trivy-results2.sarif"
103
103
@@ -119,7 +119,7 @@ jobs:
119
119
# For public images, no ENV vars must be set.
120
120
- name : Run Trivy vulnerability scanner
121
121
if : always()
122
- uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # v0.20 .0
122
+ uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
123
123
with :
124
124
# Path to Docker image
125
125
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-issuer-migrations:latest"
@@ -129,7 +129,7 @@ jobs:
129
129
130
130
- name : Upload Trivy scan results to GitHub Security tab
131
131
if : always()
132
- uses : github/codeql-action/upload-sarif@b7cec7526559c32f1616476ff32d17ba4c59b2d6 # v3.25.5
132
+ uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
133
133
with :
134
134
sarif_file : " trivy-results3.sarif"
135
135
@@ -151,7 +151,7 @@ jobs:
151
151
# For public images, no ENV vars must be set.
152
152
- name : Run Trivy vulnerability scanner
153
153
if : always()
154
- uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # v0.20 .0
154
+ uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
155
155
with :
156
156
# Path to Docker image
157
157
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-expiry-app:latest"
@@ -161,7 +161,7 @@ jobs:
161
161
162
162
- name : Upload Trivy scan results to GitHub Security tab
163
163
if : always()
164
- uses : github/codeql-action/upload-sarif@b7cec7526559c32f1616476ff32d17ba4c59b2d6 # v3.25.5
164
+ uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
165
165
with :
166
166
sarif_file : " trivy-results4.sarif"
167
167
@@ -183,7 +183,7 @@ jobs:
183
183
# For public images, no ENV vars must be set.
184
184
- name : Run Trivy vulnerability scanner
185
185
if : always()
186
- uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # v0.20 .0
186
+ uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
187
187
with :
188
188
# Path to Docker image
189
189
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-issuer-processes-worker:latest"
@@ -193,6 +193,6 @@ jobs:
193
193
194
194
- name : Upload Trivy scan results to GitHub Security tab
195
195
if : always()
196
- uses : github/codeql-action/upload-sarif@b7cec7526559c32f1616476ff32d17ba4c59b2d6 # v3.25.5
196
+ uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
197
197
with :
198
198
sarif_file : " trivy-results5.sarif"
0 commit comments