53
53
uses : actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
54
54
55
55
- name : Run Trivy vulnerability scanner in repo mode
56
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
56
+ uses : aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23 .0
57
57
with :
58
58
scan-type : " config"
59
59
hide-progress : false
63
63
timeout : " 3600s"
64
64
65
65
- name : Upload Trivy scan results to GitHub Security tab
66
- uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
66
+ uses : github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11
67
67
if : always()
68
68
with :
69
69
sarif_file : " trivy-results1.sarif"
86
86
# For public images, no ENV vars must be set.
87
87
- name : Run Trivy vulnerability scanner
88
88
if : always()
89
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
89
+ uses : aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23 .0
90
90
with :
91
91
# Path to Docker image
92
92
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-issuer-service:main"
96
96
97
97
- name : Upload Trivy scan results to GitHub Security tab
98
98
if : always()
99
- uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
99
+ uses : github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11
100
100
with :
101
101
sarif_file : " trivy-results2.sarif"
102
102
@@ -118,7 +118,7 @@ jobs:
118
118
# For public images, no ENV vars must be set.
119
119
- name : Run Trivy vulnerability scanner
120
120
if : always()
121
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
121
+ uses : aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23 .0
122
122
with :
123
123
# Path to Docker image
124
124
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-issuer-migrations:main"
@@ -129,7 +129,7 @@ jobs:
129
129
130
130
- name : Upload Trivy scan results to GitHub Security tab
131
131
if : always()
132
- uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
132
+ uses : github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11
133
133
with :
134
134
sarif_file : " trivy-results3.sarif"
135
135
@@ -151,7 +151,7 @@ jobs:
151
151
# For public images, no ENV vars must be set.
152
152
- name : Run Trivy vulnerability scanner
153
153
if : always()
154
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
154
+ uses : aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23 .0
155
155
with :
156
156
# Path to Docker image
157
157
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-expiry-app:main"
@@ -162,7 +162,7 @@ jobs:
162
162
163
163
- name : Upload Trivy scan results to GitHub Security tab
164
164
if : always()
165
- uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
165
+ uses : github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11
166
166
with :
167
167
sarif_file : " trivy-results4.sarif"
168
168
@@ -184,7 +184,7 @@ jobs:
184
184
# For public images, no ENV vars must be set.
185
185
- name : Run Trivy vulnerability scanner
186
186
if : always()
187
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
187
+ uses : aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23 .0
188
188
with :
189
189
# Path to Docker image
190
190
image-ref : " ${{ env.IMAGE_NAMESPACE }}/ssi-credential-issuer-processes-worker:main"
@@ -195,6 +195,6 @@ jobs:
195
195
196
196
- name : Upload Trivy scan results to GitHub Security tab
197
197
if : always()
198
- uses : github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
198
+ uses : github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11
199
199
with :
200
200
sarif_file : " trivy-results5.sarif"
0 commit comments