diff --git a/.github/workflows/trivy_scan.yml b/.github/workflows/trivy_scan.yml index e3bc190956e..4c6a3c9ffa2 100644 --- a/.github/workflows/trivy_scan.yml +++ b/.github/workflows/trivy_scan.yml @@ -37,7 +37,7 @@ jobs: docker pull antrea/antrea-controller-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }} - name: Run Trivy vulnerability scanner on latest antrea-agent Docker image if: ${{ always() && steps.pull.conclusion == 'success' }} - uses: aquasecurity/trivy-action@0.20.0 + uses: aquasecurity/trivy-action@0.21.0 # we cannot use .trivy.yml as we need to override some config parameters # and that is not supported by aquasecurity/trivy-action with: @@ -50,7 +50,7 @@ jobs: output: 'trivy.agent.latest.txt' - name: Run Trivy vulnerability scanner on latest antrea-controller Docker image if: ${{ always() && steps.pull.conclusion == 'success' }} - uses: aquasecurity/trivy-action@0.20.0 + uses: aquasecurity/trivy-action@0.21.0 # we cannot use .trivy.yml as we need to override some config parameters # and that is not supported by aquasecurity/trivy-action with: @@ -63,7 +63,7 @@ jobs: output: 'trivy.controller.latest.txt' - name: Run Trivy vulnerability scanner on antrea-agent Docker image for latest released version if: ${{ always() && steps.pull.conclusion == 'success' }} - uses: aquasecurity/trivy-action@0.20.0 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-agent-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}' @@ -74,7 +74,7 @@ jobs: output: 'trivy.agent.${{ steps.find-antrea-greatest-version.outputs.antrea_version }}.txt' - name: Run Trivy vulnerability scanner on antrea-controller Docker image for latest released version if: ${{ always() && steps.pull.conclusion == 'success' }} - uses: aquasecurity/trivy-action@0.20.0 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-controller-ubuntu:${{ steps.find-antrea-greatest-version.outputs.antrea_version }}' diff --git a/.github/workflows/trivy_scan_before_release.yml b/.github/workflows/trivy_scan_before_release.yml index 696c672e515..09d2323ed0d 100644 --- a/.github/workflows/trivy_scan_before_release.yml +++ b/.github/workflows/trivy_scan_before_release.yml @@ -17,13 +17,13 @@ jobs: run: | ./hack/build-antrea-linux-all.sh --pull - name: Run Trivy vulnerability scanner on the antrea-agent Docker image - uses: aquasecurity/trivy-action@0.20.0 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-agent-ubuntu:latest' trivy-config: '.trivy.yml' - name: Run Trivy vulnerability scanner on the antrea-controller Docker image - uses: aquasecurity/trivy-action@0.20.0 + uses: aquasecurity/trivy-action@0.21.0 with: scan-type: 'image' image-ref: 'antrea/antrea-controller-ubuntu:latest'