Skip to content

Commit d26d019

Browse files
Bump Trivy
1 parent 363b690 commit d26d019

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

.github/workflows/stackhpc-container-image-build.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ jobs:
133133
134134
- name: Install Trivy
135135
run: |
136-
curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sudo sh -s -- -b /usr/local/bin v0.49.0
136+
curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sudo sh -s -- -b /usr/local/bin v0.55.2
137137
138138
- name: Install yq
139139
run: |
@@ -226,8 +226,6 @@ jobs:
226226

227227
- name: Scan built container images
228228
run: src/kayobe-config/tools/scan-images.sh ${{ matrix.distro }} ${{ steps.write-kolla-tag.outputs.kolla-tag }}
229-
env:
230-
TRIVY_DB_REPOSITORY: "public.ecr.aws/aquasecurity/trivy-db:2"
231229

232230
- name: Move image scan logs to output artifact
233231
run: mv image-scan-output image-build-logs/image-scan-output

tools/scan-images.sh

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,7 @@ for image in $images; do
5454
--severity HIGH,CRITICAL \
5555
--output image-scan-output/${filename}.json \
5656
--ignore-unfixed \
57+
--db-repository public.ecr.aws/aquasecurity/trivy-db:2 \
5758
$image); then
5859
# Clean up the output file for any images with no vulnerabilities
5960
rm -f image-scan-output/${filename}.json

0 commit comments

Comments
 (0)