Skip to content

Commit

Permalink
Bump Trivy
Browse files Browse the repository at this point in the history
  • Loading branch information
assumptionsandg committed Oct 2, 2024
1 parent 363b690 commit d26d019
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 3 deletions.
4 changes: 1 addition & 3 deletions .github/workflows/stackhpc-container-image-build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ jobs:
- name: Install Trivy
run: |
curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sudo sh -s -- -b /usr/local/bin v0.49.0
curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sudo sh -s -- -b /usr/local/bin v0.55.2
- name: Install yq
run: |
Expand Down Expand Up @@ -226,8 +226,6 @@ jobs:

- name: Scan built container images
run: src/kayobe-config/tools/scan-images.sh ${{ matrix.distro }} ${{ steps.write-kolla-tag.outputs.kolla-tag }}
env:
TRIVY_DB_REPOSITORY: "public.ecr.aws/aquasecurity/trivy-db:2"

- name: Move image scan logs to output artifact
run: mv image-scan-output image-build-logs/image-scan-output
Expand Down
1 change: 1 addition & 0 deletions tools/scan-images.sh
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,7 @@ for image in $images; do
--severity HIGH,CRITICAL \
--output image-scan-output/${filename}.json \
--ignore-unfixed \
--db-repository public.ecr.aws/aquasecurity/trivy-db:2 \
$image); then
# Clean up the output file for any images with no vulnerabilities
rm -f image-scan-output/${filename}.json
Expand Down

0 comments on commit d26d019

Please sign in to comment.