diff --git a/.github/workflows/test.yaml b/.github/workflows/test.yaml index f69a2ac..f014adf 100644 --- a/.github/workflows/test.yaml +++ b/.github/workflows/test.yaml @@ -6,7 +6,7 @@ on: workflow_dispatch: env: - TRIVY_VERSION: 0.69.1 + TRIVY_VERSION: 0.69.2 BATS_LIB_PATH: '/usr/lib/' jobs: diff --git a/README.md b/README.md index ee0b383..d7dded7 100644 --- a/README.md +++ b/README.md @@ -215,7 +215,7 @@ jobs: uses: aquasecurity/setup-trivy@v0.2.0 with: cache: true - version: v0.69.1 + version: v0.69.2 - name: Run Trivy vulnerability scanner in repo mode uses: aquasecurity/trivy-action@master @@ -891,7 +891,7 @@ Following inputs can be used as `step.with` keys: | `github-pat` | String | | Authentication token to enable sending SBOM scan results to GitHub Dependency Graph. Can be either a GitHub Personal Access Token (PAT) or GITHUB_TOKEN | | `limit-severities-for-sarif` | Boolean | false | By default *SARIF* format enforces output of all vulnerabilities regardless of configured severities. To override this behavior set this parameter to **true** | | `docker-host` | String | | By default it is set to `unix://var/run/docker.sock`, but can be updated to help with containerized infrastructure values (`unix:/` or other prefix is required) | -| `version` | String | `v0.69.1` | Trivy version to use, e.g. `latest` or `v0.69.1` | +| `version` | String | `v0.69.2` | Trivy version to use, e.g. `latest` or `v0.69.2` | | `skip-setup-trivy` | Boolean | false | Skip calling the `setup-trivy` action to install `trivy` | | `token-setup-trivy` | Boolean | | Overwrite `github.token` used by `setup-trivy` to checkout the `trivy` repository | diff --git a/test/data/config-scan/report.json b/test/data/config-scan/report.json index 97dcc7e..0cf762e 100644 --- a/test/data/config-scan/report.json +++ b/test/data/config-scan/report.json @@ -1,7 +1,7 @@ { "SchemaVersion": 2, "Trivy": { - "Version": "0.69.1" + "Version": "0.69.2" }, "ArtifactName": "test/data/config-scan", "ArtifactType": "filesystem", diff --git a/test/data/secret-scan/report.json b/test/data/secret-scan/report.json index 9975a1e..485cad2 100644 --- a/test/data/secret-scan/report.json +++ b/test/data/secret-scan/report.json @@ -1,7 +1,7 @@ { "SchemaVersion": 2, "Trivy": { - "Version": "0.69.1" + "Version": "0.69.2" }, "ArtifactID": "sha256:79ce4c2f8371bef1ce2a321518d3136bc1bd8f3c307ed679944a38e7cbd76c14", "ArtifactName": "https://github.com/krol3/demo-trivy/", diff --git a/test/data/with-tf-vars/report.json b/test/data/with-tf-vars/report.json index 7022c27..9517a5c 100644 --- a/test/data/with-tf-vars/report.json +++ b/test/data/with-tf-vars/report.json @@ -1,7 +1,7 @@ { "SchemaVersion": 2, "Trivy": { - "Version": "0.69.1" + "Version": "0.69.2" }, "ArtifactName": "test/data/with-tf-vars/main.tf", "ArtifactType": "filesystem", diff --git a/test/data/with-trivy-yaml-cfg/report.json b/test/data/with-trivy-yaml-cfg/report.json index b1e0498..a36d923 100644 --- a/test/data/with-trivy-yaml-cfg/report.json +++ b/test/data/with-trivy-yaml-cfg/report.json @@ -1,7 +1,7 @@ { "SchemaVersion": 2, "Trivy": { - "Version": "0.69.1" + "Version": "0.69.2" }, "ArtifactID": "sha256:aab05ff324c90bb728aa5177b75d7e39d363be13323873de70959d2251edcebc", "ArtifactName": "alpine:3.10",