Skip to content

Commit 6c175e9

Browse files
authored
chore: bump trivy to v0.60.0 (#453)
Signed-off-by: Nikita Pivkin <nikita.pivkin@smartforce.io>
1 parent 53e8848 commit 6c175e9

File tree

9 files changed

+78
-14
lines changed

9 files changed

+78
-14
lines changed

.github/workflows/test.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ on:
66
workflow_dispatch:
77

88
env:
9-
TRIVY_VERSION: 0.57.1
9+
TRIVY_VERSION: 0.60.0
1010
BATS_LIB_PATH: '/usr/lib/'
1111

1212
jobs:

README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ jobs:
215215
uses: aquasecurity/setup-trivy@v0.2.0
216216
with:
217217
cache: true
218-
version: v0.57.1
218+
version: v0.60.1
219219
220220
- name: Run Trivy vulnerability scanner in repo mode
221221
uses: aquasecurity/trivy-action@master
@@ -847,7 +847,7 @@ Following inputs can be used as `step.with` keys:
847847
| `github-pat` | String | | Authentication token to enable sending SBOM scan results to GitHub Dependency Graph. Can be either a GitHub Personal Access Token (PAT) or GITHUB_TOKEN |
848848
| `limit-severities-for-sarif` | Boolean | false | By default *SARIF* format enforces output of all vulnerabilities regardless of configured severities. To override this behavior set this parameter to **true** |
849849
| `docker-host` | String | | By default it is set to `unix://var/run/docker.sock`, but can be updated to help with containerized infrastructure values |
850-
| `version` | String | `v0.57.1` | Trivy version to use, e.g. `latest` or `v0.57.1` |
850+
| `version` | String | `v0.60.0` | Trivy version to use, e.g. `latest` or `v0.60.0` |
851851
| `skip-setup-trivy` | Boolean | false | Skip calling the `setup-trivy` action to install `trivy` |
852852
| `token-setup-trivy` | Boolean | | Overwrite `github.token` used by `setup-trivy` to checkout the `trivy` repository |
853853

action.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ inputs:
9898
version:
9999
description: 'Trivy version to use'
100100
required: false
101-
default: 'v0.57.1'
101+
default: 'v0.60.0'
102102
cache:
103103
description: 'Used to specify whether caching is needed. Set to false, if you would like to disable caching.'
104104
required: false

test/data/config-sarif-report/report.sarif

+1-1
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@
205205
"text": "S3 buckets should each define an aws_s3_bucket_public_access_block"
206206
},
207207
"fullDescription": {
208-
"text": "The &#34;block public access&#34; settings in S3 override individual policies that apply to a given bucket, meaning that all public access can be controlled in one central types for that bucket. It is therefore good practice to define these settings for each bucket in order to clearly define the public access that can be allowed for it.\n"
208+
"text": "The \"block public access\" settings in S3 override individual policies that apply to a given bucket, meaning that all public access can be controlled in one central types for that bucket. It is therefore good practice to define these settings for each bucket in order to clearly define the public access that can be allowed for it.\n"
209209
},
210210
"defaultConfiguration": {
211211
"level": "note"

test/data/config-scan/report.json

+21-9
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,8 @@
9090
"LastCause": true
9191
}
9292
]
93-
}
93+
},
94+
"RenderedCause": {}
9495
}
9596
},
9697
{
@@ -150,7 +151,8 @@
150151
"LastCause": true
151152
}
152153
]
153-
}
154+
},
155+
"RenderedCause": {}
154156
}
155157
},
156158
{
@@ -210,7 +212,8 @@
210212
"LastCause": true
211213
}
212214
]
213-
}
215+
},
216+
"RenderedCause": {}
214217
}
215218
},
216219
{
@@ -271,7 +274,8 @@
271274
"LastCause": true
272275
}
273276
]
274-
}
277+
},
278+
"RenderedCause": {}
275279
}
276280
},
277281
{
@@ -388,7 +392,11 @@
388392
"EndLine": 18
389393
}
390394
}
391-
]
395+
],
396+
"RenderedCause": {
397+
"Raw": "resource \"aws_s3_bucket_versioning\" \"bucket_versioning\" {\n versioning_configuration {\n status = \"Disabled\"\n }\n}",
398+
"Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket_versioning\"\u001b[0m \u001b[38;5;37m\"bucket_versioning\"\u001b[0m {\n versioning_configuration {\n \u001b[38;5;245mstatus\u001b[0m = \u001b[38;5;37m\"Disabled\"\n\u001b[0m }\n}"
399+
}
392400
}
393401
},
394402
{
@@ -448,7 +456,8 @@
448456
"LastCause": true
449457
}
450458
]
451-
}
459+
},
460+
"RenderedCause": {}
452461
}
453462
},
454463
{
@@ -508,7 +517,8 @@
508517
"LastCause": true
509518
}
510519
]
511-
}
520+
},
521+
"RenderedCause": {}
512522
}
513523
},
514524
{
@@ -568,7 +578,8 @@
568578
"LastCause": true
569579
}
570580
]
571-
}
581+
},
582+
"RenderedCause": {}
572583
}
573584
},
574585
{
@@ -628,7 +639,8 @@
628639
"LastCause": true
629640
}
630641
]
631-
}
642+
},
643+
"RenderedCause": {}
632644
}
633645
}
634646
]

test/data/fs-scan/report

+12
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
2+
Report Summary
3+
4+
┌────────┬──────┬─────────────────┬─────────┐
5+
│ Target │ Type │ Vulnerabilities │ Secrets │
6+
├────────┼──────┼─────────────────┼─────────┤
7+
│ - │ - │ - │ - │
8+
└────────┴──────┴─────────────────┴─────────┘
9+
Legend:
10+
- '-': Not scanned
11+
- '0': Clean (no security findings detected)
12+

test/data/image-scan/report

+14
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,18 @@
11

2+
Report Summary
3+
4+
┌──────────────────────────────────────────┬────────┬─────────────────┬─────────┐
5+
│ Target │ Type │ Vulnerabilities │ Secrets │
6+
├──────────────────────────────────────────┼────────┼─────────────────┼─────────┤
7+
│ knqyf263/vuln-image:1.2.3 (alpine 3.7.1) │ alpine │ 19 │ - │
8+
├──────────────────────────────────────────┼────────┼─────────────────┼─────────┤
9+
│ rust-app/Cargo.lock │ cargo │ 4 │ - │
10+
└──────────────────────────────────────────┴────────┴─────────────────┴─────────┘
11+
Legend:
12+
- '-': Not scanned
13+
- '0': Clean (no security findings detected)
14+
15+
216
knqyf263/vuln-image:1.2.3 (alpine 3.7.1)
317
========================================
418
Total: 19 (CRITICAL: 19)

test/data/rootfs-scan/report

+12
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
2+
Report Summary
3+
4+
┌────────┬──────┬─────────────────┬─────────┐
5+
│ Target │ Type │ Vulnerabilities │ Secrets │
6+
├────────┼──────┼─────────────────┼─────────┤
7+
│ - │ - │ - │ - │
8+
└────────┴──────┴─────────────────┴─────────┘
9+
Legend:
10+
- '-': Not scanned
11+
- '0': Clean (no security findings detected)
12+

test/data/with-ignore-files/report

+14
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,18 @@
11

2+
Report Summary
3+
4+
┌──────────────────────────────────────────┬────────┬─────────────────┬─────────┐
5+
│ Target │ Type │ Vulnerabilities │ Secrets │
6+
├──────────────────────────────────────────┼────────┼─────────────────┼─────────┤
7+
│ knqyf263/vuln-image:1.2.3 (alpine 3.7.1) │ alpine │ 19 │ - │
8+
├──────────────────────────────────────────┼────────┼─────────────────┼─────────┤
9+
│ rust-app/Cargo.lock │ cargo │ 1 │ - │
10+
└──────────────────────────────────────────┴────────┴─────────────────┴─────────┘
11+
Legend:
12+
- '-': Not scanned
13+
- '0': Clean (no security findings detected)
14+
15+
216
knqyf263/vuln-image:1.2.3 (alpine 3.7.1)
317
========================================
418
Total: 19 (CRITICAL: 19)

0 commit comments

Comments
 (0)