From a618aabdddfbbd4fa14ff8fb31057e4660d937e5 Mon Sep 17 00:00:00 2001 From: Binbin Li Date: Tue, 15 Oct 2024 22:24:18 +0800 Subject: [PATCH] Update scan-vulns.yaml --- .github/workflows/scan-vulns.yaml | 7 ------- 1 file changed, 7 deletions(-) diff --git a/.github/workflows/scan-vulns.yaml b/.github/workflows/scan-vulns.yaml index d15d71fb2..dcc4f2345 100644 --- a/.github/workflows/scan-vulns.yaml +++ b/.github/workflows/scan-vulns.yaml @@ -37,8 +37,6 @@ jobs: name: "[Trivy] Scan for vulnerabilities" runs-on: ubuntu-22.04 timeout-minutes: 15 - env: - TRIVY_VERSION: "0.46.0" steps: - name: Harden Runner uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1 @@ -55,7 +53,6 @@ jobs: scan-ref: '.' ignore-unfixed: true scanners: 'vuln' - version: ${{ env.TRIVY_VERSION }} - name: Build docker images run: | @@ -68,7 +65,6 @@ jobs: scan-type: 'image' image-ref: 'localbuild:test' ignore-unfixed: true - version: ${{ env.TRIVY_VERSION }} - name: Run Trivy vulnerability scanner on localbuildcrd:test uses: aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564 # 0.27.0 @@ -76,7 +72,6 @@ jobs: scan-type: 'image' image-ref: 'localbuildcrd:test' ignore-unfixed: true - version: ${{ env.TRIVY_VERSION }} - name: Run Trivy vulnerability scanner on localbuild:test and exit on HIGH severity uses: aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564 # 0.27.0 @@ -86,7 +81,6 @@ jobs: ignore-unfixed: true severity: 'HIGH,CRITICAL' exit-code: '1' - version: ${{ env.TRIVY_VERSION }} - name: Run Trivy vulnerability scanner on localbuildcrd:test and exit on HIGH severity uses: aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564 # 0.27.0 @@ -96,4 +90,3 @@ jobs: ignore-unfixed: true severity: 'HIGH,CRITICAL' exit-code: '1' - version: ${{ env.TRIVY_VERSION }}