diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index be503ed89a..b8e7e807a9 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -317,7 +317,7 @@ jobs: NGINX_CONF_DIR=internal/mode/static/nginx/conf - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 # 0.13.0 + uses: aquasecurity/trivy-action@f78e9ecf42a1271402d4f484518b9313235990e1 # 0.13.1 continue-on-error: true with: image-ref: ghcr.io/nginxinc/nginx-gateway-fabric${{ matrix.container == 'nginx' && '/nginx' || '' }}:${{ steps.meta.outputs.version }} diff --git a/.github/workflows/update-docker-images.yml b/.github/workflows/update-docker-images.yml index dc74ca7149..7c1d8c7a37 100644 --- a/.github/workflows/update-docker-images.yml +++ b/.github/workflows/update-docker-images.yml @@ -123,7 +123,7 @@ jobs: NGINX_CONF_DIR=internal/mode/static/nginx/conf - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 # 0.13.0 + uses: aquasecurity/trivy-action@f78e9ecf42a1271402d4f484518b9313235990e1 # 0.13.1 continue-on-error: true with: image-ref: ghcr.io/nginxinc/nginx-gateway-fabric/nginx:${{ needs.variables.outputs.ngf_tag }}