Skip to content

Commit 841fb37

Browse files
authored
chore(docs): Reference the use of a pinned version (#356)
1 parent fd25fed commit 841fb37

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

README.md

+15-15
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ jobs:
3939
run: |
4040
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
4141
- name: Run Trivy vulnerability scanner
42-
uses: aquasecurity/trivy-action@master
42+
uses: aquasecurity/trivy-action@0.20.0
4343
with:
4444
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
4545
format: 'table'
@@ -67,7 +67,7 @@ jobs:
6767
uses: actions/checkout@v3
6868

6969
- name: Run Trivy vulnerability scanner in fs mode
70-
uses: aquasecurity/trivy-action@master
70+
uses: aquasecurity/trivy-action@0.20.0
7171
with:
7272
scan-type: 'fs'
7373
scan-ref: '.'
@@ -117,7 +117,7 @@ jobs:
117117
docker save -o vuln-image.tar <your-docker-image>
118118
119119
- name: Run Trivy vulnerability scanner in tarball mode
120-
uses: aquasecurity/trivy-action@master
120+
uses: aquasecurity/trivy-action@0.20.0
121121
with:
122122
input: /github/workspace/vuln-image.tar
123123
severity: 'CRITICAL,HIGH'
@@ -145,7 +145,7 @@ jobs:
145145
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
146146
147147
- name: Run Trivy vulnerability scanner
148-
uses: aquasecurity/trivy-action@master
148+
uses: aquasecurity/trivy-action@0.20.0
149149
with:
150150
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
151151
format: 'sarif'
@@ -180,7 +180,7 @@ jobs:
180180
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
181181
182182
- name: Run Trivy vulnerability scanner
183-
uses: aquasecurity/trivy-action@master
183+
uses: aquasecurity/trivy-action@0.20.0
184184
with:
185185
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
186186
format: 'sarif'
@@ -215,7 +215,7 @@ jobs:
215215
uses: actions/checkout@v3
216216
217217
- name: Run Trivy vulnerability scanner in repo mode
218-
uses: aquasecurity/trivy-action@master
218+
uses: aquasecurity/trivy-action@0.20.0
219219
with:
220220
scan-type: 'fs'
221221
ignore-unfixed: true
@@ -249,7 +249,7 @@ jobs:
249249
uses: actions/checkout@v3
250250
251251
- name: Run Trivy vulnerability scanner with rootfs command
252-
uses: aquasecurity/trivy-action@master
252+
uses: aquasecurity/trivy-action@0.20.0
253253
with:
254254
scan-type: 'rootfs'
255255
scan-ref: 'rootfs-example-binary'
@@ -284,7 +284,7 @@ jobs:
284284
uses: actions/checkout@v3
285285
286286
- name: Run Trivy vulnerability scanner in IaC mode
287-
uses: aquasecurity/trivy-action@master
287+
uses: aquasecurity/trivy-action@0.20.0
288288
with:
289289
scan-type: 'config'
290290
hide-progress: true
@@ -328,7 +328,7 @@ jobs:
328328
uses: actions/checkout@v3
329329
330330
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
331-
uses: aquasecurity/trivy-action@master
331+
uses: aquasecurity/trivy-action@0.20.0
332332
with:
333333
scan-type: 'fs'
334334
format: 'github'
@@ -359,7 +359,7 @@ jobs:
359359
runs-on: ubuntu-20.04
360360
steps:
361361
- name: Scan image in a private registry
362-
uses: aquasecurity/trivy-action@master
362+
uses: aquasecurity/trivy-action@0.20.0
363363
with:
364364
image-ref: "private_image_registry/image_name:image_tag"
365365
scan-type: image
@@ -402,7 +402,7 @@ jobs:
402402
uses: actions/checkout@v3
403403
404404
- name: Run Trivy vulnerability scanner
405-
uses: aquasecurity/trivy-action@master
405+
uses: aquasecurity/trivy-action@0.20.0
406406
with:
407407
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
408408
format: 'sarif'
@@ -438,7 +438,7 @@ jobs:
438438
uses: actions/checkout@v3
439439
440440
- name: Run Trivy vulnerability scanner
441-
uses: aquasecurity/trivy-action@master
441+
uses: aquasecurity/trivy-action@0.20.0
442442
with:
443443
image-ref: 'aws_account_id.dkr.ecr.region.amazonaws.com/imageName:${{ github.sha }}'
444444
format: 'sarif'
@@ -474,7 +474,7 @@ jobs:
474474
uses: actions/checkout@v3
475475
476476
- name: Run Trivy vulnerability scanner
477-
uses: aquasecurity/trivy-action@master
477+
uses: aquasecurity/trivy-action@0.20.0
478478
with:
479479
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
480480
format: 'sarif'
@@ -507,7 +507,7 @@ jobs:
507507
uses: actions/checkout@v3
508508
509509
- name: Run Trivy vulnerability scanner
510-
uses: aquasecurity/trivy-action@master
510+
uses: aquasecurity/trivy-action@0.20.0
511511
with:
512512
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
513513
format: 'sarif'
@@ -530,7 +530,7 @@ This step is especially useful for private repositories without [GitHub Advanced
530530

531531
```yaml
532532
- name: Run Trivy scanner
533-
uses: aquasecurity/trivy-action@master
533+
uses: aquasecurity/trivy-action@0.20.0
534534
with:
535535
scan-type: config
536536
hide-progress: true

0 commit comments

Comments
 (0)