diff --git a/.github/workflows/trivy-containers.yaml b/.github/workflows/trivy-containers.yaml index 108c407399..618a31c76f 100644 --- a/.github/workflows/trivy-containers.yaml +++ b/.github/workflows/trivy-containers.yaml @@ -66,6 +66,8 @@ jobs: - name: Scan container image uses: aquasecurity/trivy-action@0.28.0 + env: + TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db with: image-ref: '${{ matrix.image }}' output: 'results.sarif' diff --git a/.github/workflows/trivy.yaml b/.github/workflows/trivy.yaml index 52204fe5c9..7aa728c73e 100644 --- a/.github/workflows/trivy.yaml +++ b/.github/workflows/trivy.yaml @@ -15,6 +15,8 @@ name: Trivy Scanner on: pull_request: + branches: + - 'release-*' permissions: contents: read @@ -30,6 +32,8 @@ jobs: - name: Run Trivy vulnerability scanner in repo mode uses: aquasecurity/trivy-action@0.28.0 + env: + TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db with: scan-type: 'fs' ignore-unfixed: true