From f44769a678478a6c2b03cea0998fdfebfae516f8 Mon Sep 17 00:00:00 2001 From: Matheus Moraes Date: Thu, 21 Sep 2023 17:36:04 -0300 Subject: [PATCH] bump trivy 0.45.1 --- charts/zora/values.yaml | 2 +- config/samples/zora_v1alpha1_plugin_trivy.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/charts/zora/values.yaml b/charts/zora/values.yaml index fbdc25fe..f573fb88 100644 --- a/charts/zora/values.yaml +++ b/charts/zora/values.yaml @@ -197,7 +197,7 @@ scan: # -- trivy plugin image repository repository: ghcr.io/aquasecurity/trivy # -- trivy plugin image tag - tag: 0.44.1 + tag: 0.45.1 popeye: # -- Specifies whether the following resources should be skipped by `popeye` scans. # 1. resources from `kube-system`, `kube-public` and `kube-node-lease` namespaces; diff --git a/config/samples/zora_v1alpha1_plugin_trivy.yaml b/config/samples/zora_v1alpha1_plugin_trivy.yaml index 69a512cf..71492b09 100644 --- a/config/samples/zora_v1alpha1_plugin_trivy.yaml +++ b/config/samples/zora_v1alpha1_plugin_trivy.yaml @@ -10,7 +10,7 @@ metadata: name: trivy spec: type: vulnerability - image: ghcr.io/aquasecurity/trivy:0.44.1 + image: ghcr.io/aquasecurity/trivy:0.45.1 securityContext: allowPrivilegeEscalation: false command: