diff --git a/.gitea/workflows/ci.yml b/.gitea/workflows/ci.yml index 11ca8f0..9ce78f6 100644 --- a/.gitea/workflows/ci.yml +++ b/.gitea/workflows/ci.yml @@ -74,13 +74,11 @@ jobs: RUNNER=${{ steps.config.outputs.runner }} - name: 🛡️ Run Trivy Vulnerability Scanner - uses: aquasecurity/trivy-action@master + uses: docker://aquasec/trivy:latest env: + TRIVY_USERNAME: ${{ gitea.actor }} + TRIVY_PASSWORD: ${{ secrets.G1T34_TOKEN }} # Unset the fake GITHUB_TOKEN injected by Gitea GITHUB_TOKEN: "" with: - image-ref: ${{ steps.meta.outputs.tags }} - format: 'table' - exit-code: '1' - ignore-unfixed: true - severity: 'CRITAL, HIGH' + args: image --format table --exit-code 1 --ignore-unfixed --severity CRITICAL,HIGH gitea.iswearihadsomethingforthis.net/francwa/${{ steps.config.outputs.image_name }}:latest