From 7758e98bd3c0d26e0ad8e5cb7e02f0a4cba3fafe Mon Sep 17 00:00:00 2001 From: paspo Date: Thu, 16 Jan 2025 23:37:52 +0100 Subject: [PATCH] test trivy server --- .gitea/workflows/vulnscan.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.gitea/workflows/vulnscan.yaml b/.gitea/workflows/vulnscan.yaml index 655df7a..3bdacb3 100644 --- a/.gitea/workflows/vulnscan.yaml +++ b/.gitea/workflows/vulnscan.yaml @@ -31,7 +31,7 @@ jobs: - name: Run Trivy vulnerability scanner id: scan run: | - trivy image --format json docker.asperti.com/paspo/ftps:latest > trivy-results.json + trivy --server ${{ secrets.TRIVY_SERVER }} --token ${{ secrets.TRIVY_SERVER }} image --format json docker.asperti.com/paspo/ftps:latest > trivy-results.json - uses: actions/cache/save@v4 if: always() # salva in cache anche se trova vulnerabilità