From ab1abee46fbba48fa2bed450f8bcad0a28c7a34d Mon Sep 17 00:00:00 2001 From: aeneasr <3372410+aeneasr@users.noreply.github.com> Date: Thu, 12 Jan 2023 08:14:02 +0100 Subject: [PATCH] ci: fix dockle action --- .github/workflows/cve-scan.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/cve-scan.yaml b/.github/workflows/cve-scan.yaml index 63bb103aa71..61d63df3491 100644 --- a/.github/workflows/cve-scan.yaml +++ b/.github/workflows/cve-scan.yaml @@ -56,7 +56,7 @@ jobs: vuln-type: "os,library" severity: "CRITICAL,HIGH" - name: Dockle Linter - uses: erzz/dockle-action@v1.3.1 + uses: erzz/dockle-action@v1.3.2 if: ${{ always() }} with: image: oryd/kratos:${{ steps.vars.outputs.sha_short }}