Skip to content

Commit d9852d4

Browse files
ci: bump the github-actions-updates group with 2 updates (#141)
Bumps the github-actions-updates group with 2 updates: [github/codeql-action](https://github.com/github/codeql-action) and [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action). Updates `github/codeql-action` from 4.32.3 to 4.32.4 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@v4.32.3...v4.32.4) Updates `aquasecurity/trivy-action` from 0.34.0 to 0.34.1 - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@0.34.0...0.34.1) --- updated-dependencies: - dependency-name: github/codeql-action dependency-version: 4.32.4 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions-updates - dependency-name: aquasecurity/trivy-action dependency-version: 0.34.1 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions-updates ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent 4f3699c commit d9852d4

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

.github/workflows/ci.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ jobs:
9090
dotnet-version: ${{ env.DOTNET_VERSION }}
9191

9292
- name: Initialize CodeQL
93-
uses: github/codeql-action/init@v4.32.3
93+
uses: github/codeql-action/init@v4.32.4
9494
with:
9595
languages: ${{ matrix.language }}
9696
build-mode: manual
@@ -101,7 +101,7 @@ jobs:
101101
dotnet build OpenReferralApi.sln --configuration Release --no-restore --verbosity normal
102102
103103
- name: Perform CodeQL Analysis
104-
uses: github/codeql-action/analyze@v4.32.3
104+
uses: github/codeql-action/analyze@v4.32.4
105105

106106
security-scan-fs:
107107
name: Trivy Filesystem Scan
@@ -113,7 +113,7 @@ jobs:
113113
uses: actions/checkout@v6.0.2
114114

115115
- name: Run Trivy (filesystem)
116-
uses: aquasecurity/trivy-action@0.34.0
116+
uses: aquasecurity/trivy-action@0.34.1
117117
with:
118118
scan-type: 'fs'
119119
scan-ref: '.'
@@ -122,7 +122,7 @@ jobs:
122122
severity: 'CRITICAL,HIGH,MEDIUM,UNKNOWN'
123123

124124
- name: Upload Trivy FS SARIF
125-
uses: github/codeql-action/upload-sarif@v4.32.3
125+
uses: github/codeql-action/upload-sarif@v4.32.4
126126
if: always()
127127
with:
128128
sarif_file: trivy-fs-results.sarif
@@ -199,7 +199,7 @@ jobs:
199199
password: ${{ secrets.GITHUB_TOKEN }}
200200

201201
- name: Run Trivy on built image
202-
uses: aquasecurity/trivy-action@0.34.0
202+
uses: aquasecurity/trivy-action@0.34.1
203203
continue-on-error: true
204204
with:
205205
image-ref: ${{ needs.docker-build.outputs.image_ref }}
@@ -246,7 +246,7 @@ jobs:
246246
fi
247247
248248
- name: Upload Trivy Image SARIF
249-
uses: github/codeql-action/upload-sarif@v4.32.3
249+
uses: github/codeql-action/upload-sarif@v4.32.4
250250
if: steps.trivy_sarif.outputs.present == 'true'
251251
with:
252252
sarif_file: trivy-image-results.sarif

.github/workflows/codeql.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727

2828
# 2. Initialize CodeQL
2929
- name: Initialize CodeQL
30-
uses: github/codeql-action/init@v4.32.3
30+
uses: github/codeql-action/init@v4.32.4
3131
with:
3232
languages: csharp
3333
queries: security-and-quality
@@ -41,4 +41,4 @@ jobs:
4141
4242
# 4. Perform Analysis
4343
- name: Perform CodeQL Analysis
44-
uses: github/codeql-action/analyze@v4.32.3
44+
uses: github/codeql-action/analyze@v4.32.4

.github/workflows/trivy.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ jobs:
1919
uses: actions/checkout@v6.0.2
2020

2121
- name: Run Trivy vulnerability scanner (Config & Dependency)
22-
uses: aquasecurity/trivy-action@0.34.0 # Use the latest version
22+
uses: aquasecurity/trivy-action@0.34.1 # Use the latest version
2323
with:
2424
scan-type: 'fs' # Scans the file system
2525
scan-ref: '.'
@@ -29,7 +29,7 @@ jobs:
2929
# Trivy will ignore these checks if you have a .trivyignore file
3030

3131
- name: Upload Trivy scan results to GitHub Security
32-
uses: github/codeql-action/upload-sarif@v4.32.3
32+
uses: github/codeql-action/upload-sarif@v4.32.4
3333
if: always() # Upload results even if vulnerabilities are found
3434
with:
3535
sarif_file: 'trivy-results.sarif'

0 commit comments

Comments
 (0)