Skip to content

chore(deps): bump github.com/testcontainers/testcontainers-go from 0.38.0 to 0.40.0 #220

chore(deps): bump github.com/testcontainers/testcontainers-go from 0.38.0 to 0.40.0

chore(deps): bump github.com/testcontainers/testcontainers-go from 0.38.0 to 0.40.0 #220

Workflow file for this run

name: Security
on:
push:
branches: [ main ]
pull_request:
branches: [ main ]
schedule:
- cron: '0 0 * * 0' # Weekly on Sunday
permissions:
contents: read
security-events: write
jobs:
govulncheck:
name: Go Vulnerability Check
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.25.x' # Use version that matches code requirements
cache: true
check-latest: true
- name: Install govulncheck
run: go install golang.org/x/vuln/cmd/govulncheck@latest
- name: Run govulncheck
run: $(go env GOPATH)/bin/govulncheck ./...
osv-scanner:
name: OSV Security Scan
runs-on: ubuntu-latest
continue-on-error: true # Security scanners can be flaky, don't fail the whole pipeline
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.25.x' # Use version that matches code requirements
cache: true
check-latest: true
- name: Install OSV Scanner
run: go install github.com/google/osv-scanner/cmd/osv-scanner@latest
- name: Run OSV Scanner
run: $(go env GOPATH)/bin/osv-scanner scan -r .
gosec:
name: Go Security Analysis
runs-on: ubuntu-latest
continue-on-error: true # Security scanners can be flaky
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.25.x'
cache: true
check-latest: true
- name: Install gosec
run: go install github.com/securego/gosec/v2/cmd/gosec@latest
- name: Run gosec Security Scanner
run: $(go env GOPATH)/bin/gosec -fmt sarif -out results.sarif ./...
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif
if: always() && hashFiles('results.sarif') != ''