Skip to content

Commit e8c2e91

Browse files
Bump the github-actions group with 3 updates (#92)
Bumps the github-actions group with 3 updates: [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action), [github/codeql-action](https://github.com/github/codeql-action) and [docker/login-action](https://github.com/docker/login-action). Updates `aquasecurity/trivy-action` from 0.34.1 to 0.35.0 - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@e368e32...57a97c7) Updates `github/codeql-action` from 4.32.4 to 4.32.6 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@89a39a4...0d579ff) Updates `docker/login-action` from 3.7.0 to 4.0.0 - [Release notes](https://github.com/docker/login-action/releases) - [Commits](docker/login-action@c94ce9f...b45d80f) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-version: 0.35.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions - dependency-name: github/codeql-action dependency-version: 4.32.6 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions - dependency-name: docker/login-action dependency-version: 4.0.0 dependency-type: direct:production update-type: version-update:semver-major dependency-group: github-actions ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent 2bdc9e6 commit e8c2e91

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

.github/workflows/research-vuln-scan.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ jobs:
2323
uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2
2424

2525
- name: Run Trivy vulnerability scanner
26-
uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518
26+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1
2727
with:
2828
image-ref: '${{ vars.GREENBONE_REGISTRY }}/opensight/opensight-postgres:16'
2929
format: 'template'
@@ -36,7 +36,7 @@ jobs:
3636
TRIVY_PASSWORD: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }}
3737

3838
- name: Upload Trivy scan results to GitHub Security tab
39-
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v3.29.5
39+
uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3.29.5
4040
with:
4141
sarif_file: 'trivy-results.sarif'
4242
category: ${{ github.jobs[github.job].name }}
@@ -53,7 +53,7 @@ jobs:
5353
uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2
5454

5555
- name: Login to Greenbone Product container registry
56-
uses: docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 #v3.7.0
56+
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 #v4.0.0
5757
with:
5858
registry: ${{ vars.GREENBONE_REGISTRY }}
5959
username: ${{ secrets.GREENBONE_REGISTRY_READ_USER }}
@@ -68,7 +68,7 @@ jobs:
6868
severity-cutoff: medium
6969

7070
- name: Upload grype vulnerability report
71-
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v3.29.5
71+
uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3.29.5
7272
with:
7373
sarif_file: ${{ steps.grype.outputs.sarif }}
7474
category: ${{ github.jobs[github.job].name }}
@@ -86,7 +86,7 @@ jobs:
8686
uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2
8787

8888
- name: Login to Greenbone Product container registry
89-
uses: docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 #v3.7.0
89+
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 #v4.0.0
9090
with:
9191
registry: ${{ vars.GREENBONE_REGISTRY }}
9292
username: ${{ secrets.GREENBONE_REGISTRY_READ_USER }}
@@ -108,7 +108,7 @@ jobs:
108108
- name: Upload docker scout SARIF result
109109
id: upload-sarif
110110
if: ${{ github.event_name != 'pull_request_target' }}
111-
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v3.29.5
111+
uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3.29.5
112112
with:
113113
sarif_file: sarif.output.json
114114
category: ${{ github.jobs[github.job].name }}

0 commit comments

Comments
 (0)