@@ -39,13 +39,13 @@ jobs:
39
39
**/go.sum
40
40
**/go.mod
41
41
- name : Initialize CodeQL
42
- uses : github/codeql-action/init@f079b8493333aace61c81488f8bd40919487bd9f # v3.25.7
42
+ uses : github/codeql-action/init@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
43
43
with :
44
44
languages : go
45
45
- name : Autobuild
46
- uses : github/codeql-action/autobuild@f079b8493333aace61c81488f8bd40919487bd9f # v3.25.7
46
+ uses : github/codeql-action/autobuild@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
47
47
- name : Perform CodeQL Analysis
48
- uses : github/codeql-action/analyze@f079b8493333aace61c81488f8bd40919487bd9f # v3.25.7
48
+ uses : github/codeql-action/analyze@461ef6c76dfe95d5c364de2f431ddbd31a417628 # v3.26.9
49
49
50
50
trivy :
51
51
name : Trivy
57
57
run : |
58
58
make docker-buildx
59
59
- name : Run Trivy vulnerability scanner on controller image
60
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
60
+ uses : aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24 .0
61
61
with :
62
62
image-ref : ' ghcr.io/flux-iac/tofu-controller:latest'
63
63
format : ' table'
66
66
vuln-type : ' os,library'
67
67
severity : ' CRITICAL,HIGH'
68
68
- name : Run Trivy vulnerability scanner on runner image
69
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
69
+ uses : aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24 .0
70
70
with :
71
71
image-ref : ' ghcr.io/flux-iac/tf-runner:latest'
72
72
format : ' table'
76
76
severity : ' CRITICAL,HIGH'
77
77
skip-files : ' /usr/local/bin/terraform' # false positive
78
78
- name : Run Trivy vulnerability scanner on runner image
79
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
79
+ uses : aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24 .0
80
80
with :
81
81
image-ref : ' ghcr.io/flux-iac/tf-runner-azure:latest'
82
82
format : ' table'
86
86
severity : ' CRITICAL,HIGH'
87
87
skip-files : ' /usr/local/bin/terraform' # false positive
88
88
- name : Run Trivy vulnerability scanner on planner image
89
- uses : aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22 .0
89
+ uses : aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24 .0
90
90
with :
91
91
image-ref : ' ghcr.io/flux-iac/branch-planner:latest'
92
92
format : ' table'
0 commit comments