-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Renovate Update Patch & Minor Updates
- Loading branch information
1 parent
1e66e6f
commit 3e61b1b
Showing
35 changed files
with
260 additions
and
197 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -42,7 +42,7 @@ jobs: | |
|
||
# Initializes the CodeQL tools for scanning. | ||
- name: Initialize CodeQL | ||
uses: github/codeql-action/[email protected].4 | ||
uses: github/codeql-action/[email protected].5 | ||
with: | ||
languages: ${{ matrix.language }} | ||
# If you wish to specify custom queries, you can do so here or in a config file. | ||
|
@@ -53,7 +53,7 @@ jobs: | |
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java). | ||
# If this step fails, then you should remove it and run the build manually (see below) | ||
- name: Autobuild | ||
uses: github/codeql-action/[email protected].4 | ||
uses: github/codeql-action/[email protected].5 | ||
|
||
# ℹ️ Command-line programs to run using the OS shell. | ||
# 📚 https://git.io/JvXDl | ||
|
@@ -67,4 +67,4 @@ jobs: | |
# make release | ||
|
||
- name: Perform CodeQL Analysis | ||
uses: github/codeql-action/[email protected].4 | ||
uses: github/codeql-action/[email protected].5 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -32,6 +32,6 @@ jobs: | |
with: | ||
sarif_file: tfsec.sarif | ||
- name: Upload SARIF file | ||
uses: github/codeql-action/[email protected].4 | ||
uses: github/codeql-action/[email protected].5 | ||
with: | ||
sarif_file: tfsec.sarif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -99,7 +99,7 @@ jobs: | |
|
||
- name: Trivy Dockerfile Configuration Scanner for ${{ matrix.ecr_repository }} | ||
id: trivy_dockerfile_misconfiguration_scan | ||
uses: aquasecurity/trivy-action@0.28.0 | ||
uses: aquasecurity/trivy-action@0.29.0 | ||
env: | ||
TRIVY_DB_REPOSITORY: ${{ steps.login_ecr.outputs.registry }}/trivy-db-public-ecr/aquasecurity/trivy-db:2 | ||
TRIVY_JAVA_DB_REPOSITORY: ${{ steps.login_ecr.outputs.registry }}/trivy-db-public-ecr/aquasecurity/trivy-java-db:1 | ||
|
@@ -131,7 +131,7 @@ jobs: | |
|
||
- name: Trivy Image Vulnerability Scanner for ${{ matrix.ecr_repository }} | ||
id: trivy_scan | ||
uses: aquasecurity/trivy-action@0.28.0 | ||
uses: aquasecurity/trivy-action@0.29.0 | ||
env: | ||
TRIVY_DB_REPOSITORY: ${{ steps.login_ecr.outputs.registry }}/trivy-db-public-ecr/aquasecurity/trivy-db:2 | ||
TRIVY_JAVA_DB_REPOSITORY: ${{ steps.login_ecr.outputs.registry }}/trivy-db-public-ecr/aquasecurity/trivy-java-db:1 | ||
|
@@ -147,13 +147,13 @@ jobs: | |
|
||
- name: Upload Trivy scan results to GitHub Security tab for ${{ matrix.ecr_repository }} | ||
id: trivy_upload_sarif | ||
uses: github/codeql-action/[email protected].4 | ||
uses: github/codeql-action/[email protected].5 | ||
if: always() | ||
with: | ||
sarif_file: 'trivy-results.sarif' | ||
- name: Trivy Image SBOM Generator for ${{ matrix.ecr_repository }} and submit results to Dependency Graph | ||
id: trivy_sbom | ||
uses: aquasecurity/trivy-action@0.28.0 | ||
uses: aquasecurity/trivy-action@0.29.0 | ||
env: | ||
TRIVY_DB_REPOSITORY: ${{ steps.login_ecr.outputs.registry }}/trivy-db-public-ecr/aquasecurity/trivy-db:2 | ||
TRIVY_JAVA_DB_REPOSITORY: ${{ steps.login_ecr.outputs.registry }}/trivy-db-public-ecr/aquasecurity/trivy-java-db:1 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -59,7 +59,7 @@ jobs: | |
--broker-password ${{ secrets.pact_broker_password }} | ||
- name: Upload coverage to Codecov | ||
uses: codecov/[email protected].0 | ||
uses: codecov/[email protected].7 | ||
with: | ||
flags: unittests | ||
files: ./coverage.out | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
FROM outofcoffee/imposter:4.2.1 | ||
FROM outofcoffee/imposter:4.2.4 | ||
|
||
COPY ./docker/mock-pay /opt/imposter/config/ | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.