From 5123aa3a35990d334f39643167910bc864ee4afd Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Sun, 20 Oct 2024 05:25:28 +0100 Subject: [PATCH] Bump github/codeql-action from 3.26.11 to 3.26.13 (#174) Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3.26.11 to 3.26.13. - [Release notes](https://github.com/github/codeql-action/releases) - [Commits](https://github.com/github/codeql-action/compare/v3.26.11...v3.26.13) --- updated-dependencies: - dependency-name: github/codeql-action dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> --- .github/workflows/charts.yml | 6 +++--- .github/workflows/scorecard.yml | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/.github/workflows/charts.yml b/.github/workflows/charts.yml index 1beac7b..ce0d765 100644 --- a/.github/workflows/charts.yml +++ b/.github/workflows/charts.yml @@ -71,10 +71,10 @@ jobs: env: CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}" - name: Initialize CodeQL - uses: github/codeql-action/init@v3.26.11 + uses: github/codeql-action/init@v3.26.13 continue-on-error: true - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3.26.11 + uses: github/codeql-action/analyze@v3.26.13 continue-on-error: true - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@master @@ -84,7 +84,7 @@ jobs: format: 'sarif' output: 'trivy-results.sarif' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3.26.11 + uses: github/codeql-action/upload-sarif@v3.26.13 with: sarif_file: 'trivy-results.sarif' diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index 432808e..963d79c 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -31,6 +31,6 @@ jobs: path: results.sarif retention-days: 5 - name: "Upload to code-scanning" - uses: github/codeql-action/upload-sarif@56d197570aa047eae7fe04401603196e2f68521d # v2.22.11 + uses: github/codeql-action/upload-sarif@b0b722f202d6f76a52f990a286c2b1eacfc5a9ff # v2.22.11 with: sarif_file: results.sarif