37
37
uses :./.github/actions/setup-go
38
38
39
39
-name :Initialize CodeQL
40
- uses :github/codeql-action/init@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
40
+ uses :github/codeql-action/init@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
41
41
with :
42
42
languages :go, javascript
43
43
47
47
rm Makefile
48
48
49
49
-name :Perform CodeQL Analysis
50
- uses :github/codeql-action/analyze@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
50
+ uses :github/codeql-action/analyze@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
51
51
52
52
-name :Send Slack notification on failure
53
53
if :${{ failure() }}
@@ -124,15 +124,15 @@ jobs:
124
124
echo "image=$(cat "$image_job")" >> $GITHUB_OUTPUT
125
125
126
126
-name :Run Trivy vulnerability scanner
127
- uses :aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564
127
+ uses :aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2
128
128
with :
129
129
image-ref :${{ steps.build.outputs.image }}
130
130
format :sarif
131
131
output :trivy-results.sarif
132
132
severity :" CRITICAL,HIGH"
133
133
134
134
-name :Upload Trivy scan results to GitHub Security tab
135
- uses :github/codeql-action/upload-sarif@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
135
+ uses :github/codeql-action/upload-sarif@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
136
136
with :
137
137
sarif_file :trivy-results.sarif
138
138
category :" Trivy"
@@ -147,7 +147,7 @@ jobs:
147
147
# Prisma cloud scan runs last because it fails the entire job if it
148
148
# detects vulnerabilities. :|
149
149
-name :Run Prisma Cloud image scan
150
- uses :PaloAltoNetworks/prisma-cloud-scan@1f38c94d789ff9b01a4e80070b442294ebd3e362 # v1.4.0
150
+ uses :PaloAltoNetworks/prisma-cloud-scan@124b48d8325c23f58a35da0f1b4d9a6b54301d05 # v1.6.7
151
151
with :
152
152
pcc_console_url :${{ secrets.PRISMA_CLOUD_URL }}
153
153
pcc_user :${{ secrets.PRISMA_CLOUD_ACCESS_KEY }}