File tree Expand file tree Collapse file tree 10 files changed +12
-12
lines changed
Expand file tree Collapse file tree 10 files changed +12
-12
lines changed Original file line number Diff line number Diff line change 4444
4545 # Initialize CodeQL tools for scanning
4646 - name : Initialize CodeQL
47- uses : github/codeql-action/init@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
47+ uses : github/codeql-action/init@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
4848 with :
4949 languages : ${{ matrix.language }}
5050 # Use config file to explicitly control what gets scanned
@@ -54,11 +54,11 @@ jobs:
5454
5555 # Autobuild attempts to build any compiled languages
5656 - name : Autobuild
57- uses : github/codeql-action/autobuild@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
57+ uses : github/codeql-action/autobuild@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
5858
5959 # Perform CodeQL Analysis
6060 - name : Perform CodeQL Analysis
61- uses : github/codeql-action/analyze@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
61+ uses : github/codeql-action/analyze@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
6262 with :
6363 category : " /language:${{matrix.language}}"
6464 upload : true
Original file line number Diff line number Diff line change @@ -107,7 +107,7 @@ jobs:
107107 scanners : ' vuln,secret,misconfig'
108108
109109 - name : Upload Trivy results to GitHub Security
110- uses : github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
110+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
111111 with :
112112 sarif_file : ' trivy-fs-results.sarif'
113113 category : ' dependency-scan'
Original file line number Diff line number Diff line change 9999
100100 - name : Upload SARIF
101101 if : always()
102- uses : github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
102+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
103103 with :
104104 sarif_file : semgrep.sarif
105105 category : semgrep
Original file line number Diff line number Diff line change @@ -186,7 +186,7 @@ jobs:
186186 - name : Upload SARIF to Security Tab
187187 if : always() && steps.argus.outputs.sarif-path != ''
188188 continue-on-error : true
189- uses : github/codeql-action/upload-sarif@b5ebac6f4c00c8ccddb7cdcd45fdb248329f808a # v3
189+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3
190190 with :
191191 sarif_file : ${{ steps.argus.outputs.sarif-path }}
192192 category : argus-full-pipeline
Original file line number Diff line number Diff line change @@ -177,7 +177,7 @@ jobs:
177177
178178 - name : Upload SARIF to GitHub Security
179179 if : always() && hashFiles('.argus/hybrid-results/*.sarif') != ''
180- uses : github/codeql-action/upload-sarif@b5ebac6f4c00c8ccddb7cdcd45fdb248329f808a # v3
180+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3
181181 with :
182182 sarif_file : .argus/hybrid-results/
183183 category : hybrid-security-scan
Original file line number Diff line number Diff line change @@ -169,7 +169,7 @@ jobs:
169169 severity : ' CRITICAL,HIGH'
170170
171171 - name : Upload Trivy results to GitHub Security
172- uses : github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
172+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
173173 with :
174174 sarif_file : ' trivy-results.sarif'
175175 category : ' container-image'
Original file line number Diff line number Diff line change @@ -131,7 +131,7 @@ jobs:
131131 output : ' trivy-results.sarif'
132132
133133 - name : Upload Trivy results
134- uses : github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
134+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
135135 with :
136136 sarif_file : ' trivy-results.sarif'
137137
Original file line number Diff line number Diff line change 4747
4848 # Upload results to GitHub's code scanning dashboard
4949 - name : Upload SARIF to Code Scanning
50- uses : github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
50+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
5151 with :
5252 sarif_file : results.sarif
5353 category : openssf-scorecard
Original file line number Diff line number Diff line change 7676 # Upload SARIF to GitHub Code Scanning
7777 - name : Upload SARIF to Code Scanning
7878 if : always()
79- uses : github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
79+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
8080 with :
8181 sarif_file : semgrep-results.sarif
8282 category : semgrep
Original file line number Diff line number Diff line change @@ -838,7 +838,7 @@ runs:
838838 # Upload SARIF from full pipeline to GitHub Security tab
839839 - name : Upload SARIF (Full Pipeline)
840840 if : ${{ inputs.pipeline-mode == 'full' && always() }}
841- uses : github/codeql-action/upload-sarif@b5ebac6f4c00c8ccddb7cdcd45fdb248329f808a # v3
841+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3
842842 continue-on-error : true
843843 with :
844844 sarif_file : ${{ inputs.project-path }}/.argus/hybrid-results/
You can’t perform that action at this time.
0 commit comments