diff --git a/.github/workflows/cd-enhanced.yml b/.github/workflows/cd-enhanced.yml index e884566..21676fd 100644 --- a/.github/workflows/cd-enhanced.yml +++ b/.github/workflows/cd-enhanced.yml @@ -201,7 +201,7 @@ jobs: severity: 'CRITICAL,HIGH' - name: Upload Trivy results to GitHub Security - uses: github/codeql-action/upload-sarif@v3 + uses: github/codeql-action/upload-sarif@v4 with: sarif_file: 'trivy-results-${{ matrix.variant }}.sarif' category: 'docker-image-${{ matrix.variant }}' diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 5985f32..f0b8464 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -33,7 +33,7 @@ jobs: uses: actions/checkout@v4 - name: Initialize CodeQL - uses: github/codeql-action/init@v3 + uses: github/codeql-action/init@v4 with: languages: ${{ matrix.language }} queries: security-extended,security-and-quality @@ -53,7 +53,7 @@ jobs: run: npm run build - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3 + uses: github/codeql-action/analyze@v4 with: category: "/language:${{ matrix.language }}" upload: true @@ -137,7 +137,7 @@ jobs: uses: actions/checkout@v4 - name: Download CodeQL database - uses: github/codeql-action/database-upload@v3 + uses: github/codeql-action/database-upload@v4 with: language: javascript database: github/codeql diff --git a/.github/workflows/docker.yml b/.github/workflows/docker.yml index 742249c..ed21a9b 100644 --- a/.github/workflows/docker.yml +++ b/.github/workflows/docker.yml @@ -125,7 +125,7 @@ jobs: output: 'trivy-results.sarif' - name: Upload Trivy results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v4 if: always() with: sarif_file: 'trivy-results.sarif' diff --git a/.github/workflows/security-scan.yml b/.github/workflows/security-scan.yml index e227a48..e540f89 100644 --- a/.github/workflows/security-scan.yml +++ b/.github/workflows/security-scan.yml @@ -31,17 +31,17 @@ jobs: uses: actions/checkout@v4 - name: Initialize CodeQL - uses: github/codeql-action/init@v3 + uses: github/codeql-action/init@v4 with: languages: javascript, typescript queries: security-extended,security-and-quality config-file: .github/codeql-config.yml - name: Auto-build for CodeQL - uses: github/codeql-action/autobuild@v3 + uses: github/codeql-action/autobuild@v4 - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3 + uses: github/codeql-action/analyze@v4 with: category: "/language:javascript-typescript" @@ -155,7 +155,7 @@ jobs: args: --severity-threshold=high --sarif-file-output=snyk.sarif - name: Upload Snyk results to GitHub Security - uses: github/codeql-action/upload-sarif@v3 + uses: github/codeql-action/upload-sarif@v4 with: sarif_file: snyk.sarif category: 'snyk-vulnerabilities' @@ -191,7 +191,7 @@ jobs: vuln-type: 'os,library' - name: Upload Trivy results to GitHub Security - uses: github/codeql-action/upload-sarif@v3 + uses: github/codeql-action/upload-sarif@v4 with: sarif_file: 'trivy-results-${{ matrix.variant }}.sarif' category: 'trivy-container-${{ matrix.variant }}' @@ -348,7 +348,7 @@ jobs: repo_token: ${{ secrets.SCORECARD_TOKEN }} - name: Upload Scorecard results - uses: github/codeql-action/upload-sarif@v3 + uses: github/codeql-action/upload-sarif@v4 with: sarif_file: results.json