Skip to content

chore(deps): bump github.com/google/cel-go from 0.17.0 to 0.17.1 #531

chore(deps): bump github.com/google/cel-go from 0.17.0 to 0.17.1

chore(deps): bump github.com/google/cel-go from 0.17.0 to 0.17.1 #531

Workflow file for this run

name: Security
on:
push:
branches:
- main
pull_request:
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
# Schedule in case of no code changes
schedule:
- cron: '30 0 1,15 * *'
permissions: # added using https://github.com/step-security/secure-repo
contents: read
jobs:
trivy:
name: Trivy scanner
continue-on-error: true
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write
pull-requests: read
actions: write
if: (github.actor != 'dependabot[bot]')
steps:
-
uses: step-security/harden-runner@55d479fb1c5bcad5a4f9099a5d9f37c8857b2845
with:
disable-sudo: true
disable-telemetry: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
ghcr.io:443
github.com:443
pkg-containers.githubusercontent.com:443
-
name: Cancel previous workflows
uses: styfle/cancel-workflow-action@b173b6ec0100793626c2d9e6b90435061f4fc3e5 # 0.11.0
with:
access_token: ${{ secrets.GITHUB_TOKEN }}
-
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
-
name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/trivy-action@41f05d9ecffa2ed3f1580af306000f734b733e54 # master
with:
scan-type: 'fs'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL'
-
name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@1813ca74c3faaa3a2da2070b9b8a0b3e7373a0d8 # v2.21.0
with:
sarif_file: 'trivy-results.sarif'