diff --git a/.github/workflows/_build-and-push.yml b/.github/workflows/_build-and-push.yml index 5b17a750f6..41949f940f 100644 --- a/.github/workflows/_build-and-push.yml +++ b/.github/workflows/_build-and-push.yml @@ -250,7 +250,7 @@ jobs: - name: Upload Trivy scan results to GitHub Security tab id: trivy_upload_sarif - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v3 if: | (steps.trivy_scan.outcome == 'success' || steps.trivy_scan.outcome == 'failure') && (inputs.specific_path == 'all' || inputs.specific_path == matrix.svc_prefix) diff --git a/.github/workflows/psalm-static-analysis-api.yml b/.github/workflows/psalm-static-analysis-api.yml index 05279e2c0b..1158611704 100644 --- a/.github/workflows/psalm-static-analysis-api.yml +++ b/.github/workflows/psalm-static-analysis-api.yml @@ -46,6 +46,6 @@ jobs: run: psalm --output-format=github --taint-analysis --report=results.sarif - name: Upload Security Analysis results to GitHub - uses: github/codeql-action/upload-sarif@v1 + uses: github/codeql-action/upload-sarif@v3 with: sarif_file: ./${{ env.SERVICE-PATH }}/app/results.sarif diff --git a/.github/workflows/psalm-static-analysis-front.yml b/.github/workflows/psalm-static-analysis-front.yml index c15d55e589..d4e3381f6b 100644 --- a/.github/workflows/psalm-static-analysis-front.yml +++ b/.github/workflows/psalm-static-analysis-front.yml @@ -46,6 +46,6 @@ jobs: run: psalm --output-format=github --taint-analysis --report=results.sarif - name: Upload Security Analysis results to GitHub - uses: github/codeql-action/upload-sarif@v1 + uses: github/codeql-action/upload-sarif@v3 with: sarif_file: ./${{ env.SERVICE-PATH }}/app/results.sarif diff --git a/.github/workflows/scheduled-codeql-analysis.yml b/.github/workflows/scheduled-codeql-analysis.yml index 5e43fedd29..b226d3ee30 100644 --- a/.github/workflows/scheduled-codeql-analysis.yml +++ b/.github/workflows/scheduled-codeql-analysis.yml @@ -34,7 +34,7 @@ jobs: # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@v2 + uses: github/codeql-action/init@v3 with: languages: ${{ matrix.language }} # If you wish to specify custom queries, you can do so here or in a config file. @@ -45,7 +45,7 @@ jobs: # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). # If this step fails, then you should remove it and run the build manually (see below) - name: Autobuild - uses: github/codeql-action/autobuild@v2 + uses: github/codeql-action/autobuild@v3 # ℹī¸ Command-line programs to run using the OS shell. # 📚 https://git.io/JvXDl @@ -59,4 +59,4 @@ jobs: # make release - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v2 + uses: github/codeql-action/analyze@v3 diff --git a/.github/workflows/scheduled-tfsec.yml b/.github/workflows/scheduled-tfsec.yml index b95460c49f..4dfd037cc0 100644 --- a/.github/workflows/scheduled-tfsec.yml +++ b/.github/workflows/scheduled-tfsec.yml @@ -23,7 +23,7 @@ jobs: sarif_file: tfsec.sarif - name: Upload SARIF file - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v3 with: # Path to SARIF file relative to the root of the repository sarif_file: tfsec.sarif