From c80d3cb8d7bfabae9f047f6b8ea68792dd2ebcf6 Mon Sep 17 00:00:00 2001 From: Michael Kedar Date: Wed, 2 Oct 2024 16:16:36 +1000 Subject: [PATCH] Update actions to use v1.9.0 osv-scanner image --- README.md | 2 +- osv-reporter-action/action.yml | 2 +- osv-scanner-action/action.yml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index e870350..7c63eca 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # OSV-Scanner CI/CD Action -[![Release v1.8.5](https://img.shields.io/badge/release-v1.8.5-blue?style=flat)](https://github.com/google/osv-scanner-action/releases) +[![Release v1.9.0](https://img.shields.io/badge/release-v1.9.0-blue?style=flat)](https://github.com/google/osv-scanner-action/releases) The OSV-Scanner CI/CD action leverages the [OSV.dev](https://osv.dev/) database and the [OSV-Scanner](https://google.github.io/osv-scanner/) CLI tool to track and notify you of known vulnerabilities in your dependencies for over 11 [languages and ecosystems](https://google.github.io/osv-scanner/supported-languages-and-lockfiles/). diff --git a/osv-reporter-action/action.yml b/osv-reporter-action/action.yml index e7549e7..72f2dd4 100644 --- a/osv-reporter-action/action.yml +++ b/osv-reporter-action/action.yml @@ -22,7 +22,7 @@ inputs: required: true runs: using: "docker" - image: "docker://ghcr.io/google/osv-scanner-action:v1.8.5" + image: "docker://ghcr.io/google/osv-scanner-action:v1.9.0" entrypoint: /root/osv-reporter args: - "${{ inputs.scan-args }}" diff --git a/osv-scanner-action/action.yml b/osv-scanner-action/action.yml index faa2651..621e133 100644 --- a/osv-scanner-action/action.yml +++ b/osv-scanner-action/action.yml @@ -25,6 +25,6 @@ inputs: ./ runs: using: "docker" - image: "docker://ghcr.io/google/osv-scanner-action:v1.8.5" + image: "docker://ghcr.io/google/osv-scanner-action:v1.9.0" args: - ${{ inputs.scan-args }}