From f8af5221bae5d45891ae7a23c2f3d0c938334355 Mon Sep 17 00:00:00 2001 From: Rex P Date: Wed, 10 Jul 2024 16:30:36 +1000 Subject: [PATCH] Update actions to use v1.8.2 osv-scanner image --- README.md | 2 +- osv-reporter-action/action.yml | 2 +- osv-scanner-action/action.yml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 8d0ce27..096bfa4 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # OSV-Scanner CI/CD Action -[![Release v1.8.1](https://img.shields.io/badge/release-v1.8.1-blue?style=flat)](https://github.com/google/osv-scanner-action/releases) +[![Release v1.8.2](https://img.shields.io/badge/release-v1.8.2-blue?style=flat)](https://github.com/google/osv-scanner-action/releases) The OSV-Scanner CI/CD action leverages the [OSV.dev](https://osv.dev/) database and the [OSV-Scanner](https://google.github.io/osv-scanner/) CLI tool to track and notify you of known vulnerabilities in your dependencies for over 11 [languages and ecosystems](https://google.github.io/osv-scanner/supported-languages-and-lockfiles/). diff --git a/osv-reporter-action/action.yml b/osv-reporter-action/action.yml index da27a52..96ea67c 100644 --- a/osv-reporter-action/action.yml +++ b/osv-reporter-action/action.yml @@ -22,7 +22,7 @@ inputs: required: true runs: using: "docker" - image: "docker://ghcr.io/google/osv-scanner-action:v1.8.1" + image: "docker://ghcr.io/google/osv-scanner-action:v1.8.2" entrypoint: /root/osv-reporter args: - "${{ inputs.scan-args }}" diff --git a/osv-scanner-action/action.yml b/osv-scanner-action/action.yml index 29c701d..c5e1b5e 100644 --- a/osv-scanner-action/action.yml +++ b/osv-scanner-action/action.yml @@ -25,6 +25,6 @@ inputs: ./ runs: using: "docker" - image: "docker://ghcr.io/google/osv-scanner-action:v1.8.1" + image: "docker://ghcr.io/google/osv-scanner-action:v1.8.2" args: - ${{ inputs.scan-args }}