Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
58 commits
Select commit Hold shift + click to select a range
37c7c4a
chore(deps): update dependency knip to ^6.0.5
renovate[bot] Mar 25, 2026
846eede
Merge pull request #885 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Mar 25, 2026
1fe69c2
feat: add Top Attacking IPs chart component and integrate into CrowdS…
actions-user Mar 25, 2026
3336aae
chore: enforce local patch coverage as a blocking DoD gate
actions-user Mar 25, 2026
0a4ac41
fix: update CADDY_SECURITY_VERSION to 1.1.52 for security improvements
actions-user Mar 25, 2026
c7daa4a
chore(deps): update electron-to-chromium, lucide-react, and undici to…
actions-user Mar 25, 2026
f40fca8
fix: update CADDY_SECURITY_VERSION to 1.1.53 for security improvements
actions-user Mar 25, 2026
e6c4e46
chore: Refactor test setup for Gin framework
actions-user Mar 25, 2026
844c800
chore(deps): update actions/deploy-pages action to v5
renovate[bot] Mar 30, 2026
ccd3081
chore(deps): update codecov/codecov-action action to v6
renovate[bot] Mar 30, 2026
976ae02
chore(deps): update dependency @eslint/markdown to v8
renovate[bot] Mar 30, 2026
a72e587
chore(deps): update dependency eslint-plugin-unicorn to v64
renovate[bot] Mar 30, 2026
e40a241
fix(deps): update dependency i18next to v26
renovate[bot] Mar 30, 2026
5abd01f
fix(deps): update dependency react-i18next to v17
renovate[bot] Mar 30, 2026
9740ddb
fix: update CADDY_SECURITY_VERSION to 1.1.57 for security improvements
actions-user Mar 30, 2026
c852838
fix: update CORAZA_CADDY_VERSION to 2.3.0 for compatibility improvements
actions-user Mar 30, 2026
0a43a76
fix: update CROWDSEC_VERSION to 1.7.7 for compatibility improvements
actions-user Mar 30, 2026
e84df69
fix: add vulnerability suppressions for Docker AuthZ plugin bypass an…
actions-user Mar 30, 2026
3e92629
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 30, 2026
237a3a4
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 30, 2026
b75f92a
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 30, 2026
4abc294
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 30, 2026
bf4dd17
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 30, 2026
e2774cc
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 30, 2026
543388b
fix(deps): update non-major-updates
renovate[bot] Mar 31, 2026
07e6ad2
Merge pull request #891 from Wikid82/renovate/feature/beta-release-ac…
Wikid82 Mar 31, 2026
1d3e60b
Merge pull request #892 from Wikid82/renovate/feature/beta-release-co…
Wikid82 Mar 31, 2026
64cbe5a
Merge pull request #893 from Wikid82/renovate/feature/beta-release-es…
Wikid82 Mar 31, 2026
b6558d4
Merge pull request #894 from Wikid82/renovate/feature/beta-release-es…
Wikid82 Mar 31, 2026
cab3c68
Merge pull request #895 from Wikid82/renovate/feature/beta-release-i1…
Wikid82 Mar 31, 2026
35b003a
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 31, 2026
087ae9c
Merge pull request #890 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Mar 31, 2026
8d56760
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Mar 31, 2026
64c9d7a
fix: update CADDY_SECURITY_VERSION to 1.1.61 for security improvements
actions-user Apr 3, 2026
2998571
fix: update CORAZA_CADDY_VERSION to 2.4.0 for compatibility improvements
actions-user Apr 3, 2026
5ba8cd6
fix: add npmDedupe to postUpdateOptions for improved dependency manag…
actions-user Apr 3, 2026
e06a8cb
fix: update go-sqlite3 and other dependencies for compatibility and i…
actions-user Apr 3, 2026
34d73ad
fix: update dependencies for @emnapi/core, @emnapi/runtime, @emnapi/w…
actions-user Apr 3, 2026
2b8ed06
fix: remediate axios supply chain compromise and harden CI workflow p…
actions-user Apr 4, 2026
625fcf8
fix: update Trivy action version and extend vulnerability review date…
actions-user Apr 4, 2026
29e069a
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Apr 4, 2026
b458610
fix(deps): update non-major-updates
renovate[bot] Apr 4, 2026
ce4a9c5
Merge pull request #896 from Wikid82/renovate/feature/beta-release-re…
Wikid82 Apr 4, 2026
bb64ca6
Merge branch 'feature/beta-release' into renovate/feature/beta-releas…
Wikid82 Apr 4, 2026
4603b57
Merge pull request #908 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Apr 4, 2026
d0deef1
Merge branch 'development' into feature/beta-release
Wikid82 Apr 4, 2026
9753a13
fix(deps): update dependency react-i18next to v17
renovate[bot] Apr 4, 2026
0634357
fix(deps): update dependency tldts to ^7.0.28
renovate[bot] Apr 5, 2026
de020d9
Merge pull request #909 from Wikid82/renovate/feature/beta-release-re…
Wikid82 Apr 5, 2026
cb4ae83
Merge pull request #910 from Wikid82/renovate/feature/beta-release-no…
Wikid82 Apr 5, 2026
fc0e31d
fix(deps): update tldts and tldts-core to version 7.0.28 for compatib…
actions-user Apr 5, 2026
85a8056
fix(ci): load Grype ignore config in supply chain verification
actions-user Apr 5, 2026
b48794d
fix(deps): update smol-toml version constraint to ensure compatibility
actions-user Apr 5, 2026
a8ef9dd
fix(crowdsec): use read lock for non-mutating cache lookups
actions-user Apr 5, 2026
1384263
fix(models): prevent zero-date serialization for optional ExpiresAt
actions-user Apr 5, 2026
32a3043
fix(security): prevent client injection of enrichment fields on decis…
actions-user Apr 5, 2026
5e73ba7
fix(security): add temporary ignore rules for transitive HIGH vulnera…
actions-user Apr 5, 2026
47d306b
fix(docker): ensure CrowdSec hub index and collections bootstrap on e…
actions-user Apr 5, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 10 additions & 10 deletions .docker/docker-entrypoint.sh
Original file line number Diff line number Diff line change
Expand Up @@ -310,23 +310,23 @@ ACQUIS_EOF
echo "✗ WARNING: LAPI port configuration may be incorrect"
fi

# Update hub index to ensure CrowdSec can start
if [ ! -f "/etc/crowdsec/hub/.index.json" ]; then
echo "Updating CrowdSec hub index..."
timeout 60s cscli hub update 2>/dev/null || echo "⚠️ Hub update timed out or failed, continuing..."
# Always refresh hub index on startup (stale index causes hash mismatch errors on collection install)
echo "Updating CrowdSec hub index..."
if ! timeout 60s cscli hub update 2>&1; then
echo "⚠️ Hub index update failed (network issue?). Collections may fail to install."
echo " CrowdSec will still start with whatever index is cached."
fi

# Ensure local machine is registered (auto-heal for volume/config mismatch)
# We force registration because we just restored configuration (and likely credentials)
echo "Registering local machine..."
cscli machines add -a --force 2>/dev/null || echo "Warning: Machine registration may have failed"

# Install hub items (parsers, scenarios, collections) if local mode enabled
if [ "$SECURITY_CROWDSEC_MODE" = "local" ]; then
echo "Installing CrowdSec hub items..."
if [ -x /usr/local/bin/install_hub_items.sh ]; then
/usr/local/bin/install_hub_items.sh 2>/dev/null || echo "Warning: Some hub items may not have installed"
fi
# Always ensure required collections are present (idempotent — already-installed items are skipped).
# Collections are just config files with zero runtime cost when CrowdSec is disabled.
echo "Ensuring CrowdSec hub items are installed..."
if [ -x /usr/local/bin/install_hub_items.sh ]; then
/usr/local/bin/install_hub_items.sh || echo "⚠️ Some hub items may not have installed. CrowdSec can still start."
fi

# Fix ownership AFTER cscli commands (they run as root and create root-owned files)
Expand Down
18 changes: 11 additions & 7 deletions .github/agents/Management.agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -167,23 +167,27 @@ The task is not complete until ALL of the following pass with zero issues:
- **Base URL**: Uses `PLAYWRIGHT_BASE_URL` or default from `playwright.config.js`
- All E2E tests must pass before proceeding to unit tests

2. **Local Patch Coverage Preflight (MANDATORY - Before Unit/Coverage Tests)**:
- Ensure the local patch report is run first via VS Code task `Test: Local Patch Report` or `bash scripts/local-patch-report.sh`.
- Verify both artifacts exist: `test-results/local-patch-report.md` and `test-results/local-patch-report.json`.
- Use this report to identify changed files needing coverage before running backend/frontend coverage suites.

3. **Coverage Tests (MANDATORY - Verify Explicitly)**:
2. **Coverage Tests (MANDATORY - Verify Explicitly)**:
- **Backend**: Ensure `Backend_Dev` ran VS Code task "Test: Backend with Coverage" or `scripts/go-test-coverage.sh`
- **Frontend**: Ensure `Frontend_Dev` ran VS Code task "Test: Frontend with Coverage" or `scripts/frontend-test-coverage.sh`
- **Why**: These are in manual stage of pre-commit for performance. Subagents MUST run them via VS Code tasks or scripts.
- Minimum coverage: 85% for both backend and frontend.
- All tests must pass with zero failures.
- **Outputs**: `backend/coverage.txt` and `frontend/coverage/lcov.info` — these are required inputs for step 3.

3. **Local Patch Coverage Report (MANDATORY - After Coverage Tests)**:
- **Purpose**: Identify uncovered lines in files modified by this task so missing tests are written before declaring Done. This is the bridge between "overall coverage is fine" and "the actual lines I changed are tested."
- **Prerequisites**: `backend/coverage.txt` and `frontend/coverage/lcov.info` must exist (generated by step 2). If missing, run coverage tests first.
- **Run**: VS Code task `Test: Local Patch Report` or `bash scripts/local-patch-report.sh`.
- **Verify artifacts**: Both `test-results/local-patch-report.md` and `test-results/local-patch-report.json` must exist with non-empty results.
- **Act on findings**: If patch coverage for any changed file is below **90%**, delegate to the responsible agent (`Backend_Dev` or `Frontend_Dev`) to add targeted tests covering the uncovered lines. Re-run coverage (step 2) and this report until the threshold is met.
- **Blocking gate**: 90% overall patch coverage. Do not proceed to pre-commit or security scans until resolved or explicitly waived by the user.

4. **Type Safety (Frontend)**:
- Ensure `Frontend_Dev` ran VS Code task "Lint: TypeScript Check" or `npm run type-check`
- **Why**: This check is in manual stage of pre-commit for performance. Subagents MUST run it explicitly.

5. **Pre-commit Hooks**: Ensure `QA_Security` ran `pre-commit run --all-files` (fast hooks only; coverage was verified in step 3)
5. **Pre-commit Hooks**: Ensure `QA_Security` ran `pre-commit run --all-files` (fast hooks only; coverage was verified in step 2)

6. **Security Scans**: Ensure `QA_Security` ran the following with zero Critical or High severity issues:
- **Trivy Filesystem Scan**: Fast scan of source code and dependencies
Expand Down
21 changes: 17 additions & 4 deletions .github/instructions/testing.instructions.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,9 +12,19 @@ instruction files take precedence over agent files and operator documentation.

**MANDATORY**: Before running unit tests, verify the application UI/UX functions correctly end-to-end.

## 0.5 Local Patch Coverage Preflight (Before Unit Tests)
## 0.5 Local Patch Coverage Report (After Coverage Tests)

**MANDATORY**: After E2E and before backend/frontend unit coverage runs, generate a local patch report so uncovered changed lines are visible early.
**MANDATORY**: After running backend and frontend coverage tests (which generate
`backend/coverage.txt` and `frontend/coverage/lcov.info`), run the local patch
report to identify uncovered lines in changed files.

**Purpose**: Overall coverage can be healthy while the specific lines you changed
are untested. This step catches that gap. If uncovered lines are found in
feature code, add targeted tests before completing the task.

**Prerequisites**: Coverage artifacts must exist before running the report:
- `backend/coverage.txt` — generated by `scripts/go-test-coverage.sh`
- `frontend/coverage/lcov.info` — generated by `scripts/frontend-test-coverage.sh`

Run one of the following from `/projects/Charon`:

Expand All @@ -26,11 +36,14 @@ Test: Local Patch Report
bash scripts/local-patch-report.sh
```

Required artifacts:
Required output artifacts:
- `test-results/local-patch-report.md`
- `test-results/local-patch-report.json`

This preflight is advisory for thresholds during rollout, but artifact generation is required in DoD.
**Action on results**: If patch coverage for any changed file is below 90%, add
tests targeting the uncovered changed lines. Re-run coverage and this report to
verify improvement. Artifact generation is required for DoD regardless of
threshold results.

### PREREQUISITE: Start E2E Environment

Expand Down
1 change: 1 addition & 0 deletions .github/renovate.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"development"

],
"postUpdateOptions": ["npmDedupe"],
"timezone": "America/New_York",
"dependencyDashboard": true,
"dependencyDashboardApproval": true,
Expand Down
4 changes: 4 additions & 0 deletions .github/skills/security-scan-docker-image-scripts/run.sh
Original file line number Diff line number Diff line change
Expand Up @@ -139,7 +139,10 @@ log_info "This may take 30-60 seconds on first run (database download)"

# Run Grype against the SBOM (generated from image, not filesystem)
# This matches exactly what CI does in supply-chain-pr.yml
# --config ensures .grype.yaml ignore rules are applied, separating
# ignored matches from actionable ones in the JSON output
if grype sbom:sbom.cyclonedx.json \
--config .grype.yaml \
--output json \
--file grype-results.json; then
log_success "Vulnerability scan complete"
Expand All @@ -149,6 +152,7 @@ fi

# Generate SARIF output for GitHub Security (matches CI)
grype sbom:sbom.cyclonedx.json \
--config .grype.yaml \
--output sarif \
--file grype-results.sarif 2>/dev/null || true

Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/auto-add-to-project.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@ concurrency:
group: ${{ github.workflow }}-${{ github.event.issue.number || github.event.pull_request.number }}
cancel-in-progress: false

permissions:
contents: read

jobs:
add-to-project:
runs-on: ubuntu-latest
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/auto-changelog.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ concurrency:
group: ${{ github.workflow }}-${{ github.event_name }}-${{ github.event.workflow_run.head_branch || github.head_ref || github.ref_name }}
cancel-in-progress: true

permissions:
contents: write

jobs:
update-draft:
runs-on: ubuntu-latest
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/auto-label-issues.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@ concurrency:
group: ${{ github.workflow }}-${{ github.event.issue.number }}
cancel-in-progress: true

permissions:
contents: read

jobs:
auto-label:
runs-on: ubuntu-latest
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/benchmark.yml
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ jobs:
ref: ${{ github.event.workflow_run.head_sha || github.sha }}

- name: Set up Go
uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # v6
uses: actions/setup-go@4a3601121dd01d1626a1e23e37211e3254c1c06c # v6
with:
go-version: ${{ env.GO_VERSION }}

Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/cerberus-integration.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@ concurrency:
group: ${{ github.workflow }}-${{ github.event.workflow_run.event || github.event_name }}-${{ github.event.workflow_run.head_branch || github.ref }}
cancel-in-progress: true

permissions:
contents: read

jobs:
cerberus-integration:
name: Cerberus Security Stack Integration
Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/codecov-upload.yml
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ jobs:
ref: ${{ github.sha }}

- name: Set up Go
uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # v6
uses: actions/setup-go@4a3601121dd01d1626a1e23e37211e3254c1c06c # v6
with:
go-version: ${{ env.GO_VERSION }}

Expand Down Expand Up @@ -146,7 +146,7 @@ jobs:
retention-days: 7

- name: Upload backend coverage to Codecov
uses: codecov/codecov-action@1af58845a975a7985b0beb0cbe6fbbb71a41dbad # v5
uses: codecov/codecov-action@57e3a136b779b570ffcdbf80b3bdc90e7fab3de2 # v6
with:
token: ${{ secrets.CODECOV_TOKEN }}
files: ./backend/coverage.txt
Expand Down Expand Up @@ -183,7 +183,7 @@ jobs:
exit "${PIPESTATUS[0]}"

- name: Upload frontend coverage to Codecov
uses: codecov/codecov-action@1af58845a975a7985b0beb0cbe6fbbb71a41dbad # v5
uses: codecov/codecov-action@57e3a136b779b570ffcdbf80b3bdc90e7fab3de2 # v6
with:
token: ${{ secrets.CODECOV_TOKEN }}
directory: ./frontend/coverage
Expand Down
8 changes: 4 additions & 4 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ jobs:
run: bash scripts/ci/check-codeql-parity.sh

- name: Initialize CodeQL
uses: github/codeql-action/init@38697555549f1db7851b81482ff19f1fa5c4fedc # v4
uses: github/codeql-action/init@c10b8064de6f491fea524254123dbe5e09572f13 # v4
with:
languages: ${{ matrix.language }}
queries: security-and-quality
Expand All @@ -63,7 +63,7 @@ jobs:

- name: Setup Go
if: matrix.language == 'go'
uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # v6
uses: actions/setup-go@4a3601121dd01d1626a1e23e37211e3254c1c06c # v6
with:
go-version: ${{ env.GO_VERSION }}
cache-dependency-path: backend/go.sum
Expand Down Expand Up @@ -92,10 +92,10 @@ jobs:
run: mkdir -p sarif-results

- name: Autobuild
uses: github/codeql-action/autobuild@38697555549f1db7851b81482ff19f1fa5c4fedc # v4
uses: github/codeql-action/autobuild@c10b8064de6f491fea524254123dbe5e09572f13 # v4

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@38697555549f1db7851b81482ff19f1fa5c4fedc # v4
uses: github/codeql-action/analyze@c10b8064de6f491fea524254123dbe5e09572f13 # v4
with:
category: "/language:${{ matrix.language }}"
output: sarif-results/${{ matrix.language }}
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/create-labels.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@ concurrency:
group: ${{ github.workflow }}
cancel-in-progress: false

permissions:
contents: read

jobs:
create-labels:
runs-on: ubuntu-latest
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/crowdsec-integration.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@ concurrency:
group: ${{ github.workflow }}-${{ github.event.workflow_run.event || github.event_name }}-${{ github.event.workflow_run.head_branch || github.ref }}
cancel-in-progress: true

permissions:
contents: read

jobs:
crowdsec-integration:
name: CrowdSec Bouncer Integration
Expand Down
21 changes: 12 additions & 9 deletions .github/workflows/docker-build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,9 @@ concurrency:
group: ${{ github.workflow }}-${{ github.event_name }}-${{ github.event_name == 'workflow_run' && github.event.workflow_run.head_branch || github.head_ref || github.ref_name }}
cancel-in-progress: true

permissions:
contents: read

env:
GHCR_REGISTRY: ghcr.io
DOCKERHUB_REGISTRY: docker.io
Expand Down Expand Up @@ -130,15 +133,15 @@ jobs:

- name: Log in to GitHub Container Registry
if: steps.skip.outputs.skip_build != 'true'
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # v4.0.0
uses: docker/login-action@4907a6ddec9925e35a0a9e82d7399ccc52663121 # v4.1.0
with:
registry: ${{ env.GHCR_REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Log in to Docker Hub
if: steps.skip.outputs.skip_build != 'true' && env.HAS_DOCKERHUB_TOKEN == 'true'
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # v4.0.0
uses: docker/login-action@4907a6ddec9925e35a0a9e82d7399ccc52663121 # v4.1.0
with:
registry: docker.io
username: ${{ secrets.DOCKERHUB_USERNAME }}
Expand Down Expand Up @@ -565,7 +568,7 @@ jobs:

- name: Upload Trivy results
if: env.TRIGGER_EVENT != 'pull_request' && steps.skip.outputs.skip_build != 'true' && steps.trivy-check.outputs.exists == 'true'
uses: github/codeql-action/upload-sarif@38697555549f1db7851b81482ff19f1fa5c4fedc # v4.34.1
uses: github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
with:
sarif_file: 'trivy-results.sarif'
category: '.github/workflows/docker-build.yml:build-and-push'
Expand Down Expand Up @@ -594,7 +597,7 @@ jobs:
# Install Cosign for keyless signing
- name: Install Cosign
if: env.TRIGGER_EVENT != 'pull_request' && steps.skip.outputs.skip_build != 'true' && steps.skip.outputs.is_feature_push != 'true'
uses: sigstore/cosign-installer@ba7bc0a3fef59531c69a25acd34668d6d3fe6f22 # v4.1.0
uses: sigstore/cosign-installer@cad07c2e89fa2edd6e2d7bab4c1aa38e53f76003 # v4.1.1

# Sign GHCR image with keyless signing (Sigstore/Fulcio)
- name: Sign GHCR Image
Expand Down Expand Up @@ -660,7 +663,7 @@ jobs:
echo "image_ref=${{ env.GHCR_REGISTRY }}/${{ env.IMAGE_NAME }}:${PR_TAG}" >> "$GITHUB_OUTPUT"

- name: Log in to GitHub Container Registry
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # v4.0.0
uses: docker/login-action@4907a6ddec9925e35a0a9e82d7399ccc52663121 # v4.1.0
with:
registry: ${{ env.GHCR_REGISTRY }}
username: ${{ github.actor }}
Expand Down Expand Up @@ -724,30 +727,30 @@ jobs:

- name: Upload Trivy scan results
if: always() && steps.trivy-pr-check.outputs.exists == 'true'
uses: github/codeql-action/upload-sarif@38697555549f1db7851b81482ff19f1fa5c4fedc # v4.34.1
uses: github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
with:
sarif_file: 'trivy-pr-results.sarif'
category: 'docker-pr-image'

- name: Upload Trivy compatibility results (docker-build category)
if: always() && steps.trivy-pr-check.outputs.exists == 'true'
uses: github/codeql-action/upload-sarif@38697555549f1db7851b81482ff19f1fa5c4fedc # v4.34.1
uses: github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
with:
sarif_file: 'trivy-pr-results.sarif'
category: '.github/workflows/docker-build.yml:build-and-push'
continue-on-error: true

- name: Upload Trivy compatibility results (docker-publish alias)
if: always() && steps.trivy-pr-check.outputs.exists == 'true'
uses: github/codeql-action/upload-sarif@38697555549f1db7851b81482ff19f1fa5c4fedc # v4.34.1
uses: github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
with:
sarif_file: 'trivy-pr-results.sarif'
category: '.github/workflows/docker-publish.yml:build-and-push'
continue-on-error: true

- name: Upload Trivy compatibility results (nightly alias)
if: always() && steps.trivy-pr-check.outputs.exists == 'true'
uses: github/codeql-action/upload-sarif@38697555549f1db7851b81482ff19f1fa5c4fedc # v4.34.1
uses: github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
with:
sarif_file: 'trivy-pr-results.sarif'
category: 'trivy-nightly'
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/docs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -372,7 +372,7 @@ jobs:
# Deploy to GitHub Pages
- name: 🚀 Deploy to GitHub Pages
id: deployment
uses: actions/deploy-pages@d6db90164ac5ed86f2b6aed7e0febac5b3c0c03e # v4
uses: actions/deploy-pages@cd2ce8fcbc39b97be8ca5fce6e763baed58fa128 # v5

# Create a summary
- name: 📋 Create deployment summary
Expand Down
Loading
Loading