diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml index 5f3c1e4effb..202c76c14a6 100644 --- a/.github/workflows/ci.yaml +++ b/.github/workflows/ci.yaml @@ -493,7 +493,7 @@ jobs: --tag cmd-api-server \ --tag "ghcr.io/hyperledger/cactus-cmd-api-server:$(date +"%Y-%m-%dT%H-%M-%S" --utc)-dev-$(git rev-parse --short HEAD)" - - if: ${{ env.RUN_TRIVY_SCAN == 'true' }} + - if: ${{ env.RUN_TRIVY_SCAN == 'true' }} && env.DAY_OF_WEEK == '6' || env.DAY_OF_WEEK == '7' && env.CURRENT_HOUR == '10' name: Run Trivy vulnerability scan for cmd-api-server uses: aquasecurity/trivy-action@0.19.0 with: diff --git a/packages/cactus-cmd-api-server/package.json b/packages/cactus-cmd-api-server/package.json index bc904396d85..d82bbd3acf8 100644 --- a/packages/cactus-cmd-api-server/package.json +++ b/packages/cactus-cmd-api-server/package.json @@ -134,7 +134,7 @@ "google-protobuf": "3.21.4", "grpc-tools": "1.12.4", "grpc_tools_node_protoc_ts": "5.3.3", - "http-status-codes": "2.1.4", + "http-status-codes": "2.3.0", "protobufjs": "7.4.0", "tsx": "4.16.2" }, diff --git a/yarn.lock b/yarn.lock index 590decc8637..bb20a0e4268 100644 --- a/yarn.lock +++ b/yarn.lock @@ -9521,7 +9521,7 @@ __metadata: google-protobuf: "npm:3.21.4" grpc-tools: "npm:1.12.4" grpc_tools_node_protoc_ts: "npm:5.3.3" - http-status-codes: "npm:2.1.4" + http-status-codes: "npm:2.3.0" jose: "npm:4.15.5" json-stable-stringify: "npm:1.0.2" lmify: "npm:0.3.0"