From 752822cebbf796686239452372b399b078ebe858 Mon Sep 17 00:00:00 2001 From: Rafi Date: Mon, 12 Aug 2024 12:26:01 +0200 Subject: [PATCH] Update Vulndb.ymal Signed-off-by: Rafi --- .github/workflows/vulndb.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/vulndb.yaml b/.github/workflows/vulndb.yaml index 52a3b6e5..e7c376f1 100644 --- a/.github/workflows/vulndb.yaml +++ b/.github/workflows/vulndb.yaml @@ -14,7 +14,7 @@ jobs: services: postgres: - image: ghcr.io/l3montree-dev/devguard-postgresql:v0.4.7@sha256:09648eb4bf221b41df29ffd8cff70326735b1064f174d5e6742b80e5bd858d71 + image: ghcr.io/l3montree-dev/devguard-postgresql:v0.5.3@sha256:a06c9e7c8ee334790cc66d52e89ff5ef05352ab264841d3d9f3659c046732251 env: POSTGRES_DB: ${{env.POSTGRES_DB}} POSTGRES_USER: ${{env.POSTGRES_USER}} @@ -45,7 +45,7 @@ jobs: go run ./cmd/devguard-cli/main.go vulndb repair --startIndex=0 - name: Dump the PostgreSQL database # skip:checkov:CKV_SECRET_6 - run: PGPASSWORD=${{env.POSTGRES_PASSWORD}} pg_dump -h localhost -U devguard devguard -t cves -t affected_components -t component_dependencies -t components -t cpe_matches -t cve_affected_component -t cve_cpe_match -t cwes -t exploits -t weaknesses --on-conflict-do-nothing --column-inserts > dump.sql + run: PGPASSWORD=${{env.POSTGRES_PASSWORD}} pg_dump -h localhost -U devguard devguard -t affected_components -t cpe_matches -t cve_affected_component -t cve_cpe_match -t cves -t cwes -t exploits -t weaknesses --on-conflict-do-nothing --column-inserts > dump.sql - name: Login to GitHub Container Registry uses: docker/login-action@v3 with: