From ef959730f71411d57975163161075b8262f7ef26 Mon Sep 17 00:00:00 2001 From: Keith Zantow Date: Thu, 26 Aug 2021 12:47:04 -0400 Subject: [PATCH] Update grype to 0.17.0 (#118) Signed-off-by: Keith Zantow --- dist/index.js | 2 +- index.js | 2 +- tests/__snapshots__/sarif_output.test.js.snap | 24 +++++++++---------- 3 files changed, 14 insertions(+), 14 deletions(-) diff --git a/dist/index.js b/dist/index.js index 151bc91e..0c6efabd 100644 --- a/dist/index.js +++ b/dist/index.js @@ -11,7 +11,7 @@ const { exec } = __webpack_require__(514); const fs = __webpack_require__(747); const grypeBinary = "grype"; -const grypeVersion = "0.16.0"; +const grypeVersion = "0.17.0"; // sarif code function convert_severity_to_acs_level(input_severity, severity_cutoff_param) { diff --git a/index.js b/index.js index f95dd542..d54719e9 100644 --- a/index.js +++ b/index.js @@ -4,7 +4,7 @@ const { exec } = require("@actions/exec"); const fs = require("fs"); const grypeBinary = "grype"; -const grypeVersion = "0.16.0"; +const grypeVersion = "0.17.0"; // sarif code function convert_severity_to_acs_level(input_severity, severity_cutoff_param) { diff --git a/tests/__snapshots__/sarif_output.test.js.snap b/tests/__snapshots__/sarif_output.test.js.snap index b354a8a8..aafbe935 100644 --- a/tests/__snapshots__/sarif_output.test.js.snap +++ b/tests/__snapshots__/sarif_output.test.js.snap @@ -817,7 +817,7 @@ Object { ], "tool": Object { "driver": Object { - "dottedQuadFileVersion": "0.16.0.0", + "dottedQuadFileVersion": "0.17.0.0", "fullName": "Anchore Container Vulnerability Report (T0)", "name": "Anchore Container Vulnerability Report (T0)", "rules": Array [ @@ -1322,8 +1322,8 @@ Link: [CVE-2020-25708](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25 }, }, ], - "semanticVersion": "0.16.0", - "version": "0.16.0", + "semanticVersion": "0.17.0", + "version": "0.17.0", }, }, }, @@ -1549,7 +1549,7 @@ Object { ], "tool": Object { "driver": Object { - "dottedQuadFileVersion": "0.16.0.0", + "dottedQuadFileVersion": "0.17.0.0", "fullName": "Anchore Container Vulnerability Report (T0)", "name": "Anchore Container Vulnerability Report (T0)", "rules": Array [ @@ -1679,8 +1679,8 @@ Link: [GHSA-pq64-v7f5-gqh8](https://github.com/advisories/GHSA-pq64-v7f5-gqh8)", }, }, ], - "semanticVersion": "0.16.0", - "version": "0.16.0", + "semanticVersion": "0.17.0", + "version": "0.17.0", }, }, }, @@ -1786,7 +1786,7 @@ Object { ], "tool": Object { "driver": Object { - "dottedQuadFileVersion": "0.16.0.0", + "dottedQuadFileVersion": "0.17.0.0", "fullName": "Anchore Container Vulnerability Report (T0)", "name": "Anchore Container Vulnerability Report (T0)", "rules": Array [ @@ -1841,8 +1841,8 @@ Link: [GHSA-r628-mhmh-qjhw](https://github.com/advisories/GHSA-r628-mhmh-qjhw)", }, }, ], - "semanticVersion": "0.16.0", - "version": "0.16.0", + "semanticVersion": "0.17.0", + "version": "0.17.0", }, }, }, @@ -1908,7 +1908,7 @@ Object { ], "tool": Object { "driver": Object { - "dottedQuadFileVersion": "0.16.0.0", + "dottedQuadFileVersion": "0.17.0.0", "fullName": "Anchore Container Vulnerability Report (T0)", "name": "Anchore Container Vulnerability Report (T0)", "rules": Array [ @@ -1938,8 +1938,8 @@ Link: [GHSA-w5p7-h5w8-2hfq](https://github.com/advisories/GHSA-w5p7-h5w8-2hfq)", }, }, ], - "semanticVersion": "0.16.0", - "version": "0.16.0", + "semanticVersion": "0.17.0", + "version": "0.17.0", }, }, },