diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index f60974fda..8fdfff73e 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -131,11 +131,11 @@ jobs: - name: Check out the repository uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 - name: Initialize CodeQL - uses: github/codeql-action/init@b611370bb5703a7efb587f9d136a52ea24c5c38c + uses: github/codeql-action/init@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@b611370bb5703a7efb587f9d136a52ea24c5c38c + uses: github/codeql-action/analyze@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -147,7 +147,7 @@ jobs: - name: Check out the repository uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@3343887d815d7b07465f6fdcd395bd66508d486a + uses: anchore/scan-action@d43cc1dfea6a99ed123bf8f3133f1797c9b44492 id: scan with: path: "." @@ -158,7 +158,7 @@ jobs: run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report if: always() - uses: github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c + uses: github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/multiarch.yml b/.github/workflows/multiarch.yml index 8b6f0af2c..54120842b 100644 --- a/.github/workflows/multiarch.yml +++ b/.github/workflows/multiarch.yml @@ -14,7 +14,7 @@ jobs: - name: Check out the repository uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 - name: Set up QEMU (to support building on non-native architectures) - uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee + uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf - name: Build the multi-arch images run: make multiarch-images - name: Check that we actually build multi-arch images diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index ec15b2760..b89399c5c 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -38,11 +38,11 @@ jobs: - name: Check out the repository uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 - name: Initialize CodeQL - uses: github/codeql-action/init@b611370bb5703a7efb587f9d136a52ea24c5c38c + uses: github/codeql-action/init@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@b611370bb5703a7efb587f9d136a52ea24c5c38c + uses: github/codeql-action/analyze@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -57,7 +57,7 @@ jobs: - name: Check out the repository uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@3343887d815d7b07465f6fdcd395bd66508d486a + uses: anchore/scan-action@d43cc1dfea6a99ed123bf8f3133f1797c9b44492 id: scan with: path: "." @@ -65,6 +65,6 @@ jobs: - name: Show Anchore scan SARIF report run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report - uses: github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c + uses: github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/subctl-unit.yml b/.github/workflows/subctl-unit.yml index 645c30f88..9944c4bd9 100644 --- a/.github/workflows/subctl-unit.yml +++ b/.github/workflows/subctl-unit.yml @@ -33,7 +33,7 @@ jobs: ref: ${{ github.base_ref }} - name: Set up Go - uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 + uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 with: go-version: '1.22' check-latest: true