51
51
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
52
52
53
53
- name : Setup Golang Environment
54
- uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3 .0
54
+ uses : actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4 .0
55
55
with :
56
56
go-version-file : go.mod
57
57
@@ -123,7 +123,7 @@ jobs:
123
123
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
124
124
125
125
- name : Setup Golang Environment
126
- uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3 .0
126
+ uses : actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4 .0
127
127
with :
128
128
go-version-file : go.mod
129
129
@@ -143,7 +143,7 @@ jobs:
143
143
fi
144
144
145
145
- name : Upload SARIF file
146
- uses : github/codeql-action/upload-sarif@6bb031afdd8eb862ea3fc1848194185e076637e5 # v3.28.11
146
+ uses : github/codeql-action/upload-sarif@5f8171a638ada777af81d42b55959a643bb29017 # v3.28.12
147
147
if : steps.check-sarif.outputs.sarif_has_results == 'true'
148
148
with :
149
149
sarif_file : govulncheck.sarif
@@ -159,7 +159,7 @@ jobs:
159
159
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
160
160
161
161
- name : Setup Golang Environment
162
- uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3 .0
162
+ uses : actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4 .0
163
163
with :
164
164
go-version-file : go.mod
165
165
if : ${{ needs.checks.outputs.binary_cache_hit != 'true' }}
@@ -450,7 +450,7 @@ jobs:
450
450
451
451
- name : Run Docker Scout vulnerability scanner
452
452
id : docker-scout
453
- uses : docker/scout-action@0133ff88fe16d4a412dc4827a8fccbccb6b583e0 # v1.16.3
453
+ uses : docker/scout-action@d341d36d6eebbe05c0b25760c63afa19e8f23269 # v1.17.0
454
454
with :
455
455
command : cves
456
456
image : ${{ steps.meta.outputs.tags }}
@@ -461,14 +461,14 @@ jobs:
461
461
summary : true
462
462
463
463
- name : Upload Scan Results to Github Artifacts
464
- uses : actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1 # v4.6.1
464
+ uses : actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
465
465
with :
466
466
name : " ${{ github.ref_name }}-${{ steps.directory.outputs.directory }}"
467
467
path : " ${{ steps.directory.outputs.directory }}/"
468
468
overwrite : true
469
469
470
470
- name : Upload Scan results to GitHub Security tab
471
- uses : github/codeql-action/upload-sarif@6bb031afdd8eb862ea3fc1848194185e076637e5 # v3.28.11
471
+ uses : github/codeql-action/upload-sarif@5f8171a638ada777af81d42b55959a643bb29017 # v3.28.12
472
472
with :
473
473
sarif_file : " ${{ steps.directory.outputs.directory }}/"
474
474
@@ -539,7 +539,7 @@ jobs:
539
539
540
540
- name : Run Docker Scout vulnerability scanner
541
541
id : docker-scout
542
- uses : docker/scout-action@0133ff88fe16d4a412dc4827a8fccbccb6b583e0 # v1.16.3
542
+ uses : docker/scout-action@d341d36d6eebbe05c0b25760c63afa19e8f23269 # v1.17.0
543
543
with :
544
544
command : cves
545
545
image : ${{ steps.meta.outputs.tags }}
@@ -550,14 +550,14 @@ jobs:
550
550
summary : true
551
551
552
552
- name : Upload Scan Results to Github Artifacts
553
- uses : actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1 # v4.6.1
553
+ uses : actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
554
554
with :
555
555
name : " ${{ github.ref_name }}-${{ steps.directory.outputs.directory }}"
556
556
path : " ${{ steps.directory.outputs.directory }}/"
557
557
overwrite : true
558
558
559
559
- name : Upload Scan results to GitHub Security tab
560
- uses : github/codeql-action/upload-sarif@6bb031afdd8eb862ea3fc1848194185e076637e5 # v3.28.11
560
+ uses : github/codeql-action/upload-sarif@5f8171a638ada777af81d42b55959a643bb29017 # v3.28.12
561
561
with :
562
562
sarif_file : " ${{ steps.directory.outputs.directory }}/"
563
563
@@ -635,7 +635,7 @@ jobs:
635
635
636
636
- name : Run Docker Scout vulnerability scanner
637
637
id : docker-scout
638
- uses : docker/scout-action@0133ff88fe16d4a412dc4827a8fccbccb6b583e0 # v1.16.3
638
+ uses : docker/scout-action@d341d36d6eebbe05c0b25760c63afa19e8f23269 # v1.17.0
639
639
with :
640
640
command : cves
641
641
image : ${{ steps.meta.outputs.tags }}
@@ -646,14 +646,14 @@ jobs:
646
646
summary : true
647
647
648
648
- name : Upload Scan Results to Github Artifacts
649
- uses : actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1 # v4.6.1
649
+ uses : actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
650
650
with :
651
651
name : " ${{ github.ref_name }}-${{ steps.directory.outputs.directory }}"
652
652
path : " ${{ steps.directory.outputs.directory }}/"
653
653
overwrite : true
654
654
655
655
- name : Upload Scan results to GitHub Security tab
656
- uses : github/codeql-action/upload-sarif@6bb031afdd8eb862ea3fc1848194185e076637e5 # v3.28.11
656
+ uses : github/codeql-action/upload-sarif@5f8171a638ada777af81d42b55959a643bb29017 # v3.28.12
657
657
with :
658
658
sarif_file : " ${{ steps.directory.outputs.directory }}/"
659
659
continue-on-error : true
0 commit comments