Skip to content

Commit c113d6f

Browse files
authored
Merge pull request #2072 from intel/dependabot/github_actions/github-actions-0b1b7fbb9c
build(deps): bump the github-actions group with 2 updates
2 parents 6be594f + 54c8e34 commit c113d6f

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

.github/workflows/lib-codeql.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,11 @@ jobs:
2929
sudo apt-get update
3030
sudo apt-get install -y libze1 libze-dev
3131
- name: Initialize CodeQL
32-
uses: github/codeql-action/init@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3
32+
uses: github/codeql-action/init@fca7ace96b7d713c7035871441bd52efbe39e27e # v3
3333
with:
3434
languages: 'go'
3535

3636
- name: Perform CodeQL Analysis
37-
uses: github/codeql-action/analyze@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3
37+
uses: github/codeql-action/analyze@fca7ace96b7d713c7035871441bd52efbe39e27e # v3
3838
with:
3939
category: "/language:go"

.github/workflows/lib-publish.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ jobs:
7070
run: |
7171
ORG=${{ inputs.registry }} TAG=${{ inputs.image_tag }} make ${IMAGE_NAME} BUILDER=docker
7272
- name: Trivy scan for image
73-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
73+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
7474
with:
7575
scan-type: image
7676
image-ref: ${{ inputs.registry }}/${{ matrix.image }}:${{ inputs.image_tag }}

.github/workflows/lib-scorecard.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,6 @@ jobs:
2626
results_format: sarif
2727
publish_results: true
2828
- name: "Upload results to security"
29-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3
29+
uses: github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3
3030
with:
3131
sarif_file: results.sarif

.github/workflows/lib-trivy.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232
- name: Checkout
3333
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
3434
- name: Run Trivy in config mode for deployments
35-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
35+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
3636
with:
3737
scan-type: config
3838
scan-ref: deployments/
@@ -50,7 +50,7 @@ jobs:
5050
- name: Checkout
5151
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
5252
- name: Run Trivy in config mode for dockerfiles
53-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
53+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
5454
with:
5555
scan-type: config
5656
scan-ref: build/docker/
@@ -64,7 +64,7 @@ jobs:
6464
- name: Checkout
6565
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
6666
- name: Run Trivy in fs mode
67-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
67+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
6868
with:
6969
scan-type: fs
7070
scan-ref: .
@@ -81,7 +81,7 @@ jobs:
8181
- name: Checkout
8282
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
8383
- name: Run Trivy in fs mode
84-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
84+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
8585
with:
8686
scan-type: fs
8787
scan-ref: .

.github/workflows/trivy-periodic.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ jobs:
2222
- name: Run Trivy in fs mode
2323
# Don't fail in case of vulnerabilities, report them in the next step
2424
continue-on-error: true
25-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
25+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
2626
with:
2727
scan-type: fs
2828
scan-ref: .
@@ -31,6 +31,6 @@ jobs:
3131
format: sarif
3232
output: trivy-report.sarif
3333
- name: Upload sarif report to GitHub Security tab
34-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3
34+
uses: github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3
3535
with:
3636
sarif_file: trivy-report.sarif

0 commit comments

Comments
 (0)