File tree Expand file tree Collapse file tree 7 files changed +16
-16
lines changed Expand file tree Collapse file tree 7 files changed +16
-16
lines changed Original file line number Diff line number Diff line change 40
40
builder : [buildah, docker]
41
41
steps :
42
42
- uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
43
- - uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
43
+ - uses : actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v5
44
44
with :
45
45
go-version-file : go.mod
46
46
check-latest : true
Original file line number Diff line number Diff line change 19
19
steps :
20
20
- name : Checkout repository
21
21
uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
22
- - uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
22
+ - uses : actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v5
23
23
with :
24
24
go-version-file : go.mod
25
25
check-latest : true
@@ -29,11 +29,11 @@ jobs:
29
29
sudo apt-get update
30
30
sudo apt-get install -y libze1 libze-dev
31
31
- name : Initialize CodeQL
32
- uses : github/codeql-action/init@2d92b76c45b91eb80fc44c74ce3fce0ee94e8f9d # v3
32
+ uses : github/codeql-action/init@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3
33
33
with :
34
34
languages : ' go'
35
35
36
36
- name : Perform CodeQL Analysis
37
- uses : github/codeql-action/analyze@2d92b76c45b91eb80fc44c74ce3fce0ee94e8f9d # v3
37
+ uses : github/codeql-action/analyze@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3
38
38
with :
39
39
category : " /language:go"
Original file line number Diff line number Diff line change 58
58
- intel-idxd-config-initcontainer
59
59
steps :
60
60
- uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
61
- - uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
61
+ - uses : actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v5
62
62
with :
63
63
go-version-file : go.mod
64
64
check-latest : true
69
69
run : |
70
70
ORG=${{ inputs.registry }} TAG=${{ inputs.image_tag }} make ${IMAGE_NAME} BUILDER=docker
71
71
- name : Trivy scan for image
72
- uses : aquasecurity/trivy-action@f9424c10c36e288d5fa79bd3dfd1aeb2d6eae808 # 0.33.0
72
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
73
73
with :
74
74
scan-type : image
75
75
image-ref : ${{ inputs.registry }}/${{ matrix.image }}:${{ inputs.image_tag }}
Original file line number Diff line number Diff line change 26
26
results_format : sarif
27
27
publish_results : true
28
28
- name : " Upload results to security"
29
- uses : github/codeql-action/upload-sarif@2d92b76c45b91eb80fc44c74ce3fce0ee94e8f9d # v3
29
+ uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3
30
30
with :
31
31
sarif_file : results.sarif
Original file line number Diff line number Diff line change 32
32
- name : Checkout
33
33
uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
34
34
- name : Run Trivy in config mode for deployments
35
- uses : aquasecurity/trivy-action@f9424c10c36e288d5fa79bd3dfd1aeb2d6eae808 # 0.33.0
35
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
36
36
with :
37
37
scan-type : config
38
38
scan-ref : deployments/
50
50
- name : Checkout
51
51
uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
52
52
- name : Run Trivy in config mode for dockerfiles
53
- uses : aquasecurity/trivy-action@f9424c10c36e288d5fa79bd3dfd1aeb2d6eae808 # 0.33.0
53
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
54
54
with :
55
55
scan-type : config
56
56
scan-ref : build/docker/
64
64
- name : Checkout
65
65
uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
66
66
- name : Run Trivy in fs mode
67
- uses : aquasecurity/trivy-action@f9424c10c36e288d5fa79bd3dfd1aeb2d6eae808 # 0.33.0
67
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
68
68
with :
69
69
scan-type : fs
70
70
scan-ref : .
81
81
- name : Checkout
82
82
uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
83
83
- name : Run Trivy in fs mode
84
- uses : aquasecurity/trivy-action@f9424c10c36e288d5fa79bd3dfd1aeb2d6eae808 # 0.33.0
84
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
85
85
with :
86
86
scan-type : fs
87
87
scan-ref : .
Original file line number Diff line number Diff line change 35
35
runs-on : ubuntu-24.04
36
36
steps :
37
37
- uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
38
- - uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
38
+ - uses : actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v5
39
39
with :
40
40
go-version-file : go.mod
41
41
check-latest : true
53
53
runs-on : ubuntu-24.04
54
54
steps :
55
55
- uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
56
- - uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
56
+ - uses : actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v5
57
57
with :
58
58
go-version-file : go.mod
59
59
check-latest : true
82
82
- 1.34.x
83
83
steps :
84
84
- uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
85
- - uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
85
+ - uses : actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v5
86
86
with :
87
87
go-version-file : go.mod
88
88
check-latest : true
Original file line number Diff line number Diff line change 22
22
- name : Run Trivy in fs mode
23
23
# Don't fail in case of vulnerabilities, report them in the next step
24
24
continue-on-error : true
25
- uses : aquasecurity/trivy-action@f9424c10c36e288d5fa79bd3dfd1aeb2d6eae808 # 0.33.0
25
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
26
26
with :
27
27
scan-type : fs
28
28
scan-ref : .
31
31
format : sarif
32
32
output : trivy-report.sarif
33
33
- name : Upload sarif report to GitHub Security tab
34
- uses : github/codeql-action/upload-sarif@2d92b76c45b91eb80fc44c74ce3fce0ee94e8f9d # v3
34
+ uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3
35
35
with :
36
36
sarif_file : trivy-report.sarif
You can’t perform that action at this time.
0 commit comments