80
80
81
81
- name : Authenticate to Google Cloud
82
82
id : auth
83
- uses : google-github-actions/auth@71f986410dfbc7added4569d411d040a91dc6935 # v2.1.8
83
+ uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
84
84
with :
85
85
token_format : access_token
86
86
workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -143,7 +143,7 @@ jobs:
143
143
fi
144
144
145
145
- name : Upload SARIF file
146
- uses : github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
146
+ uses : github/codeql-action/upload-sarif@28deaeda66b76a05916b6923827895f2b14ab387 # v3.28.16
147
147
if : steps.check-sarif.outputs.sarif_has_results == 'true'
148
148
with :
149
149
sarif_file : govulncheck.sarif
@@ -420,7 +420,7 @@ jobs:
420
420
421
421
- name : Authenticate to Google Cloud
422
422
id : auth
423
- uses : google-github-actions/auth@71f986410dfbc7added4569d411d040a91dc6935 # v2.1.8
423
+ uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
424
424
with :
425
425
token_format : access_token
426
426
workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -450,7 +450,7 @@ jobs:
450
450
451
451
- name : Run Docker Scout vulnerability scanner
452
452
id : docker-scout
453
- uses : docker/scout-action@d341d36d6eebbe05c0b25760c63afa19e8f23269 # v1.17.0
453
+ uses : docker/scout-action@381b657c498a4d287752e7f2cfb2b41823f566d9 # v1.17.1
454
454
with :
455
455
command : cves
456
456
image : ${{ steps.meta.outputs.tags }}
@@ -468,7 +468,7 @@ jobs:
468
468
overwrite : true
469
469
470
470
- name : Upload Scan results to GitHub Security tab
471
- uses : github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
471
+ uses : github/codeql-action/upload-sarif@28deaeda66b76a05916b6923827895f2b14ab387 # v3.28.16
472
472
with :
473
473
sarif_file : " ${{ steps.directory.outputs.directory }}/"
474
474
@@ -509,7 +509,7 @@ jobs:
509
509
510
510
- name : Authenticate to Google Cloud
511
511
id : auth
512
- uses : google-github-actions/auth@71f986410dfbc7added4569d411d040a91dc6935 # v2.1.8
512
+ uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
513
513
with :
514
514
token_format : access_token
515
515
workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -539,7 +539,7 @@ jobs:
539
539
540
540
- name : Run Docker Scout vulnerability scanner
541
541
id : docker-scout
542
- uses : docker/scout-action@d341d36d6eebbe05c0b25760c63afa19e8f23269 # v1.17.0
542
+ uses : docker/scout-action@381b657c498a4d287752e7f2cfb2b41823f566d9 # v1.17.1
543
543
with :
544
544
command : cves
545
545
image : ${{ steps.meta.outputs.tags }}
@@ -557,7 +557,7 @@ jobs:
557
557
overwrite : true
558
558
559
559
- name : Upload Scan results to GitHub Security tab
560
- uses : github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
560
+ uses : github/codeql-action/upload-sarif@28deaeda66b76a05916b6923827895f2b14ab387 # v3.28.16
561
561
with :
562
562
sarif_file : " ${{ steps.directory.outputs.directory }}/"
563
563
@@ -605,7 +605,7 @@ jobs:
605
605
606
606
- name : Authenticate to Google Cloud
607
607
id : auth
608
- uses : google-github-actions/auth@71f986410dfbc7added4569d411d040a91dc6935 # v2.1.8
608
+ uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
609
609
with :
610
610
token_format : access_token
611
611
workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -635,7 +635,7 @@ jobs:
635
635
636
636
- name : Run Docker Scout vulnerability scanner
637
637
id : docker-scout
638
- uses : docker/scout-action@d341d36d6eebbe05c0b25760c63afa19e8f23269 # v1.17.0
638
+ uses : docker/scout-action@381b657c498a4d287752e7f2cfb2b41823f566d9 # v1.17.1
639
639
with :
640
640
command : cves
641
641
image : ${{ steps.meta.outputs.tags }}
@@ -653,7 +653,7 @@ jobs:
653
653
overwrite : true
654
654
655
655
- name : Upload Scan results to GitHub Security tab
656
- uses : github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
656
+ uses : github/codeql-action/upload-sarif@28deaeda66b76a05916b6923827895f2b14ab387 # v3.28.16
657
657
with :
658
658
sarif_file : " ${{ steps.directory.outputs.directory }}/"
659
659
continue-on-error : true
0 commit comments