diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index c05640aa8..c5a564954 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -122,11 +122,11 @@ jobs: - name: Check out the repository uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 - name: Initialize CodeQL - uses: github/codeql-action/init@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 + uses: github/codeql-action/init@b7bf0a3ed3ecfa44160715d7c442788f65f0f923 with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 + uses: github/codeql-action/analyze@b7bf0a3ed3ecfa44160715d7c442788f65f0f923 - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -138,7 +138,7 @@ jobs: - name: Check out the repository uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@65161264d84bfeed55775e43bdbe5eb7c8a433fb + uses: anchore/scan-action@3343887d815d7b07465f6fdcd395bd66508d486a id: scan with: path: "." @@ -149,7 +149,7 @@ jobs: run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report if: always() - uses: github/codeql-action/upload-sarif@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 + uses: github/codeql-action/upload-sarif@b7bf0a3ed3ecfa44160715d7c442788f65f0f923 with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/periodic.yml b/.github/workflows/periodic.yml index 04bc9bddb..cf3ca173b 100644 --- a/.github/workflows/periodic.yml +++ b/.github/workflows/periodic.yml @@ -25,7 +25,7 @@ jobs: - name: Raise an Issue to report broken links if: ${{ failure() }} - uses: peter-evans/create-issue-from-file@433e51abf769039ee20ba1293a088ca19d573b7f + uses: peter-evans/create-issue-from-file@24452a72d85239eacf1468b0f1982a9f3fec4c94 with: title: Broken link detected by CI content-filepath: .github/ISSUE_TEMPLATE/broken-link.md diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index 58fb28a6f..7fa77e926 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -24,7 +24,7 @@ jobs: run: make unit - name: Run SonarScan, upload Go test results and coverage - uses: sonarsource/sonarcloud-github-action@db501078e936e4b4c8773d1bb949ba9ddb7b6b6a + uses: sonarsource/sonarcloud-github-action@49e6cd3b187936a73b8280d59ffd9da69df63ec9 env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} @@ -38,11 +38,11 @@ jobs: - name: Check out the repository uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 - name: Initialize CodeQL - uses: github/codeql-action/init@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 + uses: github/codeql-action/init@b7bf0a3ed3ecfa44160715d7c442788f65f0f923 with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 + uses: github/codeql-action/analyze@b7bf0a3ed3ecfa44160715d7c442788f65f0f923 - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -57,7 +57,7 @@ jobs: - name: Check out the repository uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@65161264d84bfeed55775e43bdbe5eb7c8a433fb + uses: anchore/scan-action@3343887d815d7b07465f6fdcd395bd66508d486a id: scan with: path: "." @@ -65,6 +65,6 @@ jobs: - name: Show Anchore scan SARIF report run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report - uses: github/codeql-action/upload-sarif@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 + uses: github/codeql-action/upload-sarif@b7bf0a3ed3ecfa44160715d7c442788f65f0f923 with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/unit.yml b/.github/workflows/unit.yml index 6d933f226..d5d84a03b 100644 --- a/.github/workflows/unit.yml +++ b/.github/workflows/unit.yml @@ -33,7 +33,7 @@ jobs: done - name: Upload artifacts - uses: actions/upload-artifact@c7d193f32edcb7bfad88892161225aeda64e9392 + uses: actions/upload-artifact@26f96dfa697d77e81fd5907df203aa23a56210a8 with: name: Unit test artifacts path: artifacts