diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index d29f89ad0..493c84362 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -140,11 +140,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd + uses: github/codeql-action/init@dd746615b3b9d728a6a37ca2045b68ca76d4841a with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd + uses: github/codeql-action/analyze@dd746615b3b9d728a6a37ca2045b68ca76d4841a - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -156,7 +156,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 + uses: anchore/scan-action@7c05671ae9be166aeb155bad2d7df9121823df32 id: scan with: path: "." @@ -167,7 +167,7 @@ jobs: run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report if: always() - uses: github/codeql-action/upload-sarif@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd + uses: github/codeql-action/upload-sarif@dd746615b3b9d728a6a37ca2045b68ca76d4841a with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index 7c32a0018..150a1de37 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -38,11 +38,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd + uses: github/codeql-action/init@dd746615b3b9d728a6a37ca2045b68ca76d4841a with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd + uses: github/codeql-action/analyze@dd746615b3b9d728a6a37ca2045b68ca76d4841a - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -57,7 +57,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 + uses: anchore/scan-action@7c05671ae9be166aeb155bad2d7df9121823df32 id: scan with: path: "." @@ -65,6 +65,6 @@ jobs: - name: Show Anchore scan SARIF report run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report - uses: github/codeql-action/upload-sarif@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd + uses: github/codeql-action/upload-sarif@dd746615b3b9d728a6a37ca2045b68ca76d4841a with: sarif_file: ${{ steps.scan.outputs.sarif }}