File tree Expand file tree Collapse file tree 4 files changed +7
-7
lines changed Expand file tree Collapse file tree 4 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -29,11 +29,11 @@ jobs:
2929        sudo apt-get update 
3030        sudo apt-get install -y libze1 libze-dev 
3131name : Initialize CodeQL 
32-       uses : github/codeql-action/init@f1f6e5f6af878fb37288ce1c627459e94dbf7d01   #  v3
32+       uses : github/codeql-action/init@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9   #  v3
3333      with :
3434        languages : ' go' 
3535
3636    - name : Perform CodeQL Analysis 
37-       uses : github/codeql-action/analyze@f1f6e5f6af878fb37288ce1c627459e94dbf7d01   #  v3
37+       uses : github/codeql-action/analyze@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9   #  v3
3838      with :
3939        category : " /language:go" 
Original file line number Diff line number Diff line change 2929          sudo systemctl stop clamav-freshclam.service 
3030          sudo freshclam 
3131name : Cache clamav databases 
32-         uses : actions/cache/save@0400d5f644dc74513175e3cd8d07132dd4860809   #  v4.2.4 
32+         uses : actions/cache/save@0057852bfaa89a56745cba8c7296529d2fc39830   #  v4.3.0 
3333        with :
3434          path : /var/lib/clamav 
3535          key : clamav-${{ github.run_id }} 
8080          sudo mkdir -p /var/lib/clamav 
8181          sudo chmod a+rwx /var/lib/clamav 
8282name : Retrieve AV database 
83-         uses : actions/cache/restore@0400d5f644dc74513175e3cd8d07132dd4860809   #  v4.2.4 
83+         uses : actions/cache/restore@0057852bfaa89a56745cba8c7296529d2fc39830   #  v4.3.0 
8484        with :
8585          path : /var/lib/clamav 
8686          key : clamav-${{ github.run_id }} 
@@ -113,7 +113,7 @@ jobs:
113113          echo "image_sha=$(docker inspect --format='{{index .RepoDigests 0}}' ${{ inputs.registry }}/${{ matrix.image }}:${{ inputs.image_tag }})" >> $GITHUB_OUTPUT 
114114name : Install cosign 
115115        if : ${{ inputs.image_tag != 'devel' }} 
116-         uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159   # v3.9.2 
116+         uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62   # v3.10.0 
117117      - name : Keyless image sign 
118118        if : ${{ inputs.image_tag != 'devel' }} 
119119        run : | 
Original file line number Diff line number Diff line change 2626          results_format : sarif 
2727          publish_results : true 
2828      - name : " Upload results to security" 
29-         uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01   #  v3
29+         uses : github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9   #  v3
3030        with :
3131          sarif_file : results.sarif 
Original file line number Diff line number Diff line change 3131        format : sarif 
3232        output : trivy-report.sarif 
3333    - name : Upload sarif report to GitHub Security tab 
34-       uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01   #  v3
34+       uses : github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9   #  v3
3535      with :
3636        sarif_file : trivy-report.sarif 
 
 
   
 
     
   
   
          
    
    
     
    
      
     
     
    You can’t perform that action at this time.
  
 
    
  
    
      
        
     
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments