diff --git a/.github/workflows/charts.yml b/.github/workflows/charts.yml index 7fce2bb..282ed9a 100644 --- a/.github/workflows/charts.yml +++ b/.github/workflows/charts.yml @@ -71,10 +71,10 @@ jobs: env: CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}" - name: Initialize CodeQL - uses: github/codeql-action/init@v3.25.15 + uses: github/codeql-action/init@v3.26.2 continue-on-error: true - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3.25.15 + uses: github/codeql-action/analyze@v3.26.2 continue-on-error: true - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@master @@ -84,7 +84,7 @@ jobs: format: 'sarif' output: 'trivy-results.sarif' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3.25.15 + uses: github/codeql-action/upload-sarif@v3.26.2 with: sarif_file: 'trivy-results.sarif' diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index 0dbae2c..d8498b9 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -31,6 +31,6 @@ jobs: path: results.sarif retention-days: 5 - name: "Upload to code-scanning" - uses: github/codeql-action/upload-sarif@9c646c24a4c8410122b0d6a1311088e9377eea95 # v2.22.11 + uses: github/codeql-action/upload-sarif@5c681efc3f71cd6b47b1c14583c9e86913966e9f # v2.22.11 with: sarif_file: results.sarif