diff --git a/.github/workflows/charts.yml b/.github/workflows/charts.yml index ce0d765..0bd7e6c 100644 --- a/.github/workflows/charts.yml +++ b/.github/workflows/charts.yml @@ -71,10 +71,10 @@ jobs: env: CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}" - name: Initialize CodeQL - uses: github/codeql-action/init@v3.26.13 + uses: github/codeql-action/init@v3.27.0 continue-on-error: true - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3.26.13 + uses: github/codeql-action/analyze@v3.27.0 continue-on-error: true - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@master @@ -84,7 +84,7 @@ jobs: format: 'sarif' output: 'trivy-results.sarif' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3.26.13 + uses: github/codeql-action/upload-sarif@v3.27.0 with: sarif_file: 'trivy-results.sarif' diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index 56f0324..f4aa5ab 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -31,6 +31,6 @@ jobs: path: results.sarif retention-days: 5 - name: "Upload to code-scanning" - uses: github/codeql-action/upload-sarif@b0b722f202d6f76a52f990a286c2b1eacfc5a9ff # v2.22.11 + uses: github/codeql-action/upload-sarif@3aa71356c75a8edd8430d54dff2982203a28be45 # v2.22.11 with: sarif_file: results.sarif