diff --git a/.github/workflows/charts.yml b/.github/workflows/charts.yml index f58f440..c2b9d9a 100644 --- a/.github/workflows/charts.yml +++ b/.github/workflows/charts.yml @@ -71,10 +71,10 @@ jobs: env: CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}" - name: Initialize CodeQL - uses: github/codeql-action/init@v3.26.7 + uses: github/codeql-action/init@v3.26.8 continue-on-error: true - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3.26.7 + uses: github/codeql-action/analyze@v3.26.8 continue-on-error: true - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@master @@ -84,7 +84,7 @@ jobs: format: 'sarif' output: 'trivy-results.sarif' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3.26.7 + uses: github/codeql-action/upload-sarif@v3.26.8 with: sarif_file: 'trivy-results.sarif' diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index 3f453f6..5d2fac5 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -31,6 +31,6 @@ jobs: path: results.sarif retention-days: 5 - name: "Upload to code-scanning" - uses: github/codeql-action/upload-sarif@5618c9fc1e675841ca52c1c6b1304f5255a905a0 # v2.22.11 + uses: github/codeql-action/upload-sarif@323f5ef653b88011bf10e9a0a56d70d742463c9a # v2.22.11 with: sarif_file: results.sarif