67
67
uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
68
68
69
69
- name : Set up Cosign
70
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
70
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
71
71
if : ${{ inputs.publish }}
72
72
73
73
- name : Set image name
93
93
org.opencontainers.image.documentation=https://todo.docs
94
94
95
95
- name : Login to GitHub Container Registry
96
- uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5 .0
96
+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
97
97
with :
98
98
registry : ghcr.io
99
99
username : ${{ github.actor }}
@@ -150,7 +150,7 @@ jobs:
150
150
tar -xf image.tar -C image
151
151
152
152
- name : Run Trivy vulnerability scanner
153
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
153
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
154
154
env :
155
155
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
156
156
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -167,7 +167,7 @@ jobs:
167
167
retention-days : 5
168
168
169
169
- name : Upload Trivy scan results to GitHub Security tab
170
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
170
+ uses : github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5
171
171
with :
172
172
sarif_file : trivy-results.sarif
173
173
@@ -194,7 +194,7 @@ jobs:
194
194
uses : azure/setup-helm@1a275c3b69536ee54be43f2070a358922e12c8d4 # v4.3.1
195
195
196
196
- name : Set up Cosign
197
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
197
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
198
198
if : ${{ inputs.publish }}
199
199
200
200
- name : Set chart name
@@ -236,7 +236,7 @@ jobs:
236
236
path : ${{ steps.build.outputs.package }}
237
237
238
238
- name : Login to GitHub Container Registry
239
- uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5 .0
239
+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
240
240
with :
241
241
registry : ghcr.io
242
242
username : ${{ github.actor }}
@@ -269,7 +269,7 @@ jobs:
269
269
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
270
270
271
271
- name : Run Trivy vulnerability scanner
272
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
272
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
273
273
env :
274
274
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
275
275
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -287,6 +287,6 @@ jobs:
287
287
retention-days : 5
288
288
289
289
- name : Upload Trivy scan results to GitHub Security tab
290
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
290
+ uses : github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5
291
291
with :
292
292
sarif_file : trivy-results.sarif
0 commit comments