6767 uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
6868
6969 - name : Set up Cosign
70- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
70+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
7171 if : ${{ inputs.publish }}
7272
7373 - name : Set image name
9393 org.opencontainers.image.documentation=https://todo.docs
9494
9595 - name : Login to GitHub Container Registry
96- uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5 .0
96+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
9797 with :
9898 registry : ghcr.io
9999 username : ${{ github.actor }}
@@ -150,7 +150,7 @@ jobs:
150150 tar -xf image.tar -C image
151151
152152 - name : Run Trivy vulnerability scanner
153- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
153+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
154154 env :
155155 TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
156156 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -167,7 +167,7 @@ jobs:
167167 retention-days : 5
168168
169169 - name : Upload Trivy scan results to GitHub Security tab
170- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
170+ uses : github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5
171171 with :
172172 sarif_file : trivy-results.sarif
173173
@@ -194,7 +194,7 @@ jobs:
194194 uses : azure/setup-helm@1a275c3b69536ee54be43f2070a358922e12c8d4 # v4.3.1
195195
196196 - name : Set up Cosign
197- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
197+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
198198 if : ${{ inputs.publish }}
199199
200200 - name : Set chart name
@@ -236,7 +236,7 @@ jobs:
236236 path : ${{ steps.build.outputs.package }}
237237
238238 - name : Login to GitHub Container Registry
239- uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5 .0
239+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
240240 with :
241241 registry : ghcr.io
242242 username : ${{ github.actor }}
@@ -269,7 +269,7 @@ jobs:
269269 --certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
270270
271271 - name : Run Trivy vulnerability scanner
272- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
272+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
273273 env :
274274 TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
275275 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -287,6 +287,6 @@ jobs:
287287 retention-days : 5
288288
289289 - name : Upload Trivy scan results to GitHub Security tab
290- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
290+ uses : github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5
291291 with :
292292 sarif_file : trivy-results.sarif
0 commit comments