77
77
uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
78
78
79
79
- name : Set up Cosign
80
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
80
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
81
81
if : ${{ inputs.publish }}
82
82
83
83
- name : Set image name
@@ -103,7 +103,7 @@ jobs:
103
103
org.opencontainers.image.documentation=https://kube-logging.dev/docs/
104
104
105
105
- name : Login to GitHub Container Registry
106
- uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5 .0
106
+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
107
107
with :
108
108
registry : ghcr.io
109
109
username : ${{ github.actor }}
@@ -196,7 +196,7 @@ jobs:
196
196
tar -xf image.tar -C image
197
197
198
198
- name : Run Trivy vulnerability scanner
199
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
199
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
200
200
env :
201
201
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
202
202
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -213,7 +213,7 @@ jobs:
213
213
retention-days : 5
214
214
215
215
- name : Upload Trivy scan results to GitHub Security tab
216
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
216
+ uses : github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5
217
217
with :
218
218
sarif_file : trivy-results.sarif
219
219
@@ -242,7 +242,7 @@ jobs:
242
242
version : v3.13.3
243
243
244
244
- name : Set up Cosign
245
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
245
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
246
246
if : inputs.publish && inputs.release
247
247
248
248
- name : Set chart name
@@ -284,7 +284,7 @@ jobs:
284
284
path : ${{ steps.build.outputs.package }}
285
285
286
286
- name : Login to GitHub Container Registry
287
- uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5 .0
287
+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
288
288
with :
289
289
registry : ghcr.io
290
290
username : ${{ github.actor }}
@@ -351,7 +351,7 @@ jobs:
351
351
fi
352
352
353
353
- name : Run Trivy vulnerability scanner
354
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
354
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
355
355
env :
356
356
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
357
357
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -369,7 +369,7 @@ jobs:
369
369
retention-days : 5
370
370
371
371
- name : Upload Trivy scan results to GitHub Security tab
372
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
372
+ uses : github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5
373
373
with :
374
374
sarif_file : trivy-results.sarif
375
375
@@ -403,7 +403,7 @@ jobs:
403
403
version : v3.13.3
404
404
405
405
- name : Set up Cosign
406
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
406
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
407
407
if : inputs.publish && inputs.release
408
408
409
409
- name : Set chart name
@@ -475,7 +475,7 @@ jobs:
475
475
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
476
476
477
477
- name : Run Trivy vulnerability scanner
478
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
478
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
479
479
env :
480
480
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
481
481
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -493,6 +493,6 @@ jobs:
493
493
retention-days : 5
494
494
495
495
- name : Upload Trivy scan results to GitHub Security tab
496
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
496
+ uses : github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5
497
497
with :
498
498
sarif_file : trivy-results.sarif
0 commit comments