77
77
uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
78
78
79
79
- name : Set up Cosign
80
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
80
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
81
81
if : ${{ inputs.publish }}
82
82
83
83
- name : Set image name
@@ -196,7 +196,7 @@ jobs:
196
196
tar -xf image.tar -C image
197
197
198
198
- name : Run Trivy vulnerability scanner
199
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
199
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
200
200
env :
201
201
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
202
202
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -213,7 +213,7 @@ jobs:
213
213
retention-days : 5
214
214
215
215
- name : Upload Trivy scan results to GitHub Security tab
216
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
216
+ uses : github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
217
217
with :
218
218
sarif_file : trivy-results.sarif
219
219
@@ -242,7 +242,7 @@ jobs:
242
242
version : v3.13.3
243
243
244
244
- name : Set up Cosign
245
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
245
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
246
246
if : inputs.publish && inputs.release
247
247
248
248
- name : Set chart name
@@ -351,7 +351,7 @@ jobs:
351
351
fi
352
352
353
353
- name : Run Trivy vulnerability scanner
354
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
354
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
355
355
env :
356
356
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
357
357
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -369,7 +369,7 @@ jobs:
369
369
retention-days : 5
370
370
371
371
- name : Upload Trivy scan results to GitHub Security tab
372
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
372
+ uses : github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
373
373
with :
374
374
sarif_file : trivy-results.sarif
375
375
@@ -403,7 +403,7 @@ jobs:
403
403
version : v3.13.3
404
404
405
405
- name : Set up Cosign
406
- uses : sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
406
+ uses : sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
407
407
if : inputs.publish && inputs.release
408
408
409
409
- name : Set chart name
@@ -475,7 +475,7 @@ jobs:
475
475
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
476
476
477
477
- name : Run Trivy vulnerability scanner
478
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
478
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
479
479
env :
480
480
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
481
481
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -493,6 +493,6 @@ jobs:
493
493
retention-days : 5
494
494
495
495
- name : Upload Trivy scan results to GitHub Security tab
496
- uses : github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
496
+ uses : github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
497
497
with :
498
498
sarif_file : trivy-results.sarif
0 commit comments