diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index 4f913e861..d329398ab 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -131,11 +131,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@662472033e021d55d94146f66f6058822b0b39fd + uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@662472033e021d55d94146f66f6058822b0b39fd + uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -147,7 +147,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@5ed195cc06065322983cae4bb31e2a751feb86fd + uses: anchore/scan-action@869c549e657a088dc0441b08ce4fc0ecdac2bb65 id: scan with: path: "." @@ -158,7 +158,7 @@ jobs: run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report if: always() - uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd + uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index a5eb920ab..780e3e169 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -38,11 +38,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@662472033e021d55d94146f66f6058822b0b39fd + uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@662472033e021d55d94146f66f6058822b0b39fd + uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -57,7 +57,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@5ed195cc06065322983cae4bb31e2a751feb86fd + uses: anchore/scan-action@869c549e657a088dc0441b08ce4fc0ecdac2bb65 id: scan with: path: "." @@ -65,6 +65,6 @@ jobs: - name: Show Anchore scan SARIF report run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report - uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd + uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 with: sarif_file: ${{ steps.scan.outputs.sarif }}