File tree Expand file tree Collapse file tree 3 files changed +10
-10
lines changed Expand file tree Collapse file tree 3 files changed +10
-10
lines changed Original file line number Diff line number Diff line change 3737 run : task test
3838
3939 - name : Upload build artifacts
40- uses : actions/upload-artifact@v4
40+ uses : actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4
4141 with :
4242 name : mkp-server
4343 path : build/mkp-server
Original file line number Diff line number Diff line change @@ -15,12 +15,12 @@ jobs:
1515 id-token : write
1616 steps :
1717 - name : Checkout code
18- uses : actions/checkout@v4
18+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
1919 with :
2020 fetch-depth : 0
2121
2222 - name : Set up Go
23- uses : actions/setup-go@v5
23+ uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
2424 with :
2525 go-version-file : ' go.mod'
2626 cache : true
@@ -38,10 +38,10 @@ jobs:
3838 run : task test
3939
4040 - name : Setup Ko
41- uses : ko-build/setup-ko@v0.9
41+ uses : ko-build/setup-ko@d006021bd0c28d1ce33a07e7943d48b079944c8d # v0.9
4242
4343 - name : Log in to GitHub Container Registry
44- uses : docker/login-action@v3
44+ uses : docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3
4545 with :
4646 registry : ghcr.io
4747 username : ${{ github.actor }}
Original file line number Diff line number Diff line change @@ -12,10 +12,10 @@ jobs:
1212 runs-on : ubuntu-latest
1313 steps :
1414 - name : Checkout code
15- uses : actions/checkout@v4
15+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
1616
1717 - name : Run Trivy vulnerability scanner in repo mode
18- uses : aquasecurity/trivy-action@0.31.0
18+ uses : aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
1919 with :
2020 scan-type : ' fs'
2121 ignore-unfixed : true
@@ -24,14 +24,14 @@ jobs:
2424 severity : ' CRITICAL,HIGH'
2525
2626 - name : Upload Trivy scan results to GitHub Security tab
27- uses : github/codeql-action/upload-sarif@v3
27+ uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3
2828 if : always()
2929 with :
3030 sarif_file : ' trivy-results.sarif'
3131 category : ' trivy-fs'
3232
3333 - name : Run Trivy vulnerability scanner in IaC mode
34- uses : aquasecurity/trivy-action@0.31.0
34+ uses : aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
3535 with :
3636 scan-type : ' config'
3737 hide-progress : false
4141 severity : ' CRITICAL,HIGH'
4242
4343 - name : Upload Trivy IaC scan results to GitHub Security tab
44- uses : github/codeql-action/upload-sarif@v3
44+ uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3
4545 if : always()
4646 with :
4747 sarif_file : ' trivy-config-results.sarif'
You can’t perform that action at this time.
0 commit comments