Skip to content

Commit 431a230

Browse files
Pin dependencies (#65)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
1 parent f1ad9b4 commit 431a230

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

.github/workflows/build.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ jobs:
3737
run: task test
3838

3939
- name: Upload build artifacts
40-
uses: actions/upload-artifact@v4
40+
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4
4141
with:
4242
name: mkp-server
4343
path: build/mkp-server

.github/workflows/release.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,12 @@ jobs:
1515
id-token: write
1616
steps:
1717
- name: Checkout code
18-
uses: actions/checkout@v4
18+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
1919
with:
2020
fetch-depth: 0
2121

2222
- name: Set up Go
23-
uses: actions/setup-go@v5
23+
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
2424
with:
2525
go-version-file: 'go.mod'
2626
cache: true
@@ -38,10 +38,10 @@ jobs:
3838
run: task test
3939

4040
- name: Setup Ko
41-
uses: ko-build/setup-ko@v0.9
41+
uses: ko-build/setup-ko@d006021bd0c28d1ce33a07e7943d48b079944c8d # v0.9
4242

4343
- name: Log in to GitHub Container Registry
44-
uses: docker/login-action@v3
44+
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3
4545
with:
4646
registry: ghcr.io
4747
username: ${{ github.actor }}

.github/workflows/security.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ jobs:
1212
runs-on: ubuntu-latest
1313
steps:
1414
- name: Checkout code
15-
uses: actions/checkout@v4
15+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
1616

1717
- name: Run Trivy vulnerability scanner in repo mode
18-
uses: aquasecurity/trivy-action@0.31.0
18+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
1919
with:
2020
scan-type: 'fs'
2121
ignore-unfixed: true
@@ -24,14 +24,14 @@ jobs:
2424
severity: 'CRITICAL,HIGH'
2525

2626
- name: Upload Trivy scan results to GitHub Security tab
27-
uses: github/codeql-action/upload-sarif@v3
27+
uses: github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3
2828
if: always()
2929
with:
3030
sarif_file: 'trivy-results.sarif'
3131
category: 'trivy-fs'
3232

3333
- name: Run Trivy vulnerability scanner in IaC mode
34-
uses: aquasecurity/trivy-action@0.31.0
34+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
3535
with:
3636
scan-type: 'config'
3737
hide-progress: false
@@ -41,7 +41,7 @@ jobs:
4141
severity: 'CRITICAL,HIGH'
4242

4343
- name: Upload Trivy IaC scan results to GitHub Security tab
44-
uses: github/codeql-action/upload-sarif@v3
44+
uses: github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3
4545
if: always()
4646
with:
4747
sarif_file: 'trivy-config-results.sarif'

0 commit comments

Comments
 (0)