diff --git a/.github/workflows/charts.yml b/.github/workflows/charts.yml index 5007d2e..1f7c6c1 100644 --- a/.github/workflows/charts.yml +++ b/.github/workflows/charts.yml @@ -78,10 +78,10 @@ jobs: env: CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}" - name: Initialize CodeQL - uses: github/codeql-action/init@v3.27.5 + uses: github/codeql-action/init@v3.28.0 continue-on-error: true - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3.27.5 + uses: github/codeql-action/analyze@v3.28.0 continue-on-error: true - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@master @@ -92,7 +92,7 @@ jobs: format: 'sarif' output: 'trivy-results.sarif' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3.27.5 + uses: github/codeql-action/upload-sarif@v3.28.0 with: sarif_file: 'trivy-results.sarif' diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index b3b7d1e..d720228 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -31,6 +31,6 @@ jobs: path: results.sarif retention-days: 5 - name: "Upload to code-scanning" - uses: github/codeql-action/upload-sarif@3d3d628990a5f99229dd9fa1821cc5a4f31b613b # v2.22.11 + uses: github/codeql-action/upload-sarif@78760076e3f08852c2c3aeb5334f70d074e28c59 # v2.22.11 with: sarif_file: results.sarif