diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index 1f7996f14..8bf8b6119 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -91,7 +91,7 @@ jobs: uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run markdown-link-check - uses: gaurav-nelson/github-action-markdown-link-check@d53a906aa6b22b8979d33bc86170567e619495ec + uses: gaurav-nelson/github-action-markdown-link-check@1b916f2cf6c36510a6059943104e3c42ce6c16bc with: config-file: ".markdownlinkcheck.json" check-modified-files-only: "yes" @@ -131,11 +131,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/init@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/analyze@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -147,7 +147,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@869c549e657a088dc0441b08ce4fc0ecdac2bb65 + uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 id: scan with: path: "." @@ -158,7 +158,7 @@ jobs: run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report if: always() - uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/upload-sarif@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/multiarch.yml b/.github/workflows/multiarch.yml index 651d94ee3..4e854c46d 100644 --- a/.github/workflows/multiarch.yml +++ b/.github/workflows/multiarch.yml @@ -14,7 +14,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Set up QEMU (to support building on non-native architectures) - uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf + uses: docker/setup-qemu-action@53851d14592bedcffcf25ea515637cff71ef929a - name: Build the multi-arch images run: make multiarch-images - name: Check that we actually build multi-arch images diff --git a/.github/workflows/periodic.yml b/.github/workflows/periodic.yml index 96de4f945..dd77c9b93 100644 --- a/.github/workflows/periodic.yml +++ b/.github/workflows/periodic.yml @@ -19,7 +19,7 @@ jobs: uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run markdown-link-check - uses: gaurav-nelson/github-action-markdown-link-check@d53a906aa6b22b8979d33bc86170567e619495ec + uses: gaurav-nelson/github-action-markdown-link-check@1b916f2cf6c36510a6059943104e3c42ce6c16bc with: config-file: ".markdownlinkcheck.json" diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index 09c1be1a6..bcd8c4e06 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -24,7 +24,7 @@ jobs: run: make unit - name: Run SonarScan, upload Go test results and coverage - uses: sonarsource/sonarcloud-github-action@383f7e52eae3ab0510c3cb0e7d9d150bbaeab838 + uses: sonarsource/sonarcloud-github-action@02ef91109b2d589e757aefcfb2854c2783fd7b19 env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} @@ -38,11 +38,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/init@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/analyze@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -57,7 +57,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@869c549e657a088dc0441b08ce4fc0ecdac2bb65 + uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 id: scan with: path: "." @@ -65,6 +65,6 @@ jobs: - name: Show Anchore scan SARIF report run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report - uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/upload-sarif@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/subctl-unit.yml b/.github/workflows/subctl-unit.yml index 91ecbec9c..ceee8b411 100644 --- a/.github/workflows/subctl-unit.yml +++ b/.github/workflows/subctl-unit.yml @@ -33,7 +33,7 @@ jobs: ref: ${{ github.base_ref }} - name: Set up Go - uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed + uses: actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 with: go-version: '1.19' check-latest: true diff --git a/.github/workflows/unit.yml b/.github/workflows/unit.yml index 08a314f97..447e128cd 100644 --- a/.github/workflows/unit.yml +++ b/.github/workflows/unit.yml @@ -33,7 +33,7 @@ jobs: done - name: Upload artifacts - uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 + uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 with: name: Unit test artifacts path: artifacts