@@ -64,10 +64,10 @@ jobs:
6464 uses : docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
6565
6666 - name : Set up Docker Buildx
67- uses : docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
67+ uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
6868
6969 - name : Set up Cosign
70- uses : sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
70+ uses : sigstore/cosign-installer@398d4b0eeef1380460a10c8013a76f728fb906ac # v3.9.1
7171 if : ${{ inputs.publish }}
7272
7373 - name : Set image name
@@ -150,7 +150,7 @@ jobs:
150150 tar -xf image.tar -C image
151151
152152 - name : Run Trivy vulnerability scanner
153- uses : aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31 .0
153+ uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32 .0
154154 env :
155155 TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
156156 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -167,7 +167,7 @@ jobs:
167167 retention-days : 5
168168
169169 - name : Upload Trivy scan results to GitHub Security tab
170- uses : github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
170+ uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
171171 with :
172172 sarif_file : trivy-results.sarif
173173
@@ -194,7 +194,8 @@ jobs:
194194 uses : azure/setup-helm@b9e51907a09c216f16ebe8536097933489208112 # v4.3.0
195195
196196 - name : Set up Cosign
197- uses : sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
197+ uses : sigstore/cosign-installer@398d4b0eeef1380460a10c8013a76f728fb906ac # v3.9.1
198+ if : ${{ inputs.publish }}
198199
199200 - name : Set chart name
200201 id : chart-name
@@ -268,7 +269,7 @@ jobs:
268269 --certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
269270
270271 - name : Run Trivy vulnerability scanner
271- uses : aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31 .0
272+ uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32 .0
272273 env :
273274 TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
274275 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -286,6 +287,6 @@ jobs:
286287 retention-days : 5
287288
288289 - name : Upload Trivy scan results to GitHub Security tab
289- uses : github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
290+ uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
290291 with :
291292 sarif_file : trivy-results.sarif
0 commit comments