diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index 434159c20..f03d2a32d 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -146,11 +146,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/init@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/analyze@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -162,7 +162,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@869c549e657a088dc0441b08ce4fc0ecdac2bb65 + uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 id: scan with: path: "." @@ -173,7 +173,7 @@ jobs: run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report if: always() - uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/multiarch.yml b/.github/workflows/multiarch.yml index 651d94ee3..4e854c46d 100644 --- a/.github/workflows/multiarch.yml +++ b/.github/workflows/multiarch.yml @@ -14,7 +14,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Set up QEMU (to support building on non-native architectures) - uses: docker/setup-qemu-action@49b3bc8e6bdd4a60e6116a5414239cba5943d3cf + uses: docker/setup-qemu-action@53851d14592bedcffcf25ea515637cff71ef929a - name: Build the multi-arch images run: make multiarch-images - name: Check that we actually build multi-arch images diff --git a/.github/workflows/periodic.yml b/.github/workflows/periodic.yml index 1b5a5c000..971ae5eb8 100644 --- a/.github/workflows/periodic.yml +++ b/.github/workflows/periodic.yml @@ -26,7 +26,7 @@ jobs: done - name: Create Pull Request - uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f + uses: peter-evans/create-pull-request@67ccf781d68cd99b580ae25a5c18a1cc84ffff1f with: title: Update submariner-io/* dependencies to latest body: | diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index 6cc9fab81..525536349 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -24,7 +24,7 @@ jobs: run: make unit - name: Run SonarScan, upload Go test results and coverage - uses: sonarsource/sonarcloud-github-action@383f7e52eae3ab0510c3cb0e7d9d150bbaeab838 + uses: sonarsource/sonarcloud-github-action@02ef91109b2d589e757aefcfb2854c2783fd7b19 env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} @@ -38,11 +38,11 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Initialize CodeQL - uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/init@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c with: languages: go - name: Run CodeQL variant analysis - uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/analyze@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c - name: Show CodeQL scan SARIF report if: always() run: cat ../results/go.sarif @@ -57,7 +57,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@869c549e657a088dc0441b08ce4fc0ecdac2bb65 + uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 id: scan with: path: "." @@ -65,6 +65,6 @@ jobs: - name: Show Anchore scan SARIF report run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report - uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 + uses: github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/stale.yml b/.github/workflows/stale.yml index 4fd6ef8e6..912a30de4 100644 --- a/.github/workflows/stale.yml +++ b/.github/workflows/stale.yml @@ -16,7 +16,7 @@ jobs: issues: write pull-requests: write steps: - - uses: actions/stale@f69122271d990fd11f5594ccff2296f00ff59b49 + - uses: actions/stale@fa77dfddd04682b7d96dbc4e016318e681fdc10e with: days-before-issue-stale: 120 days-before-pr-stale: 14 diff --git a/.github/workflows/unit.yml b/.github/workflows/unit.yml index 67fabb360..a52611818 100644 --- a/.github/workflows/unit.yml +++ b/.github/workflows/unit.yml @@ -30,7 +30,7 @@ jobs: done - name: Upload artifacts - uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 + uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 with: name: Unit test artifacts path: artifacts