24
24
run : make unit
25
25
26
26
- name : Run SonarScan, upload Go test results and coverage
27
- uses : sonarsource/sonarcloud-github-action@383f7e52eae3ab0510c3cb0e7d9d150bbaeab838
27
+ uses : sonarsource/sonarcloud-github-action@02ef91109b2d589e757aefcfb2854c2783fd7b19
28
28
env :
29
29
GITHUB_TOKEN : ${{ secrets.GITHUB_TOKEN }}
30
30
SONAR_TOKEN : ${{ secrets.SONAR_TOKEN }}
@@ -38,11 +38,11 @@ jobs:
38
38
- name : Check out the repository
39
39
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
40
40
- name : Initialize CodeQL
41
- uses : github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88
41
+ uses : github/codeql-action/init@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c
42
42
with :
43
43
languages : go
44
44
- name : Run CodeQL variant analysis
45
- uses : github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88
45
+ uses : github/codeql-action/analyze@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c
46
46
- name : Show CodeQL scan SARIF report
47
47
if : always()
48
48
run : cat ../results/go.sarif
@@ -57,14 +57,14 @@ jobs:
57
57
- name : Check out the repository
58
58
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
59
59
- name : Run Anchore vulnerability scanner
60
- uses : anchore/scan-action@869c549e657a088dc0441b08ce4fc0ecdac2bb65
60
+ uses : anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342
61
61
id : scan
62
62
with :
63
63
path : " ."
64
64
fail-build : false
65
65
- name : Show Anchore scan SARIF report
66
66
run : cat ${{ steps.scan.outputs.sarif }}
67
67
- name : Upload Anchore scan SARIF report
68
- uses : github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88
68
+ uses : github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c
69
69
with :
70
70
sarif_file : ${{ steps.scan.outputs.sarif }}
0 commit comments