diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml index 8c32ea274..e4c67dd20 100644 --- a/.github/workflows/linting.yml +++ b/.github/workflows/linting.yml @@ -97,7 +97,7 @@ jobs: uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run markdown-link-check - uses: gaurav-nelson/github-action-markdown-link-check@d53a906aa6b22b8979d33bc86170567e619495ec + uses: gaurav-nelson/github-action-markdown-link-check@1b916f2cf6c36510a6059943104e3c42ce6c16bc with: config-file: ".markdownlinkcheck.json" check-modified-files-only: "yes" @@ -137,7 +137,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 + uses: anchore/scan-action@7c05671ae9be166aeb155bad2d7df9121823df32 id: scan with: path: "." @@ -148,7 +148,7 @@ jobs: run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report if: always() - uses: github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c + uses: github/codeql-action/upload-sarif@dd746615b3b9d728a6a37ca2045b68ca76d4841a with: sarif_file: ${{ steps.scan.outputs.sarif }} diff --git a/.github/workflows/periodic.yml b/.github/workflows/periodic.yml index 23fdbcb3f..87b3a0ba9 100644 --- a/.github/workflows/periodic.yml +++ b/.github/workflows/periodic.yml @@ -54,7 +54,7 @@ jobs: uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run markdown-link-check - uses: gaurav-nelson/github-action-markdown-link-check@d53a906aa6b22b8979d33bc86170567e619495ec + uses: gaurav-nelson/github-action-markdown-link-check@1b916f2cf6c36510a6059943104e3c42ce6c16bc with: config-file: ".markdownlinkcheck.json" diff --git a/.github/workflows/report.yml b/.github/workflows/report.yml index efe4d211e..9ac65f6eb 100644 --- a/.github/workflows/report.yml +++ b/.github/workflows/report.yml @@ -39,7 +39,7 @@ jobs: - name: Check out the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 - name: Run Anchore vulnerability scanner - uses: anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342 + uses: anchore/scan-action@7c05671ae9be166aeb155bad2d7df9121823df32 id: scan with: path: "." @@ -47,6 +47,6 @@ jobs: - name: Show Anchore scan SARIF report run: cat ${{ steps.scan.outputs.sarif }} - name: Upload Anchore scan SARIF report - uses: github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c + uses: github/codeql-action/upload-sarif@dd746615b3b9d728a6a37ca2045b68ca76d4841a with: sarif_file: ${{ steps.scan.outputs.sarif }}