File tree Expand file tree Collapse file tree 4 files changed +8
-8
lines changed Expand file tree Collapse file tree 4 files changed +8
-8
lines changed Original file line number Diff line number Diff line change 1818
1919 steps :
2020 - uses : actions/checkout@v5
21- - uses : actions/setup-go@v5
21+ - uses : actions/setup-go@v6
2222 with : { go-version: stable }
2323
2424 - name : Initialize CodeQL
Original file line number Diff line number Diff line change 1313 checks : write
1414 steps :
1515 - uses : actions/checkout@v5
16- - uses : actions/setup-go@v5
16+ - uses : actions/setup-go@v6
1717 with : { go-version: stable }
1818
1919 - uses : golangci/golangci-lint-action@v8
Original file line number Diff line number Diff line change 1313 runs-on : ubuntu-latest
1414 steps :
1515 - uses : actions/checkout@v5
16- - uses : actions/setup-go@v5
16+ - uses : actions/setup-go@v6
1717 with : { go-version: stable }
1818
1919 - run : make check
2828 kubernetes : [v1.27, v1.24, v1.21]
2929 steps :
3030 - uses : actions/checkout@v5
31- - uses : actions/setup-go@v5
31+ - uses : actions/setup-go@v6
3232 with : { go-version: stable }
3333
3434 - name : Start k3s
Original file line number Diff line number Diff line change @@ -17,13 +17,13 @@ jobs:
1717 - uses : actions/checkout@v5
1818
1919 # Trivy needs a populated Go module cache to detect Go module licenses.
20- - uses : actions/setup-go@v5
20+ - uses : actions/setup-go@v6
2121 with : { go-version: stable }
2222 - run : go mod download
2323
2424 # Report success only when detected licenses are listed in [/trivy.yaml].
2525 - name : Scan licenses
26- uses : aquasecurity/trivy-action@0.32.0
26+ uses : aquasecurity/trivy-action@0.33.1
2727 env :
2828 TRIVY_DEBUG : true
2929 with :
4444 # and is a convenience/redundant effort for those who prefer to
4545 # read logs and/or if anything goes wrong with the upload.
4646 - name : Log all detected vulnerabilities
47- uses : aquasecurity/trivy-action@0.32.0
47+ uses : aquasecurity/trivy-action@0.33.1
4848 with :
4949 scan-type : filesystem
5050 hide-progress : true
5656 # - https://docs.github.com/en/code-security/code-scanning/integrating-with-code-scanning/uploading-a-sarif-file-to-github
5757 # - https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning
5858 - name : Report actionable vulnerabilities
59- uses : aquasecurity/trivy-action@0.32.0
59+ uses : aquasecurity/trivy-action@0.33.1
6060 with :
6161 scan-type : filesystem
6262 ignore-unfixed : true
You can’t perform that action at this time.
0 commit comments