diff --git a/.github/workflows/push.yml b/.github/workflows/push.yml index 30cfa2b..9e8f9a9 100644 --- a/.github/workflows/push.yml +++ b/.github/workflows/push.yml @@ -43,7 +43,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout - uses: actions/checkout@v6 + uses: actions/checkout@v6.0.0 - name: Build and Push Greenbone Registry id: build diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index ef96991..318b07a 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -17,7 +17,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout - uses: actions/checkout@v6 + uses: actions/checkout@v6.0.0 - name: Get dockerhub postgres service tags id: dtags diff --git a/.github/workflows/research-vuln-scan.yml b/.github/workflows/research-vuln-scan.yml index 86759bb..997dcad 100644 --- a/.github/workflows/research-vuln-scan.yml +++ b/.github/workflows/research-vuln-scan.yml @@ -20,7 +20,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout code - uses: actions/checkout@93cb6efe18208431cddfb8368fd83d5badbf9bfd # v4.2.2 + uses: actions/checkout@c2d88d3ecc89a9ef08eebf45d9637801dcee7eb5 # v4.2.2 - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 @@ -36,7 +36,7 @@ jobs: TRIVY_PASSWORD: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }} - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@e12f0178983d466f2f6028f5cc7a6d786fd97f4b # v3.29.5 + uses: github/codeql-action/upload-sarif@fdbfb4d2750291e159f0156def62b853c2798ca2 # v3.29.5 with: sarif_file: 'trivy-results.sarif' category: ${{ github.jobs[github.job].name }} @@ -50,7 +50,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout code - uses: actions/checkout@93cb6efe18208431cddfb8368fd83d5badbf9bfd # v4.2.2 + uses: actions/checkout@c2d88d3ecc89a9ef08eebf45d9637801dcee7eb5 # v4.2.2 - name: Login to Greenbone Product container registry uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef #v3.6.0 @@ -60,7 +60,7 @@ jobs: password: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }} - name: Run the Anchore Grype scan action - uses: anchore/scan-action@3aaf50d765cfcceafa51d322ccb790e40f6cd8c5 + uses: anchore/scan-action@40a61b52209e9d50e87917c5b901783d546b12d0 id: grype with: image: '${{ vars.GREENBONE_REGISTRY }}/opensight/opensight-postgres:16' @@ -68,7 +68,7 @@ jobs: severity-cutoff: medium - name: Upload grype vulnerability report - uses: github/codeql-action/upload-sarif@e12f0178983d466f2f6028f5cc7a6d786fd97f4b # v3.29.5 + uses: github/codeql-action/upload-sarif@fdbfb4d2750291e159f0156def62b853c2798ca2 # v3.29.5 with: sarif_file: ${{ steps.grype.outputs.sarif }} category: ${{ github.jobs[github.job].name }} @@ -83,7 +83,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout code - uses: actions/checkout@93cb6efe18208431cddfb8368fd83d5badbf9bfd # v4.2.2 + uses: actions/checkout@c2d88d3ecc89a9ef08eebf45d9637801dcee7eb5 # v4.2.2 - name: Login to Greenbone Product container registry uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef #v3.6.0 @@ -108,7 +108,7 @@ jobs: - name: Upload docker scout SARIF result id: upload-sarif if: ${{ github.event_name != 'pull_request_target' }} - uses: github/codeql-action/upload-sarif@e12f0178983d466f2f6028f5cc7a6d786fd97f4b # v3.29.5 + uses: github/codeql-action/upload-sarif@fdbfb4d2750291e159f0156def62b853c2798ca2 # v3.29.5 with: sarif_file: sarif.output.json category: ${{ github.jobs[github.job].name }}