@@ -106,7 +106,7 @@ jobs:
106
106
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
107
107
108
108
- name : Run markdown-link-check
109
- uses : gaurav-nelson/github-action-markdown-link-check@d53a906aa6b22b8979d33bc86170567e619495ec
109
+ uses : gaurav-nelson/github-action-markdown-link-check@1b916f2cf6c36510a6059943104e3c42ce6c16bc
110
110
with :
111
111
config-file : " .markdownlinkcheck.json"
112
112
check-modified-files-only : " yes"
@@ -146,11 +146,11 @@ jobs:
146
146
- name : Check out the repository
147
147
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
148
148
- name : Initialize CodeQL
149
- uses : github/codeql-action/init@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c
149
+ uses : github/codeql-action/init@dd746615b3b9d728a6a37ca2045b68ca76d4841a
150
150
with :
151
151
languages : go
152
152
- name : Run CodeQL variant analysis
153
- uses : github/codeql-action/analyze@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c
153
+ uses : github/codeql-action/analyze@dd746615b3b9d728a6a37ca2045b68ca76d4841a
154
154
- name : Show CodeQL scan SARIF report
155
155
if : always()
156
156
run : cat ../results/go.sarif
@@ -162,7 +162,7 @@ jobs:
162
162
- name : Check out the repository
163
163
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
164
164
- name : Run Anchore vulnerability scanner
165
- uses : anchore/scan-action@abae793926ec39a78ab18002bc7fc45bbbd94342
165
+ uses : anchore/scan-action@7c05671ae9be166aeb155bad2d7df9121823df32
166
166
id : scan
167
167
with :
168
168
path : " ."
@@ -173,7 +173,7 @@ jobs:
173
173
run : cat ${{ steps.scan.outputs.sarif }}
174
174
- name : Upload Anchore scan SARIF report
175
175
if : always()
176
- uses : github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c
176
+ uses : github/codeql-action/upload-sarif@dd746615b3b9d728a6a37ca2045b68ca76d4841a
177
177
with :
178
178
sarif_file : ${{ steps.scan.outputs.sarif }}
179
179
0 commit comments