fix: pin github actions (#7228)

Repository follow standard to use git hash to pin the GitHub actions. Updated the container security scan workflow actions with their git hashes

Signed-off-by: Chaminda Divitotawela <cdivitotawela@gmail.com>
pull/7230/head
Chaminda Divitotawela 5 months ago committed by GitHub
parent 884834f352
commit 1837f46080
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 6
      .github/workflows/container-security-scan.yml

@ -17,7 +17,7 @@ jobs:
steps: steps:
- name: Checkout - name: Checkout
uses: actions/checkout@v4 uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11
# Shell parameter expansion does not support directly on a step # Shell parameter expansion does not support directly on a step
# Adding a separate step to set the image tag. This allows running # Adding a separate step to set the image tag. This allows running
@ -31,7 +31,7 @@ jobs:
- name: Vulnerability scanner - name: Vulnerability scanner
id: trivy id: trivy
uses: aquasecurity/trivy-action@0.22.0 uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d
with: with:
image-ref: hyperledger/besu:${{ steps.tag.outputs.TAG }} image-ref: hyperledger/besu:${{ steps.tag.outputs.TAG }}
format: sarif format: sarif
@ -39,6 +39,6 @@ jobs:
# Check the vulnerabilities via GitHub security tab # Check the vulnerabilities via GitHub security tab
- name: Upload results - name: Upload results
uses: github/codeql-action/upload-sarif@v3 uses: github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251
with: with:
sarif_file: 'trivy-results.sarif' sarif_file: 'trivy-results.sarif'

Loading…
Cancel
Save