@@ -210,7 +210,7 @@ jobs:
210210 tar -xf image.tar -C image
211211
212212 - name : Run Trivy vulnerability scanner
213- uses : aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # 0.28 .0
213+ uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29 .0
214214 env :
215215 TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
216216 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:1
@@ -227,7 +227,7 @@ jobs:
227227 retention-days : 5
228228
229229 - name : Upload Trivy scan results to GitHub Security tab
230- uses : github/codeql-action/upload-sarif@407ffafae6a767df3e0230c3df91b6443ae8df75 # v2.22.8
230+ uses : github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
231231 with :
232232 sarif_file : trivy-results.sarif
233233
@@ -251,9 +251,9 @@ jobs:
251251 uses : actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
252252
253253 - name : Set up Helm
254- uses : azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
254+ uses : azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
255255 with :
256- version : v3.12.0
256+ version : v3.13.3
257257
258258 - name : Set up Cosign
259259 uses : sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
@@ -361,7 +361,7 @@ jobs:
361361 fi
362362
363363 - name : Run Trivy vulnerability scanner
364- uses : aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # 0.28 .0
364+ uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29 .0
365365 env :
366366 TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
367367 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:1
@@ -379,7 +379,7 @@ jobs:
379379 retention-days : 5
380380
381381 - name : Upload Trivy scan results to GitHub Security tab
382- uses : github/codeql-action/upload-sarif@407ffafae6a767df3e0230c3df91b6443ae8df75 # v2.22.8
382+ uses : github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
383383 with :
384384 sarif_file : trivy-results.sarif
385385
@@ -408,16 +408,16 @@ jobs:
408408 uses : actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
409409
410410 - name : Set up Helm
411- uses : azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
411+ uses : azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
412412 with :
413- version : v3.12.0
413+ version : v3.13.3
414414
415415 - name : Set up Cosign
416416 uses : sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
417417
418418 - name : Set chart name
419419 id : chart-name
420- run : echo "value=${{ github.event.repository.name }}/$subchartName" >> "$GITHUB_OUTPUT"
420+ run : echo "value=${{ github.event.repository.name }}/${{ env. subchartName }} " >> "$GITHUB_OUTPUT"
421421
422422 - name : Set OCI registry name
423423 id : oci-registry-name
@@ -428,7 +428,7 @@ jobs:
428428 run : echo "value=${{ steps.oci-registry-name.outputs.value }}/${{ steps.chart-name.outputs.value }}" >> "$GITHUB_OUTPUT"
429429
430430 - name : Helm lint
431- run : helm lint charts/$subchartPath
431+ run : helm lint charts/${{ env. subchartPath }}
432432
433433 - name : Determine raw version
434434 uses : haya14busa/action-cond@94f77f7a80cd666cb3155084e428254fea4281fd # v1.2.1
@@ -441,8 +441,8 @@ jobs:
441441 - name : Helm package
442442 id : build
443443 run : |
444- helm package charts/$subchartPath --version ${{ steps.version.outputs.value }} --app-version ${{ steps.version.outputs.value }}
445- echo "package=${{ github.workspace }}/$subchartName-${{ steps.version.outputs.value }}.tgz" >> "$GITHUB_OUTPUT"
444+ helm package charts/${{ env. subchartPath }} --version ${{ steps.version.outputs.value }} --app-version ${{ steps.version.outputs.value }}
445+ echo "package=${{ github.workspace }}/${{ env. subchartName }} -${{ steps.version.outputs.value }}.tgz" >> "$GITHUB_OUTPUT"
446446
447447 - name : Upload chart as artifact
448448 uses : actions/upload-artifact@a8a3f3ad30e3422c9c7b888a15615d19a852ae32 # v3.1.3
@@ -484,13 +484,13 @@ jobs:
484484 --certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
485485
486486 - name : Run Trivy vulnerability scanner
487- uses : aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # 0.28 .0
487+ uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29 .0
488488 env :
489489 TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
490490 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:1
491491 with :
492492 scan-type : config
493- scan-ref : charts/$subchartPath
493+ scan-ref : charts/${{ env. subchartPath }}
494494 format : sarif
495495 output : trivy-results.sarif
496496
@@ -502,6 +502,6 @@ jobs:
502502 retention-days : 5
503503
504504 - name : Upload Trivy scan results to GitHub Security tab
505- uses : github/codeql-action/upload-sarif@407ffafae6a767df3e0230c3df91b6443ae8df75 # v2.22.8
505+ uses : github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
506506 with :
507507 sarif_file : trivy-results.sarif
0 commit comments