diff --git a/.github/workflows/codeql.yaml b/.github/workflows/codeql.yaml index 1590caf..95229cc 100644 --- a/.github/workflows/codeql.yaml +++ b/.github/workflows/codeql.yaml @@ -17,7 +17,7 @@ jobs: security-events: write steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } diff --git a/.github/workflows/lint.yaml b/.github/workflows/lint.yaml index 8aa5f7b..b97cc79 100644 --- a/.github/workflows/lint.yaml +++ b/.github/workflows/lint.yaml @@ -12,7 +12,7 @@ jobs: contents: read checks: write steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } diff --git a/.github/workflows/test.yaml b/.github/workflows/test.yaml index 1b8e2c9..3c6ebdc 100644 --- a/.github/workflows/test.yaml +++ b/.github/workflows/test.yaml @@ -12,7 +12,7 @@ jobs: go-test: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } @@ -27,7 +27,7 @@ jobs: matrix: kubernetes: [v1.27, v1.24, v1.21] steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } diff --git a/.github/workflows/trivy.yaml b/.github/workflows/trivy.yaml index 658d89c..d5a02e7 100644 --- a/.github/workflows/trivy.yaml +++ b/.github/workflows/trivy.yaml @@ -14,7 +14,7 @@ jobs: licenses: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 # Trivy needs a populated Go module cache to detect Go module licenses. - uses: actions/setup-go@v5 @@ -37,7 +37,7 @@ jobs: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 # Run trivy and log detected and fixed vulnerabilities # This report should match the uploaded code scan report below