diff --git a/.github/workflows/codeql-analysis.yaml b/.github/workflows/codeql-analysis.yaml index 78079bd4bc..b0e06b4d02 100644 --- a/.github/workflows/codeql-analysis.yaml +++ b/.github/workflows/codeql-analysis.yaml @@ -24,7 +24,7 @@ jobs: runs-on: ubuntu-24.04 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } diff --git a/.github/workflows/govulncheck.yaml b/.github/workflows/govulncheck.yaml index df81b90e53..656641b5da 100644 --- a/.github/workflows/govulncheck.yaml +++ b/.github/workflows/govulncheck.yaml @@ -20,7 +20,7 @@ jobs: runs-on: ubuntu-24.04 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 # Install Go and produce a SARIF report. This fails only when the tool is # unable to scan. diff --git a/.github/workflows/lint.yaml b/.github/workflows/lint.yaml index 66479589ac..9f97c4d92c 100644 --- a/.github/workflows/lint.yaml +++ b/.github/workflows/lint.yaml @@ -15,7 +15,7 @@ jobs: contents: read checks: write steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } diff --git a/.github/workflows/test.yaml b/.github/workflows/test.yaml index 9368fd6397..75574b6c7a 100644 --- a/.github/workflows/test.yaml +++ b/.github/workflows/test.yaml @@ -15,7 +15,7 @@ jobs: go-test: runs-on: ubuntu-24.04 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } @@ -33,7 +33,7 @@ jobs: matrix: kubernetes: ['default'] steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } @@ -60,7 +60,7 @@ jobs: matrix: kubernetes: [v1.33, v1.28] steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } @@ -94,7 +94,7 @@ jobs: matrix: kubernetes: [v1.33, v1.28] steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } @@ -174,10 +174,10 @@ jobs: - kubernetes-api - kubernetes-k3d steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - uses: actions/setup-go@v5 with: { go-version: stable } - - uses: actions/download-artifact@v4 + - uses: actions/download-artifact@v5 with: { path: download } # Combine the coverage profiles by taking the mode line from any one file diff --git a/.github/workflows/trivy.yaml b/.github/workflows/trivy.yaml index 72805f1ac2..1ae2230874 100644 --- a/.github/workflows/trivy.yaml +++ b/.github/workflows/trivy.yaml @@ -25,7 +25,7 @@ jobs: runs-on: ubuntu-24.04 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 - name: Download Trivy uses: ./.github/actions/trivy env: @@ -45,7 +45,7 @@ jobs: runs-on: ubuntu-24.04 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 # Trivy needs a populated Go module cache to detect Go module licenses. - uses: actions/setup-go@v5 @@ -71,7 +71,7 @@ jobs: runs-on: ubuntu-24.04 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 # Report success only when detected secrets are listed in [.trivyignore.yaml]. - name: Scan secrets @@ -93,7 +93,7 @@ jobs: runs-on: ubuntu-24.04 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@v5 # Print any detected secrets or vulnerabilities to the workflow log for # human consumption. This step fails only when Trivy is unable to scan.