diff --git a/.github/workflows/build-embedding.yml b/.github/workflows/build-embedding.yml index 446575e7..4fbf93ca 100644 --- a/.github/workflows/build-embedding.yml +++ b/.github/workflows/build-embedding.yml @@ -190,7 +190,7 @@ jobs: COSIGN_EXPERIMENTAL: "true" run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign --yes {}@${{ steps.build-and-push.outputs.digest }} - name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph - uses: aquasecurity/trivy-action@559eb1224e654a86c844a795e6702a0742c60c72 # ratchet:aquasecurity/trivy-action@master + uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f # ratchet:aquasecurity/trivy-action@master if: ${{ github.event_name != 'pull_request' }} with: image-ref: 'ghcr.io/bentoml/openllm-embedding:sha-${{ env.GITHUB_SHA_SHORT }}' @@ -199,7 +199,7 @@ jobs: github-pat: ${{ secrets.UI_GITHUB_TOKEN }} scanners: 'vuln' - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@559eb1224e654a86c844a795e6702a0742c60c72 # ratchet:aquasecurity/trivy-action@master + uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f # ratchet:aquasecurity/trivy-action@master if: ${{ github.event_name != 'pull_request' }} with: image-ref: 'ghcr.io/bentoml/openllm-embedding:sha-${{ env.GITHUB_SHA_SHORT }}' diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml index 6a0100fc..01f45529 100644 --- a/.github/workflows/build.yml +++ b/.github/workflows/build.yml @@ -187,7 +187,7 @@ jobs: COSIGN_EXPERIMENTAL: "true" run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign --yes {}@${{ steps.build-and-push.outputs.digest }} - name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph - uses: aquasecurity/trivy-action@559eb1224e654a86c844a795e6702a0742c60c72 # ratchet:aquasecurity/trivy-action@master + uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f # ratchet:aquasecurity/trivy-action@master if: ${{ github.event_name != 'pull_request' }} with: image-ref: 'ghcr.io/bentoml/openllm:sha-${{ env.GITHUB_SHA_SHORT }}' @@ -196,7 +196,7 @@ jobs: github-pat: ${{ secrets.GITHUB_TOKEN }} scanners: 'vuln' - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@559eb1224e654a86c844a795e6702a0742c60c72 # ratchet:aquasecurity/trivy-action@master + uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f # ratchet:aquasecurity/trivy-action@master if: ${{ github.event_name != 'pull_request' }} with: image-ref: 'ghcr.io/bentoml/openllm:sha-${{ env.GITHUB_SHA_SHORT }}' diff --git a/.github/workflows/clojure-frontend.yml b/.github/workflows/clojure-frontend.yml index c40b7183..4cacbcad 100644 --- a/.github/workflows/clojure-frontend.yml +++ b/.github/workflows/clojure-frontend.yml @@ -117,7 +117,7 @@ jobs: COSIGN_EXPERIMENTAL: "true" run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign --yes {}@${{ steps.build-and-push.outputs.digest }} - name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph - uses: aquasecurity/trivy-action@559eb1224e654a86c844a795e6702a0742c60c72 # ratchet:aquasecurity/trivy-action@master + uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f # ratchet:aquasecurity/trivy-action@master if: ${{ github.event_name != 'pull_request' }} with: image-ref: 'ghcr.io/bentoml/openllm-ui-clojure:sha-${{ env.GITHUB_SHA_SHORT }}' @@ -126,7 +126,7 @@ jobs: github-pat: ${{ secrets.UI_GITHUB_TOKEN }} scanners: 'vuln' - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@559eb1224e654a86c844a795e6702a0742c60c72 # ratchet:aquasecurity/trivy-action@master + uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f # ratchet:aquasecurity/trivy-action@master if: ${{ github.event_name != 'pull_request' }} with: image-ref: 'ghcr.io/bentoml/openllm-ui-clojure:sha-${{ env.GITHUB_SHA_SHORT }}'