Skip to content

Commit 0d32cc2

Browse files
chore(deps): update all dependencies
1 parent 3c33a47 commit 0d32cc2

File tree

23 files changed

+288
-265
lines changed

23 files changed

+288
-265
lines changed

.github/workflows/artifacts.yaml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ jobs:
7474
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
7575

7676
- name: Set up Docker Buildx
77-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
77+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
7878

7979
- name: Set up Cosign
8080
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
@@ -112,7 +112,7 @@ jobs:
112112

113113
- name: Build and push image
114114
id: build
115-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
115+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
116116
with:
117117
context: .
118118
platforms: linux/amd64,linux/arm64
@@ -196,7 +196,7 @@ jobs:
196196
tar -xf image.tar -C image
197197
198198
- name: Run Trivy vulnerability scanner
199-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
199+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
200200
env:
201201
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
202202
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -213,7 +213,7 @@ jobs:
213213
retention-days: 5
214214

215215
- name: Upload Trivy scan results to GitHub Security tab
216-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
216+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
217217
with:
218218
sarif_file: trivy-results.sarif
219219

@@ -351,7 +351,7 @@ jobs:
351351
fi
352352
353353
- name: Run Trivy vulnerability scanner
354-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
354+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
355355
env:
356356
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
357357
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -369,7 +369,7 @@ jobs:
369369
retention-days: 5
370370

371371
- name: Upload Trivy scan results to GitHub Security tab
372-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
372+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
373373
with:
374374
sarif_file: trivy-results.sarif
375375

@@ -475,7 +475,7 @@ jobs:
475475
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
476476
477477
- name: Run Trivy vulnerability scanner
478-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
478+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
479479
env:
480480
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
481481
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -493,6 +493,6 @@ jobs:
493493
retention-days: 5
494494

495495
- name: Upload Trivy scan results to GitHub Security tab
496-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
496+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
497497
with:
498498
sarif_file: trivy-results.sarif

.github/workflows/ci.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
run: make generate-test-coverage
3232

3333
- name: Test Coverage
34-
uses: vladopajic/go-test-coverage@7003e902e787e60375e1ce3ae5b85b19313dbff2 # v2.14.3
34+
uses: vladopajic/go-test-coverage@ebf1fb6f7267bd290a83cc16f535067b51fd1d0b # v2.15.0
3535
with:
3636
config: ./.testcoverage.yml
3737
source-dir: ./

.github/workflows/config-reloader.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3232

3333
- name: Set up Docker Buildx
34-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
34+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3535

3636
- name: Set up Cosign
3737
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Build and push config-reloader image
7171
id: build
72-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
72+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7373
with:
7474
context: images/config-reloader
7575
platforms: linux/amd64,linux/arm64
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
116+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
133+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/e2e.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ jobs:
5151
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
5252

5353
- name: Set up Docker Buildx
54-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
54+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
5555

5656
- name: Build and export ${{ matrix.image }}-image
57-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
57+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
5858
with:
5959
context: ${{ matrix.context }}
6060
tags: ${{ matrix.tags }}
@@ -85,7 +85,7 @@ jobs:
8585
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
8686

8787
- name: Set up Docker Buildx
88-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
88+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
8989

9090
- name: Download artifact
9191
uses: actions/download-artifact@d3f86a106a0bac45b974a628896c90dbdf5c8093 # v4.3.0
@@ -121,7 +121,7 @@ jobs:
121121
# SHARDS: ${{ matrix.SHARDS }}
122122

123123
- name: Run coverage report
124-
uses: vladopajic/go-test-coverage@7003e902e787e60375e1ce3ae5b85b19313dbff2 # v2.14.3
124+
uses: vladopajic/go-test-coverage@ebf1fb6f7267bd290a83cc16f535067b51fd1d0b # v2.15.0
125125
with:
126126
profile: ./build/_test_coverage/coverage_e2e.out
127127
source-dir: ./
@@ -145,7 +145,7 @@ jobs:
145145

146146
steps:
147147
- name: Set up Docker Buildx
148-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
148+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
149149

150150
- name: Download artifact
151151
uses: actions/download-artifact@d3f86a106a0bac45b974a628896c90dbdf5c8093 # v4.3.0

.github/workflows/fluentd-drain-watch.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3333

3434
- name: Set up Docker Buildx
35-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
35+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3636

3737
- name: Set up Cosign
3838
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
@@ -70,7 +70,7 @@ jobs:
7070

7171
- name: Build and push fluentd-drain-watch image
7272
id: build
73-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
73+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7474
with:
7575
context: images/fluentd-drain-watch
7676
platforms: linux/amd64,linux/arm64
@@ -114,7 +114,7 @@ jobs:
114114
tar -xf image.tar -C image
115115
116116
- name: Run Trivy vulnerability scanner
117-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
117+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
118118
env:
119119
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
120120
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -131,6 +131,6 @@ jobs:
131131
retention-days: 5
132132

133133
- name: Upload Trivy scan results to GitHub Security tab
134-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
134+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
135135
with:
136136
sarif_file: trivy-results.sarif

.github/workflows/fluentd-images.yaml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ jobs:
8787
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
8888

8989
- name: Set up Docker Buildx
90-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
90+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
9191

9292
- name: Set image name
9393
id: image-name
@@ -118,7 +118,7 @@ jobs:
118118
119119
- name: Build and push fluentd-${{ matrix.image-type }}-${{ matrix.platform }} image
120120
id: build
121-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
121+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
122122
with:
123123
context: images/fluentd
124124
platforms: ${{ matrix.platform }}
@@ -134,7 +134,7 @@ jobs:
134134
tar -xf image.tar -C image
135135
136136
- name: Run Trivy vulnerability scanner
137-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
137+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
138138
env:
139139
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
140140
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -151,7 +151,7 @@ jobs:
151151
retention-days: 5
152152

153153
- name: Upload Trivy scan results to GitHub Security tab
154-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
154+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
155155
with:
156156
sarif_file: trivy-results.sarif
157157

@@ -199,7 +199,7 @@ jobs:
199199
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
200200

201201
- name: Set up Docker Buildx
202-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
202+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
203203

204204
- name: Set up Cosign
205205
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
@@ -228,7 +228,7 @@ jobs:
228228

229229
- name: Build and push fluentd-${{ matrix.image-type }}-${{ matrix.platform }} image
230230
id: build
231-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
231+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
232232
with:
233233
context: images/fluentd
234234
platforms: ${{ matrix.platform }}
@@ -299,7 +299,7 @@ jobs:
299299

300300
steps:
301301
- name: Set up Docker Buildx
302-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
302+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
303303

304304
- name: Set up Cosign
305305
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
@@ -377,7 +377,7 @@ jobs:
377377
tar -xf image.tar -C image
378378
379379
- name: Run Trivy vulnerability scanner
380-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
380+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
381381
env:
382382
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
383383
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -394,6 +394,6 @@ jobs:
394394
retention-days: 5
395395

396396
- name: Upload Trivy scan results to GitHub Security tab
397-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
397+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
398398
with:
399399
sarif_file: trivy-results.sarif

.github/workflows/node-exporter.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3232

3333
- name: Set up Docker Buildx
34-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
34+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3535

3636
- name: Set up Cosign
3737
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Build and push Node exporter image
7171
id: build
72-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
72+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7373
with:
7474
context: images/node-exporter
7575
platforms: linux/amd64,linux/arm64
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
116+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
133+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/syslog-ng-reloader.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3232

3333
- name: Set up Docker Buildx
34-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
34+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3535

3636
- name: Set up Cosign
3737
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Build and push syslog-ng-reloader image
7171
id: build
72-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
72+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7373
with:
7474
context: images/syslog-ng-reloader
7575
platforms: linux/amd64,linux/arm64
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
116+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
133+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
134134
with:
135135
sarif_file: trivy-results.sarif

.tool-versions

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
golang 1.24.3
1+
golang 1.24.4

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ COPY --from=builder /usr/local/bin/manager /manager
4545
ENTRYPOINT ["/manager"]
4646

4747

48-
FROM gcr.io/distroless/static:latest@sha256:d9f9472a8f4541368192d714a995eb1a99bab1f7071fc8bde261d7eda3b667d8
48+
FROM gcr.io/distroless/static:latest@sha256:b7b9a6953e7bed6baaf37329331051d7bdc1b99c885f6dbeb72d75b1baad54f9
4949

5050
COPY --from=builder /usr/local/bin/manager /manager
5151

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ CONTROLLER_GEN_VERSION := 0.18.0
1111
GOLANGCI_LINT_VERSION := 2.1.6
1212

1313
# renovate: datasource=go depName=github.com/vladopajic/go-test-coverage/v2 versioning=semver
14-
GO_TEST_COVERAGE_VERSION := 2.14.3
14+
GO_TEST_COVERAGE_VERSION := 2.15.0
1515

1616
# renovate: datasource=github-releases depName=norwoodj/helm-docs versioning=semver
1717
HELM_DOCS_VERSION = 1.14.2

0 commit comments

Comments
 (0)