Skip to content

Commit 76c4f7b

Browse files
chore(deps): update all dependencies
1 parent 3c33a47 commit 76c4f7b

File tree

23 files changed

+297
-274
lines changed

23 files changed

+297
-274
lines changed

.github/workflows/artifacts.yaml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -74,10 +74,10 @@ jobs:
7474
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
7575

7676
- name: Set up Docker Buildx
77-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
77+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
7878

7979
- name: Set up Cosign
80-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
80+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
8181
if: ${{ inputs.publish }}
8282

8383
- name: Set image name
@@ -112,7 +112,7 @@ jobs:
112112

113113
- name: Build and push image
114114
id: build
115-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
115+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
116116
with:
117117
context: .
118118
platforms: linux/amd64,linux/arm64
@@ -196,7 +196,7 @@ jobs:
196196
tar -xf image.tar -C image
197197
198198
- name: Run Trivy vulnerability scanner
199-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
199+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
200200
env:
201201
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
202202
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -213,7 +213,7 @@ jobs:
213213
retention-days: 5
214214

215215
- name: Upload Trivy scan results to GitHub Security tab
216-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
216+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
217217
with:
218218
sarif_file: trivy-results.sarif
219219

@@ -242,7 +242,7 @@ jobs:
242242
version: v3.13.3
243243

244244
- name: Set up Cosign
245-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
245+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
246246
if: inputs.publish && inputs.release
247247

248248
- name: Set chart name
@@ -351,7 +351,7 @@ jobs:
351351
fi
352352
353353
- name: Run Trivy vulnerability scanner
354-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
354+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
355355
env:
356356
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
357357
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -369,7 +369,7 @@ jobs:
369369
retention-days: 5
370370

371371
- name: Upload Trivy scan results to GitHub Security tab
372-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
372+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
373373
with:
374374
sarif_file: trivy-results.sarif
375375

@@ -403,7 +403,7 @@ jobs:
403403
version: v3.13.3
404404

405405
- name: Set up Cosign
406-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
406+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
407407
if: inputs.publish && inputs.release
408408

409409
- name: Set chart name
@@ -475,7 +475,7 @@ jobs:
475475
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
476476
477477
- name: Run Trivy vulnerability scanner
478-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
478+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
479479
env:
480480
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
481481
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -493,6 +493,6 @@ jobs:
493493
retention-days: 5
494494

495495
- name: Upload Trivy scan results to GitHub Security tab
496-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
496+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
497497
with:
498498
sarif_file: trivy-results.sarif

.github/workflows/ci.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
run: make generate-test-coverage
3232

3333
- name: Test Coverage
34-
uses: vladopajic/go-test-coverage@7003e902e787e60375e1ce3ae5b85b19313dbff2 # v2.14.3
34+
uses: vladopajic/go-test-coverage@ebf1fb6f7267bd290a83cc16f535067b51fd1d0b # v2.15.0
3535
with:
3636
config: ./.testcoverage.yml
3737
source-dir: ./

.github/workflows/config-reloader.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ jobs:
3131
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3232

3333
- name: Set up Docker Buildx
34-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
34+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
37+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Build and push config-reloader image
7171
id: build
72-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
72+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7373
with:
7474
context: images/config-reloader
7575
platforms: linux/amd64,linux/arm64
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
116+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
133+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/e2e.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ jobs:
5151
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
5252

5353
- name: Set up Docker Buildx
54-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
54+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
5555

5656
- name: Build and export ${{ matrix.image }}-image
57-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
57+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
5858
with:
5959
context: ${{ matrix.context }}
6060
tags: ${{ matrix.tags }}
@@ -85,7 +85,7 @@ jobs:
8585
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
8686

8787
- name: Set up Docker Buildx
88-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
88+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
8989

9090
- name: Download artifact
9191
uses: actions/download-artifact@d3f86a106a0bac45b974a628896c90dbdf5c8093 # v4.3.0
@@ -121,7 +121,7 @@ jobs:
121121
# SHARDS: ${{ matrix.SHARDS }}
122122

123123
- name: Run coverage report
124-
uses: vladopajic/go-test-coverage@7003e902e787e60375e1ce3ae5b85b19313dbff2 # v2.14.3
124+
uses: vladopajic/go-test-coverage@ebf1fb6f7267bd290a83cc16f535067b51fd1d0b # v2.15.0
125125
with:
126126
profile: ./build/_test_coverage/coverage_e2e.out
127127
source-dir: ./
@@ -145,7 +145,7 @@ jobs:
145145

146146
steps:
147147
- name: Set up Docker Buildx
148-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
148+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
149149

150150
- name: Download artifact
151151
uses: actions/download-artifact@d3f86a106a0bac45b974a628896c90dbdf5c8093 # v4.3.0

.github/workflows/fluentd-drain-watch.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,10 @@ jobs:
3232
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3333

3434
- name: Set up Docker Buildx
35-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
35+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3636

3737
- name: Set up Cosign
38-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
38+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
3939
if: ${{ inputs.publish }}
4040

4141
- name: Set image name
@@ -70,7 +70,7 @@ jobs:
7070

7171
- name: Build and push fluentd-drain-watch image
7272
id: build
73-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
73+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7474
with:
7575
context: images/fluentd-drain-watch
7676
platforms: linux/amd64,linux/arm64
@@ -114,7 +114,7 @@ jobs:
114114
tar -xf image.tar -C image
115115
116116
- name: Run Trivy vulnerability scanner
117-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
117+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
118118
env:
119119
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
120120
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -131,6 +131,6 @@ jobs:
131131
retention-days: 5
132132

133133
- name: Upload Trivy scan results to GitHub Security tab
134-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
134+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
135135
with:
136136
sarif_file: trivy-results.sarif

.github/workflows/fluentd-images.yaml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ jobs:
8787
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
8888

8989
- name: Set up Docker Buildx
90-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
90+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
9191

9292
- name: Set image name
9393
id: image-name
@@ -118,7 +118,7 @@ jobs:
118118
119119
- name: Build and push fluentd-${{ matrix.image-type }}-${{ matrix.platform }} image
120120
id: build
121-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
121+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
122122
with:
123123
context: images/fluentd
124124
platforms: ${{ matrix.platform }}
@@ -134,7 +134,7 @@ jobs:
134134
tar -xf image.tar -C image
135135
136136
- name: Run Trivy vulnerability scanner
137-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
137+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
138138
env:
139139
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
140140
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -151,7 +151,7 @@ jobs:
151151
retention-days: 5
152152

153153
- name: Upload Trivy scan results to GitHub Security tab
154-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
154+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
155155
with:
156156
sarif_file: trivy-results.sarif
157157

@@ -199,10 +199,10 @@ jobs:
199199
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
200200

201201
- name: Set up Docker Buildx
202-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
202+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
203203

204204
- name: Set up Cosign
205-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
205+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
206206

207207
- name: Set image name
208208
id: image-name
@@ -228,7 +228,7 @@ jobs:
228228

229229
- name: Build and push fluentd-${{ matrix.image-type }}-${{ matrix.platform }} image
230230
id: build
231-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
231+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
232232
with:
233233
context: images/fluentd
234234
platforms: ${{ matrix.platform }}
@@ -299,10 +299,10 @@ jobs:
299299

300300
steps:
301301
- name: Set up Docker Buildx
302-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
302+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
303303

304304
- name: Set up Cosign
305-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
305+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
306306

307307
- name: Login to GitHub Container Registry
308308
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
@@ -377,7 +377,7 @@ jobs:
377377
tar -xf image.tar -C image
378378
379379
- name: Run Trivy vulnerability scanner
380-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
380+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
381381
env:
382382
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
383383
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -394,6 +394,6 @@ jobs:
394394
retention-days: 5
395395

396396
- name: Upload Trivy scan results to GitHub Security tab
397-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
397+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
398398
with:
399399
sarif_file: trivy-results.sarif

.github/workflows/node-exporter.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ jobs:
3131
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3232

3333
- name: Set up Docker Buildx
34-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
34+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
37+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Build and push Node exporter image
7171
id: build
72-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
72+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7373
with:
7474
context: images/node-exporter
7575
platforms: linux/amd64,linux/arm64
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
116+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
133+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/syslog-ng-reloader.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ jobs:
3131
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
3232

3333
- name: Set up Docker Buildx
34-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
34+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
37+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Build and push syslog-ng-reloader image
7171
id: build
72-
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
72+
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
7373
with:
7474
context: images/syslog-ng-reloader
7575
platforms: linux/amd64,linux/arm64
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # 0.30.0
116+
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # 0.31.0
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
133+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
134134
with:
135135
sarif_file: trivy-results.sarif

.tool-versions

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
golang 1.24.3
1+
golang 1.24.4

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ COPY --from=builder /usr/local/bin/manager /manager
4545
ENTRYPOINT ["/manager"]
4646

4747

48-
FROM gcr.io/distroless/static:latest@sha256:d9f9472a8f4541368192d714a995eb1a99bab1f7071fc8bde261d7eda3b667d8
48+
FROM gcr.io/distroless/static:latest@sha256:b7b9a6953e7bed6baaf37329331051d7bdc1b99c885f6dbeb72d75b1baad54f9
4949

5050
COPY --from=builder /usr/local/bin/manager /manager
5151

0 commit comments

Comments
 (0)