Skip to content

Commit fd0e735

Browse files
Bump the action-deps group across 1 directory with 9 updates (#836)
Bumps the action-deps group with 9 updates in the / directory: | Package | From | To | | --- | --- | --- | | [step-security/harden-runner](https://github.com/step-security/harden-runner) | `2.12.0` | `2.12.1` | | [github/codeql-action](https://github.com/github/codeql-action) | `3.28.19` | `3.29.0` | | [sigstore/cosign-installer](https://github.com/sigstore/cosign-installer) | `3.8.2` | `3.9.0` | | [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action) | `3.10.0` | `3.11.0` | | [anchore/sbom-action](https://github.com/anchore/sbom-action) | `0.20.0` | `0.20.1` | | [actions/attest-sbom](https://github.com/actions/attest-sbom) | `2.2.0` | `2.4.0` | | [actions/attest-build-provenance](https://github.com/actions/attest-build-provenance) | `2.3.0` | `2.4.0` | | [anchore/scan-action](https://github.com/anchore/scan-action) | `6.2.0` | `6.3.0` | | [dawidd6/action-download-artifact](https://github.com/dawidd6/action-download-artifact) | `10` | `11` | Updates `step-security/harden-runner` from 2.12.0 to 2.12.1 - [Release notes](https://github.com/step-security/harden-runner/releases) - [Commits](step-security/harden-runner@0634a26...002fdce) Updates `github/codeql-action` from 3.28.19 to 3.29.0 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@fca7ace...ce28f5b) Updates `sigstore/cosign-installer` from 3.8.2 to 3.9.0 - [Release notes](https://github.com/sigstore/cosign-installer/releases) - [Commits](sigstore/cosign-installer@3454372...fb28c2b) Updates `docker/setup-buildx-action` from 3.10.0 to 3.11.0 - [Release notes](https://github.com/docker/setup-buildx-action/releases) - [Commits](docker/setup-buildx-action@b5ca514...18ce135) Updates `anchore/sbom-action` from 0.20.0 to 0.20.1 - [Release notes](https://github.com/anchore/sbom-action/releases) - [Changelog](https://github.com/anchore/sbom-action/blob/main/RELEASE.md) - [Commits](anchore/sbom-action@e11c554...9246b90) Updates `actions/attest-sbom` from 2.2.0 to 2.4.0 - [Release notes](https://github.com/actions/attest-sbom/releases) - [Changelog](https://github.com/actions/attest-sbom/blob/main/RELEASE.md) - [Commits](actions/attest-sbom@115c3be...bd218ad) Updates `actions/attest-build-provenance` from 2.3.0 to 2.4.0 - [Release notes](https://github.com/actions/attest-build-provenance/releases) - [Changelog](https://github.com/actions/attest-build-provenance/blob/main/RELEASE.md) - [Commits](actions/attest-build-provenance@db473fd...e8998f9) Updates `anchore/scan-action` from 6.2.0 to 6.3.0 - [Release notes](https://github.com/anchore/scan-action/releases) - [Changelog](https://github.com/anchore/scan-action/blob/main/RELEASE.md) - [Commits](anchore/scan-action@2c901ab...be7a22d) Updates `dawidd6/action-download-artifact` from 10 to 11 - [Release notes](https://github.com/dawidd6/action-download-artifact/releases) - [Commits](dawidd6/action-download-artifact@4c1e823...ac66b43) --- updated-dependencies: - dependency-name: step-security/harden-runner dependency-version: 2.12.1 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: action-deps - dependency-name: github/codeql-action dependency-version: 3.29.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: action-deps - dependency-name: sigstore/cosign-installer dependency-version: 3.9.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: action-deps - dependency-name: docker/setup-buildx-action dependency-version: 3.11.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: action-deps - dependency-name: anchore/sbom-action dependency-version: 0.20.1 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: action-deps - dependency-name: actions/attest-sbom dependency-version: 2.4.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: action-deps - dependency-name: actions/attest-build-provenance dependency-version: 2.4.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: action-deps - dependency-name: anchore/scan-action dependency-version: 6.3.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: action-deps - dependency-name: dawidd6/action-download-artifact dependency-version: '11' dependency-type: direct:production update-type: version-update:semver-major dependency-group: action-deps ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Jürgen Kreileder <jk@blackdown.de>
1 parent 20ccde6 commit fd0e735

6 files changed

Lines changed: 29 additions & 29 deletions

File tree

.github/workflows/codeql.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ jobs:
3636

3737
steps:
3838
- name: Harden runner
39-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
39+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
4040
with:
4141
disable-sudo: true
4242
egress-policy: block
@@ -63,7 +63,7 @@ jobs:
6363
run: make venv
6464

6565
- name: Initialize CodeQL
66-
uses: github/codeql-action/init@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
66+
uses: github/codeql-action/init@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
6767
with:
6868
languages: ${{ matrix.language }}
6969
queries: security-and-quality
@@ -72,6 +72,6 @@ jobs:
7272
run: make build
7373

7474
- name: Perform CodeQL analysis
75-
uses: github/codeql-action/analyze@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
75+
uses: github/codeql-action/analyze@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
7676
with:
7777
category: "/language:${{ matrix.language }}"

.github/workflows/dependency-review.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ jobs:
1919

2020
steps:
2121
- name: Harden runner
22-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
22+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
2323
with:
2424
disable-sudo: true
2525
egress-policy: block

.github/workflows/docker.yaml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ jobs:
3030

3131
steps:
3232
- name: Harden runner
33-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
33+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
3434
with:
3535
disable-sudo: true
3636
egress-policy: block
@@ -69,7 +69,7 @@ jobs:
6969
persist-credentials: false
7070

7171
- name: Install Cosign
72-
uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
72+
uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.9.0
7373

7474
- name: Docker meta
7575
id: docker-meta
@@ -92,7 +92,7 @@ jobs:
9292
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
9393

9494
- name: Set up Docker Buildx
95-
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
95+
uses: docker/setup-buildx-action@18ce135bb5112fa8ce4ed6c17ab05699d7f3a5e0 # v3.11.0
9696

9797
- name: Login to DockerHub
9898
if: ${{ (github.event_name != 'pull_request' || !github.event.pull_request.head.repo.fork) && github.actor != 'dependabot[bot]' }}
@@ -134,7 +134,7 @@ jobs:
134134

135135
- name: Generate SBOM
136136
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' }}
137-
uses: anchore/sbom-action@e11c554f704a0b820cbf8c51673f6945e0731532 # v0.20.0
137+
uses: anchore/sbom-action@9246b90769f852b3a8921f330c59e0b3f439d6e9 # v0.20.1
138138
with:
139139
image: ${{ vars.DOCKERHUB_USERNAME }}/cf-ips-to-hcloud-fw
140140
format: spdx-json
@@ -143,7 +143,7 @@ jobs:
143143

144144
- name: Generate SBOM attestation for DockerHub
145145
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' }}
146-
uses: actions/attest-sbom@115c3be05ff3974bcbd596578934b3f9ce39bf68 # v2.2.0
146+
uses: actions/attest-sbom@bd218ad0dbcb3e146bd073d1d9c6d78e08aa8a0b # v2.4.0
147147
with:
148148
subject-name: index.docker.io/${{ vars.DOCKERHUB_USERNAME }}/cf-ips-to-hcloud-fw
149149
subject-digest: ${{ steps.build-and-push.outputs.digest }}
@@ -152,7 +152,7 @@ jobs:
152152

153153
- name: Generate SBOM attestation for Quay
154154
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' }}
155-
uses: actions/attest-sbom@115c3be05ff3974bcbd596578934b3f9ce39bf68 # v2.2.0
155+
uses: actions/attest-sbom@bd218ad0dbcb3e146bd073d1d9c6d78e08aa8a0b # v2.4.0
156156
with:
157157
subject-name: quay.io/${{ vars.QUAY_USERNAME }}/cf-ips-to-hcloud-fw
158158
subject-digest: ${{ steps.build-and-push.outputs.digest }}
@@ -161,7 +161,7 @@ jobs:
161161

162162
- name: Generate SBOM attestation for GitHub Container Registry
163163
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' }}
164-
uses: actions/attest-sbom@115c3be05ff3974bcbd596578934b3f9ce39bf68 # v2.2.0
164+
uses: actions/attest-sbom@bd218ad0dbcb3e146bd073d1d9c6d78e08aa8a0b # v2.4.0
165165
with:
166166
subject-name: ghcr.io/${{ github.repository_owner }}/cf-ips-to-hcloud-fw
167167
subject-digest: ${{ steps.build-and-push.outputs.digest }}
@@ -170,23 +170,23 @@ jobs:
170170

171171
- name: Generate artifact attestation for DockerHub
172172
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' }}
173-
uses: actions/attest-build-provenance@db473fddc028af60658334401dc6fa3ffd8669fd # v2.3.0
173+
uses: actions/attest-build-provenance@e8998f949152b193b063cb0ec769d69d929409be # v2.4.0
174174
with:
175175
subject-name: index.docker.io/${{ vars.DOCKERHUB_USERNAME }}/cf-ips-to-hcloud-fw
176176
subject-digest: ${{ steps.build-and-push.outputs.digest }}
177177
push-to-registry: true
178178

179179
- name: Generate artifact attestation for Quay
180180
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' }}
181-
uses: actions/attest-build-provenance@db473fddc028af60658334401dc6fa3ffd8669fd # v2.3.0
181+
uses: actions/attest-build-provenance@e8998f949152b193b063cb0ec769d69d929409be # v2.4.0
182182
with:
183183
subject-name: quay.io/${{ vars.QUAY_USERNAME }}/cf-ips-to-hcloud-fw
184184
subject-digest: ${{ steps.build-and-push.outputs.digest }}
185185
push-to-registry: true
186186

187187
- name: Generate artifact attestation for GitHub Container Registry
188188
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' }}
189-
uses: actions/attest-build-provenance@db473fddc028af60658334401dc6fa3ffd8669fd # v2.3.0
189+
uses: actions/attest-build-provenance@e8998f949152b193b063cb0ec769d69d929409be # v2.4.0
190190
with:
191191
subject-name: ghcr.io/${{ github.repository_owner }}/cf-ips-to-hcloud-fw
192192
subject-digest: ${{ steps.build-and-push.outputs.digest }}
@@ -219,12 +219,12 @@ jobs:
219219
- name: Upload Docker Scout scan result to GitHub Security tab
220220
if: ${{ (github.event_name != 'pull_request' || !github.event.pull_request.head.repo.fork) && github.actor != 'dependabot[bot]' }}
221221
continue-on-error: true
222-
uses: github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
222+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
223223
with:
224224
sarif_file: sarif.output.json
225225

226226
- name: Scan image with Grype
227-
uses: anchore/scan-action@2c901ab7378897c01b8efaa2d0c9bf519cc64b9e # v6.2.0
227+
uses: anchore/scan-action@be7a22da4f22dde446c4c4c099887ff5b256526c # v6.3.0
228228
id: grype-scan
229229
continue-on-error: true
230230
with:
@@ -233,7 +233,7 @@ jobs:
233233
add-cpes-if-none: true
234234

235235
- name: Upload Grype scan result to GitHub Security tab
236-
uses: github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
236+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
237237
continue-on-error: true
238238
with:
239239
sarif_file: ${{ steps.grype-scan.outputs.sarif }}

.github/workflows/publish-test-results.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,15 @@ jobs:
2323

2424
steps:
2525
- name: Harden runner
26-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
26+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
2727
with:
2828
disable-sudo: true
2929
egress-policy: block
3030
allowed-endpoints: >
3131
api.github.com:443
3232
3333
- name: Download artifacts
34-
uses: dawidd6/action-download-artifact@4c1e823582f43b179e2cbb49c3eade4e41f992e2 # v10
34+
uses: dawidd6/action-download-artifact@ac66b43f0e6a346234dd65d4d0c8fbb31cb316e5 # v11
3535
with:
3636
run_id: ${{ github.event.workflow_run.id }}
3737
name: test-results-.*|event-file

.github/workflows/python-package.yaml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ jobs:
1919
runs-on: ubuntu-latest
2020
steps:
2121
- name: Harden runner
22-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
22+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
2323
with:
2424
disable-sudo: true
2525
egress-policy: block
@@ -51,7 +51,7 @@ jobs:
5151

5252
steps:
5353
- name: Harden runner
54-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
54+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
5555
with:
5656
disable-sudo: true
5757
egress-policy: block
@@ -122,22 +122,22 @@ jobs:
122122

123123
- name: Generate SBOM
124124
if: ${{ matrix.python-version == '3.11' }}
125-
uses: anchore/sbom-action@e11c554f704a0b820cbf8c51673f6945e0731532 # v0.20.0
125+
uses: anchore/sbom-action@9246b90769f852b3a8921f330c59e0b3f439d6e9 # v0.20.1
126126
with:
127127
format: spdx-json
128128
artifact-name: sbom-python.spdx.json
129129
output-file: sbom-python.spdx.json
130130

131131
- name: Generate SBOM attestation
132132
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' && matrix.python-version == '3.11' }}
133-
uses: actions/attest-sbom@115c3be05ff3974bcbd596578934b3f9ce39bf68 # v2.2.0
133+
uses: actions/attest-sbom@bd218ad0dbcb3e146bd073d1d9c6d78e08aa8a0b # v2.4.0
134134
with:
135135
subject-path: dist/*.whl
136136
sbom-path: sbom-python.spdx.json
137137

138138
- name: Generate artifact attestation
139139
if: ${{ github.event_name != 'pull_request' && github.actor != 'dependabot[bot]' && matrix.python-version == '3.11' }}
140-
uses: actions/attest-build-provenance@db473fddc028af60658334401dc6fa3ffd8669fd # v2.3.0
140+
uses: actions/attest-build-provenance@e8998f949152b193b063cb0ec769d69d929409be # v2.4.0
141141
with:
142142
subject-path: dist/*.whl
143143

@@ -184,7 +184,7 @@ jobs:
184184

185185
steps:
186186
- name: Harden runner
187-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
187+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
188188
with:
189189
disable-sudo: true
190190
egress-policy: block
@@ -222,7 +222,7 @@ jobs:
222222

223223
steps:
224224
- name: Harden runner
225-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
225+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
226226
with:
227227
disable-sudo: true
228228
egress-policy: block
@@ -254,7 +254,7 @@ jobs:
254254

255255
steps:
256256
- name: Harden runner
257-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
257+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
258258
with:
259259
disable-sudo: true
260260
egress-policy: block

.github/workflows/scorecard.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ jobs:
2929

3030
steps:
3131
- name: Harden runner
32-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
32+
uses: step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
3333
with:
3434
disable-sudo: true
3535
egress-policy: block
@@ -65,6 +65,6 @@ jobs:
6565
retention-days: 5
6666

6767
- name: Upload to code-scanning
68-
uses: github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
68+
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
6969
with:
7070
sarif_file: results.sarif

0 commit comments

Comments
 (0)