Skip to content

Commit 37e2c88

Browse files
ci(deps): bump the github-actions group across 1 directory with 9 updates
Bumps the github-actions group with 9 updates in the /.github/workflows directory: | Package | From | To | | --- | --- | --- | | [step-security/harden-runner](https://github.com/step-security/harden-runner) | `2.14.1` | `2.15.0` | | [step-security/setup-buildx-action](https://github.com/step-security/setup-buildx-action) | `3.11.1` | `3.12.0` | | [actions/upload-artifact](https://github.com/actions/upload-artifact) | `6.0.0` | `7.0.0` | | [actions/download-artifact](https://github.com/actions/download-artifact) | `7.0.0` | `8.0.0` | | [anchore/sbom-action](https://github.com/anchore/sbom-action) | `0.22.1` | `0.23.0` | | [taiki-e/install-action](https://github.com/taiki-e/install-action) | `2.67.18` | `2.68.16` | | [github/codeql-action](https://github.com/github/codeql-action) | `4.32.1` | `4.32.4` | | [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) | `0.33.1` | `0.34.1` | | [actions/dependency-review-action](https://github.com/actions/dependency-review-action) | `4.8.2` | `4.8.3` | Updates `step-security/harden-runner` from 2.14.1 to 2.15.0 - [Release notes](https://github.com/step-security/harden-runner/releases) - [Commits](step-security/harden-runner@e3f713f...a90bcbc) Updates `step-security/setup-buildx-action` from 3.11.1 to 3.12.0 - [Release notes](https://github.com/step-security/setup-buildx-action/releases) - [Commits](step-security/setup-buildx-action@8c8aef2...c60a792) Updates `actions/upload-artifact` from 6.0.0 to 7.0.0 - [Release notes](https://github.com/actions/upload-artifact/releases) - [Commits](actions/upload-artifact@b7c566a...bbbca2d) Updates `actions/download-artifact` from 7.0.0 to 8.0.0 - [Release notes](https://github.com/actions/download-artifact/releases) - [Commits](actions/download-artifact@37930b1...70fc10c) Updates `anchore/sbom-action` from 0.22.1 to 0.23.0 - [Release notes](https://github.com/anchore/sbom-action/releases) - [Changelog](https://github.com/anchore/sbom-action/blob/main/RELEASE.md) - [Commits](anchore/sbom-action@deef08a...17ae174) Updates `taiki-e/install-action` from 2.67.18 to 2.68.16 - [Release notes](https://github.com/taiki-e/install-action/releases) - [Changelog](https://github.com/taiki-e/install-action/blob/main/CHANGELOG.md) - [Commits](taiki-e/install-action@650c5ca...d6e286f) Updates `github/codeql-action` from 4.32.1 to 4.32.4 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@6bc82e0...89a39a4) Updates `aquasecurity/trivy-action` from 0.33.1 to 0.34.1 - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@b6643a2...e368e32) Updates `actions/dependency-review-action` from 4.8.2 to 4.8.3 - [Release notes](https://github.com/actions/dependency-review-action/releases) - [Commits](actions/dependency-review-action@3c4e3dc...05fe457) --- updated-dependencies: - dependency-name: step-security/harden-runner dependency-version: 2.15.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions - dependency-name: step-security/setup-buildx-action dependency-version: 3.12.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions - dependency-name: actions/upload-artifact dependency-version: 7.0.0 dependency-type: direct:production update-type: version-update:semver-major dependency-group: github-actions - dependency-name: actions/download-artifact dependency-version: 8.0.0 dependency-type: direct:production update-type: version-update:semver-major dependency-group: github-actions - dependency-name: anchore/sbom-action dependency-version: 0.23.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions - dependency-name: taiki-e/install-action dependency-version: 2.68.16 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions - dependency-name: github/codeql-action dependency-version: 4.32.4 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions - dependency-name: aquasecurity/trivy-action dependency-version: 0.34.1 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions - dependency-name: actions/dependency-review-action dependency-version: 4.8.3 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions ... Signed-off-by: dependabot[bot] <support@github.com>
1 parent 1ceb25a commit 37e2c88

File tree

10 files changed

+75
-75
lines changed

10 files changed

+75
-75
lines changed

.github/workflows/canary.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ jobs:
4141
short_sha: ${{ steps.version.outputs.short_sha }}
4242
steps:
4343
- name: Harden the runner (Audit all outbound calls)
44-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
44+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
4545
with:
4646
egress-policy: audit
4747

@@ -81,7 +81,7 @@ jobs:
8181
version: ${{ needs.version.outputs.version }}
8282
steps:
8383
- name: Harden the runner (Audit all outbound calls)
84-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
84+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
8585
with:
8686
egress-policy: audit
8787

@@ -145,7 +145,7 @@ jobs:
145145

146146
steps:
147147
- name: Harden the runner (Audit all outbound calls)
148-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
148+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
149149
with:
150150
egress-policy: audit
151151

@@ -240,15 +240,15 @@ jobs:
240240
packages: write
241241
steps:
242242
- name: Harden the runner (Audit all outbound calls)
243-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
243+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
244244
with:
245245
egress-policy: audit
246246

247247
- name: Checkout code
248248
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
249249

250250
- name: Set up Docker Buildx
251-
uses: step-security/setup-buildx-action@8c8aef2d414c0b66518fee2b7084e0986f82d7ac # v3.11.1
251+
uses: step-security/setup-buildx-action@c60a792b446ef83310733d5cd9d0c8d6870d043f # v3.12.0
252252

253253
- name: Log in to GitHub Container Registry
254254
uses: step-security/docker-login-action@c3e677aae8393bc9c81cfdf9709648720ea4bd4d # v3.6.0
@@ -285,7 +285,7 @@ jobs:
285285
touch "/tmp/digests/${DIGEST#sha256:}"
286286
287287
- name: Upload digest
288-
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
288+
uses: actions/upload-artifact@bbbca2ddaa5d8feaa63e36b76fdaad77386f024f # v7.0.0
289289
with:
290290
name: digests-canary-${{ matrix.suffix }}
291291
path: /tmp/digests/*
@@ -299,19 +299,19 @@ jobs:
299299
needs: [version, build-docker]
300300
steps:
301301
- name: Harden the runner (Audit all outbound calls)
302-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
302+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
303303
with:
304304
egress-policy: audit
305305

306306
- name: Download digests
307-
uses: actions/download-artifact@37930b1c2abaa49bbe596cd826c3c89aef350131 # v7.0.0
307+
uses: actions/download-artifact@70fc10c6e5e1ce46ad2ea6f2b72d43f7d47b13c3 # v8.0.0
308308
with:
309309
path: /tmp/digests
310310
pattern: digests-canary-*
311311
merge-multiple: true
312312

313313
- name: Set up Docker Buildx
314-
uses: step-security/setup-buildx-action@8c8aef2d414c0b66518fee2b7084e0986f82d7ac # v3.11.1
314+
uses: step-security/setup-buildx-action@c60a792b446ef83310733d5cd9d0c8d6870d043f # v3.12.0
315315

316316
- name: Log in to GitHub Container Registry
317317
uses: step-security/docker-login-action@c3e677aae8393bc9c81cfdf9709648720ea4bd4d # v3.6.0
@@ -382,7 +382,7 @@ jobs:
382382
needs: [version, merge-docker]
383383
steps:
384384
- name: Harden the runner (Audit all outbound calls)
385-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
385+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
386386
with:
387387
egress-policy: audit
388388

@@ -397,7 +397,7 @@ jobs:
397397
password: ${{ secrets.GITHUB_TOKEN }}
398398

399399
- name: Generate SBOM
400-
uses: anchore/sbom-action@deef08a0db64bfad603422135db61477b16cef56 # v0.22.1
400+
uses: anchore/sbom-action@17ae1740179002c89186b61233e0f892c3118b11 # v0.23.0
401401
env:
402402
GHCR_REGISTRY: ghcr.io
403403
GHCR_IMAGE: ${{ github.repository }}

.github/workflows/ci.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
if: github.event_name == 'pull_request'
3535
steps:
3636
- name: Harden the runner (Audit all outbound calls)
37-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
37+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
3838
with:
3939
egress-policy: audit
4040

@@ -78,7 +78,7 @@ jobs:
7878
contents: read
7979
steps:
8080
- name: Harden the runner (Audit all outbound calls)
81-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
81+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
8282
with:
8383
egress-policy: audit
8484

@@ -106,7 +106,7 @@ jobs:
106106
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
107107
steps:
108108
- name: Harden the runner (Audit all outbound calls)
109-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
109+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
110110
with:
111111
egress-policy: audit
112112

@@ -157,7 +157,7 @@ jobs:
157157
name: macOS Apple Silicon
158158
steps:
159159
- name: Harden the runner (Audit all outbound calls)
160-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
160+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
161161
with:
162162
egress-policy: audit
163163

@@ -186,7 +186,7 @@ jobs:
186186
brew install protobuf
187187
188188
- name: Install cargo-nextest
189-
uses: taiki-e/install-action@650c5ca14212efbbf3e580844b04bdccf68dac31 # v2.67.18
189+
uses: taiki-e/install-action@d6e286fa45544157a02d45a43742857ebbc25d12 # v2.68.16
190190
with:
191191
tool: cargo-nextest
192192

@@ -218,7 +218,7 @@ jobs:
218218
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
219219
steps:
220220
- name: Harden the runner (Audit all outbound calls)
221-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
221+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
222222
with:
223223
egress-policy: audit
224224

@@ -300,7 +300,7 @@ jobs:
300300
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
301301
steps:
302302
- name: Harden the runner (Audit all outbound calls)
303-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
303+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
304304
with:
305305
egress-policy: audit
306306

@@ -349,7 +349,7 @@ jobs:
349349
contents: read
350350
steps:
351351
- name: Harden the runner (Audit all outbound calls)
352-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
352+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
353353
with:
354354
egress-policy: audit
355355

@@ -367,12 +367,12 @@ jobs:
367367
toolchain: nightly
368368

369369
- name: Install cargo-outdated
370-
uses: taiki-e/install-action@650c5ca14212efbbf3e580844b04bdccf68dac31 # v2.67.18
370+
uses: taiki-e/install-action@d6e286fa45544157a02d45a43742857ebbc25d12 # v2.68.16
371371
with:
372372
tool: cargo-outdated
373373

374374
- name: Install cargo-udeps
375-
uses: taiki-e/install-action@650c5ca14212efbbf3e580844b04bdccf68dac31 # v2.67.18
375+
uses: taiki-e/install-action@d6e286fa45544157a02d45a43742857ebbc25d12 # v2.68.16
376376
with:
377377
tool: cargo-udeps
378378

@@ -398,7 +398,7 @@ jobs:
398398
if: always()
399399
steps:
400400
- name: Harden the runner (Audit all outbound calls)
401-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
401+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
402402
with:
403403
egress-policy: audit
404404

.github/workflows/cleanup.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ jobs:
2222
runs-on: ubuntu-latest
2323
steps:
2424
- name: Harden the runner (Audit all outbound calls)
25-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
25+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
2626
with:
2727
egress-policy: audit
2828

.github/workflows/codeql.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ jobs:
3030
actions: ${{ steps.filter.outputs.actions }}
3131
steps:
3232
- name: Harden the runner (Audit all outbound calls)
33-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
33+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
3434
with:
3535
egress-policy: audit
3636

@@ -60,20 +60,20 @@ jobs:
6060

6161
steps:
6262
- name: Harden the runner (Audit all outbound calls)
63-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
63+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
6464
with:
6565
egress-policy: audit
6666

6767
- name: Checkout code
6868
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
6969

7070
- name: Initialize CodeQL
71-
uses: github/codeql-action/init@6bc82e05fd0ea64601dd4b465378bbcf57de0314 # v4.32.1
71+
uses: github/codeql-action/init@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
7272
with:
7373
languages: rust
7474

7575
- name: Perform CodeQL Analysis
76-
uses: github/codeql-action/analyze@6bc82e05fd0ea64601dd4b465378bbcf57de0314 # v4.32.1
76+
uses: github/codeql-action/analyze@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
7777
with:
7878
category: "/language:rust"
7979

@@ -88,19 +88,19 @@ jobs:
8888

8989
steps:
9090
- name: Harden the runner (Audit all outbound calls)
91-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
91+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
9292
with:
9393
egress-policy: audit
9494

9595
- name: Checkout code
9696
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
9797

9898
- name: Initialize CodeQL
99-
uses: github/codeql-action/init@6bc82e05fd0ea64601dd4b465378bbcf57de0314 # v4.32.1
99+
uses: github/codeql-action/init@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
100100
with:
101101
languages: actions
102102

103103
- name: Perform CodeQL Analysis
104-
uses: github/codeql-action/analyze@6bc82e05fd0ea64601dd4b465378bbcf57de0314 # v4.32.1
104+
uses: github/codeql-action/analyze@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
105105
with:
106106
category: "/language:actions"

.github/workflows/container.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -52,15 +52,15 @@ jobs:
5252
version: ${{ steps.meta.outputs.version }}
5353
steps:
5454
- name: Harden the runner (Audit all outbound calls)
55-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
55+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
5656
with:
5757
egress-policy: audit
5858

5959
- name: Checkout code
6060
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
6161

6262
- name: Set up Docker Buildx
63-
uses: step-security/setup-buildx-action@8c8aef2d414c0b66518fee2b7084e0986f82d7ac # v3.11.1
63+
uses: step-security/setup-buildx-action@c60a792b446ef83310733d5cd9d0c8d6870d043f # v3.12.0
6464

6565
- name: Log in to GitHub Container Registry
6666
if: github.event_name != 'pull_request'
@@ -109,7 +109,7 @@ jobs:
109109
110110
- name: Upload digest
111111
if: github.event_name != 'pull_request'
112-
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
112+
uses: actions/upload-artifact@bbbca2ddaa5d8feaa63e36b76fdaad77386f024f # v7.0.0
113113
with:
114114
name: digests-${{ matrix.suffix }}
115115
path: /tmp/digests/*
@@ -124,19 +124,19 @@ jobs:
124124
if: github.event_name != 'pull_request'
125125
steps:
126126
- name: Harden the runner (Audit all outbound calls)
127-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
127+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
128128
with:
129129
egress-policy: audit
130130

131131
- name: Download digests
132-
uses: actions/download-artifact@37930b1c2abaa49bbe596cd826c3c89aef350131 # v7.0.0
132+
uses: actions/download-artifact@70fc10c6e5e1ce46ad2ea6f2b72d43f7d47b13c3 # v8.0.0
133133
with:
134134
path: /tmp/digests
135135
pattern: digests-*
136136
merge-multiple: true
137137

138138
- name: Set up Docker Buildx
139-
uses: step-security/setup-buildx-action@8c8aef2d414c0b66518fee2b7084e0986f82d7ac # v3.11.1
139+
uses: step-security/setup-buildx-action@c60a792b446ef83310733d5cd9d0c8d6870d043f # v3.12.0
140140

141141
- name: Log in to GitHub Container Registry
142142
uses: step-security/docker-login-action@c3e677aae8393bc9c81cfdf9709648720ea4bd4d # v3.6.0
@@ -182,7 +182,7 @@ jobs:
182182
if: github.event_name != 'pull_request'
183183
steps:
184184
- name: Harden the runner (Audit all outbound calls)
185-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
185+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
186186
with:
187187
egress-policy: audit
188188

@@ -202,14 +202,14 @@ jobs:
202202
type=sha,prefix=sha-
203203
204204
- name: Generate SBOM
205-
uses: anchore/sbom-action@deef08a0db64bfad603422135db61477b16cef56 # v0.22.1
205+
uses: anchore/sbom-action@17ae1740179002c89186b61233e0f892c3118b11 # v0.23.0
206206
with:
207207
image: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ steps.meta.outputs.version }}
208208
artifact-name: sbom.spdx.json
209209
output-file: sbom.spdx.json
210210

211211
- name: Upload SBOM
212-
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
212+
uses: actions/upload-artifact@bbbca2ddaa5d8feaa63e36b76fdaad77386f024f # v7.0.0
213213
with:
214214
name: sbom
215215
path: sbom.spdx.json
@@ -226,7 +226,7 @@ jobs:
226226
security-events: write
227227
steps:
228228
- name: Harden the runner (Audit all outbound calls)
229-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
229+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
230230
with:
231231
egress-policy: audit
232232

@@ -246,14 +246,14 @@ jobs:
246246
type=sha,prefix=sha-
247247
248248
- name: Run Trivy vulnerability scanner
249-
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
249+
uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # 0.34.1
250250
with:
251251
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ steps.meta.outputs.version }}
252252
format: "sarif"
253253
output: "trivy-results.sarif"
254254
severity: "CRITICAL,HIGH"
255255

256256
- name: Upload Trivy scan results
257-
uses: github/codeql-action/upload-sarif@6bc82e05fd0ea64601dd4b465378bbcf57de0314 # v4.32.1
257+
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
258258
with:
259259
sarif_file: "trivy-results.sarif"

.github/workflows/labeler.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
runs-on: ubuntu-latest
2121
steps:
2222
- name: Harden the runner (Audit all outbound calls)
23-
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
23+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
2424
with:
2525
egress-policy: audit
2626

0 commit comments

Comments
 (0)