Skip to content

Commit 0ec506e

Browse files
ci(deps): bump the github-actions group across 1 directory with 8 updates (#43)
Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent bdd092c commit 0ec506e

File tree

13 files changed

+77
-77
lines changed

13 files changed

+77
-77
lines changed

.github/workflows/canary.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ jobs:
4545
server: ${{ steps.filter.outputs.server }}
4646
steps:
4747
- name: Harden the runner (Audit all outbound calls)
48-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
48+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
4949
with:
5050
egress-policy: audit
5151

@@ -80,7 +80,7 @@ jobs:
8080
short_sha: ${{ steps.version.outputs.short_sha }}
8181
steps:
8282
- name: Harden the runner (Audit all outbound calls)
83-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
83+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
8484
with:
8585
egress-policy: audit
8686

@@ -117,7 +117,7 @@ jobs:
117117
version: ${{ needs.version.outputs.version }}
118118
steps:
119119
- name: Harden the runner (Audit all outbound calls)
120-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
120+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
121121
with:
122122
egress-policy: audit
123123

@@ -182,7 +182,7 @@ jobs:
182182

183183
steps:
184184
- name: Harden the runner (Audit all outbound calls)
185-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
185+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
186186
with:
187187
egress-policy: audit
188188

@@ -278,7 +278,7 @@ jobs:
278278
packages: write
279279
steps:
280280
- name: Harden the runner (Audit all outbound calls)
281-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
281+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
282282
with:
283283
egress-policy: audit
284284

@@ -322,7 +322,7 @@ jobs:
322322
touch "/tmp/digests/${digest#sha256:}"
323323
324324
- name: Upload digest
325-
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
325+
uses: actions/upload-artifact@bbbca2ddaa5d8feaa63e36b76fdaad77386f024f # v7.0.0
326326
with:
327327
name: digests-canary-${{ matrix.suffix }}
328328
path: /tmp/digests/*
@@ -337,12 +337,12 @@ jobs:
337337
if: needs.changes.outputs.server == 'true'
338338
steps:
339339
- name: Harden the runner (Audit all outbound calls)
340-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
340+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
341341
with:
342342
egress-policy: audit
343343

344344
- name: Download digests
345-
uses: actions/download-artifact@37930b1c2abaa49bbe596cd826c3c89aef350131 # v7.0.0
345+
uses: actions/download-artifact@70fc10c6e5e1ce46ad2ea6f2b72d43f7d47b13c3 # v8.0.0
346346
with:
347347
path: /tmp/digests
348348
pattern: digests-canary-*
@@ -394,7 +394,7 @@ jobs:
394394
if: needs.changes.outputs.server == 'true'
395395
steps:
396396
- name: Harden the runner (Audit all outbound calls)
397-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
397+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
398398
with:
399399
egress-policy: audit
400400

@@ -409,7 +409,7 @@ jobs:
409409
password: ${{ secrets.GITHUB_TOKEN }}
410410

411411
- name: Generate SBOM
412-
uses: anchore/sbom-action@28d71544de8eaf1b958d335707167c5f783590ad # v0.22.2
412+
uses: anchore/sbom-action@17ae1740179002c89186b61233e0f892c3118b11 # v0.23.0
413413
with:
414414
image: ${{ env.GHCR_REGISTRY }}/${{ env.GHCR_IMAGE }}:canary
415415
artifact-name: docker-sbom.spdx.json
@@ -433,7 +433,7 @@ jobs:
433433
id-token: write
434434
steps:
435435
- name: Harden the runner (Audit all outbound calls)
436-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
436+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
437437
with:
438438
egress-policy: audit
439439

@@ -496,7 +496,7 @@ jobs:
496496
OWNER: ${{ github.repository_owner }}
497497
steps:
498498
- name: Harden the runner (Audit all outbound calls)
499-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
499+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
500500
with:
501501
egress-policy: audit
502502

.github/workflows/ci.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ jobs:
3535
if: github.event_name == 'pull_request'
3636
steps:
3737
- name: Harden the runner (Audit all outbound calls)
38-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
38+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
3939
with:
4040
egress-policy: audit
4141

@@ -76,7 +76,7 @@ jobs:
7676
runs-on: ubuntu-latest
7777
steps:
7878
- name: Harden the runner (Audit all outbound calls)
79-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
79+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
8080
with:
8181
egress-policy: audit
8282

@@ -99,7 +99,7 @@ jobs:
9999
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
100100
steps:
101101
- name: Harden the runner (Audit all outbound calls)
102-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
102+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
103103
with:
104104
egress-policy: audit
105105

@@ -136,7 +136,7 @@ jobs:
136136
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
137137
steps:
138138
- name: Harden the runner (Audit all outbound calls)
139-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
139+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
140140
with:
141141
egress-policy: audit
142142

@@ -156,7 +156,7 @@ jobs:
156156
sudo apt-get install -y -qq protobuf-compiler
157157
158158
- name: Install cargo-udeps
159-
uses: taiki-e/install-action@d4422f254e595ee762a758628fe4f16ce050fa2e # v2.67.28
159+
uses: taiki-e/install-action@a3324fb0eb94b8230ec968c3389c1b7929fc2f3b # v2.68.13
160160
with:
161161
tool: cargo-udeps
162162

@@ -176,7 +176,7 @@ jobs:
176176
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
177177
steps:
178178
- name: Harden the runner (Audit all outbound calls)
179-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
179+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
180180
with:
181181
egress-policy: audit
182182

@@ -222,7 +222,7 @@ jobs:
222222
name: macOS Apple Silicon
223223
steps:
224224
- name: Harden the runner (Audit all outbound calls)
225-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
225+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
226226
with:
227227
egress-policy: audit
228228

@@ -249,7 +249,7 @@ jobs:
249249
brew install protobuf
250250
251251
- name: Install cargo-nextest
252-
uses: taiki-e/install-action@d4422f254e595ee762a758628fe4f16ce050fa2e # v2.67.28
252+
uses: taiki-e/install-action@a3324fb0eb94b8230ec968c3389c1b7929fc2f3b # v2.68.13
253253
with:
254254
tool: cargo-nextest
255255

@@ -277,7 +277,7 @@ jobs:
277277
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
278278
steps:
279279
- name: Harden the runner (Audit all outbound calls)
280-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
280+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
281281
with:
282282
egress-policy: audit
283283

@@ -299,7 +299,7 @@ jobs:
299299
sudo apt-get install -y -qq protobuf-compiler
300300
301301
- name: Install cargo-llvm-cov
302-
uses: taiki-e/install-action@d4422f254e595ee762a758628fe4f16ce050fa2e # v2.67.28
302+
uses: taiki-e/install-action@a3324fb0eb94b8230ec968c3389c1b7929fc2f3b # v2.68.13
303303
with:
304304
tool: cargo-llvm-cov
305305

@@ -330,7 +330,7 @@ jobs:
330330
RUSTFLAGS: "-C codegen-units=16 -C link-arg=-fuse-ld=mold"
331331
steps:
332332
- name: Harden the runner (Audit all outbound calls)
333-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
333+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
334334
with:
335335
egress-policy: audit
336336

@@ -367,7 +367,7 @@ jobs:
367367
if: always()
368368
steps:
369369
- name: Harden the runner (Audit all outbound calls)
370-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
370+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
371371
with:
372372
egress-policy: audit
373373

.github/workflows/cleanup.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ jobs:
1717
runs-on: ubuntu-latest
1818
steps:
1919
- name: Harden the runner (Audit all outbound calls)
20-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
20+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
2121
with:
2222
egress-policy: audit
2323

.github/workflows/codeql.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ jobs:
3030
actions: ${{ steps.filter.outputs.actions }}
3131
steps:
3232
- name: Harden the runner (Audit all outbound calls)
33-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
33+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
3434
with:
3535
egress-policy: audit
3636

@@ -60,20 +60,20 @@ jobs:
6060

6161
steps:
6262
- name: Harden the runner (Audit all outbound calls)
63-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
63+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
6464
with:
6565
egress-policy: audit
6666

6767
- name: Checkout code
6868
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
6969

7070
- name: Initialize CodeQL
71-
uses: github/codeql-action/init@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
71+
uses: github/codeql-action/init@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
7272
with:
7373
languages: rust
7474

7575
- name: Perform CodeQL Analysis
76-
uses: github/codeql-action/analyze@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
76+
uses: github/codeql-action/analyze@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
7777
with:
7878
category: "/language:rust"
7979

@@ -88,19 +88,19 @@ jobs:
8888

8989
steps:
9090
- name: Harden the runner (Audit all outbound calls)
91-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
91+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
9292
with:
9393
egress-policy: audit
9494

9595
- name: Checkout code
9696
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
9797

9898
- name: Initialize CodeQL
99-
uses: github/codeql-action/init@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
99+
uses: github/codeql-action/init@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
100100
with:
101101
languages: actions
102102

103103
- name: Perform CodeQL Analysis
104-
uses: github/codeql-action/analyze@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
104+
uses: github/codeql-action/analyze@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
105105
with:
106106
category: "/language:actions"

.github/workflows/container.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ jobs:
5353
version: ${{ steps.meta.outputs.version }}
5454
steps:
5555
- name: Harden the runner (Audit all outbound calls)
56-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
56+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
5757
with:
5858
egress-policy: audit
5959

@@ -110,7 +110,7 @@ jobs:
110110
111111
- name: Upload digest
112112
if: github.event_name != 'pull_request'
113-
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
113+
uses: actions/upload-artifact@bbbca2ddaa5d8feaa63e36b76fdaad77386f024f # v7.0.0
114114
with:
115115
name: digests-${{ matrix.suffix }}
116116
path: /tmp/digests/*
@@ -125,12 +125,12 @@ jobs:
125125
if: github.event_name != 'pull_request'
126126
steps:
127127
- name: Harden the runner (Audit all outbound calls)
128-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
128+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
129129
with:
130130
egress-policy: audit
131131

132132
- name: Download digests
133-
uses: actions/download-artifact@37930b1c2abaa49bbe596cd826c3c89aef350131 # v7.0.0
133+
uses: actions/download-artifact@70fc10c6e5e1ce46ad2ea6f2b72d43f7d47b13c3 # v8.0.0
134134
with:
135135
path: /tmp/digests
136136
pattern: digests-*
@@ -183,7 +183,7 @@ jobs:
183183
if: github.event_name != 'pull_request'
184184
steps:
185185
- name: Harden the runner (Audit all outbound calls)
186-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
186+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
187187
with:
188188
egress-policy: audit
189189

@@ -203,14 +203,14 @@ jobs:
203203
type=sha,prefix=sha-
204204
205205
- name: Generate SBOM
206-
uses: anchore/sbom-action@28d71544de8eaf1b958d335707167c5f783590ad # v0.22.2
206+
uses: anchore/sbom-action@17ae1740179002c89186b61233e0f892c3118b11 # v0.23.0
207207
with:
208208
image: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ steps.meta.outputs.version }}
209209
artifact-name: sbom.spdx.json
210210
output-file: sbom.spdx.json
211211

212212
- name: Upload SBOM
213-
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
213+
uses: actions/upload-artifact@bbbca2ddaa5d8feaa63e36b76fdaad77386f024f # v7.0.0
214214
with:
215215
name: sbom
216216
path: sbom.spdx.json
@@ -228,7 +228,7 @@ jobs:
228228
security-events: write
229229
steps:
230230
- name: Harden the runner (Audit all outbound calls)
231-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
231+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
232232
with:
233233
egress-policy: audit
234234

@@ -248,14 +248,14 @@ jobs:
248248
type=sha,prefix=sha-
249249
250250
- name: Run Trivy vulnerability scanner
251-
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
251+
uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # 0.34.1
252252
with:
253253
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ steps.meta.outputs.version }}
254254
format: "sarif"
255255
output: "trivy-results.sarif"
256256
severity: "CRITICAL,HIGH"
257257

258258
- name: Upload Trivy scan results
259-
uses: github/codeql-action/upload-sarif@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
259+
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
260260
with:
261261
sarif_file: "trivy-results.sarif"

.github/workflows/fuzz.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ jobs:
3838

3939
steps:
4040
- name: Harden the runner (Audit all outbound calls)
41-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
41+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
4242
with:
4343
egress-policy: audit
4444

@@ -81,7 +81,7 @@ jobs:
8181
run: cargo +nightly fuzz run "${{ matrix.fuzz_target }}" -- -max_total_time="$FUZZ_TIME"
8282

8383
- name: Upload artifacts on failure
84-
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
84+
uses: actions/upload-artifact@bbbca2ddaa5d8feaa63e36b76fdaad77386f024f # v7.0.0
8585
if: failure()
8686
with:
8787
name: fuzz-artifacts-${{ matrix.fuzz_target }}-${{ github.sha }}

.github/workflows/labeler.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
runs-on: ubuntu-latest
2121
steps:
2222
- name: Harden the runner (Audit all outbound calls)
23-
uses: step-security/harden-runner@5ef0c079ce82195b2a36a210272d6b661572d83e # v2.14.2
23+
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
2424
with:
2525
egress-policy: audit
2626

0 commit comments

Comments
 (0)