Skip to content

Commit 9ef0252

Browse files
chore(deps): update github actions
Signed-off-by: oep-renovate[bot] <212772560+oep-renovate[bot]@users.noreply.github.com>
1 parent 80d4e9f commit 9ef0252

File tree

10 files changed

+32
-32
lines changed

10 files changed

+32
-32
lines changed

.github/workflows/codeql.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232

3333
steps:
3434
- name: Harden the runner (audit all outbound calls)
35-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
35+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
3636
with:
3737
egress-policy: audit
3838

@@ -43,13 +43,13 @@ jobs:
4343

4444
# Initializes the CodeQL tools for scanning.
4545
- name: Initialize CodeQL
46-
uses: github/codeql-action/init@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6
46+
uses: github/codeql-action/init@014f16e7ab1402f30e7c3329d33797e7948572db # v4.31.3
4747
with:
4848
languages: ${{ matrix.language }}
4949
build-mode: ${{ matrix.build-mode }}
5050
queries: security-extended
5151

5252
- name: Perform CodeQL Analysis
53-
uses: github/codeql-action/analyze@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6
53+
uses: github/codeql-action/analyze@014f16e7ab1402f30e7c3329d33797e7948572db # v4.31.3
5454
with:
5555
category: "/language:${{matrix.language}}"

.github/workflows/dependency-review.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ jobs:
99
runs-on: ubuntu-24.04
1010
steps:
1111
- name: Harden the runner (audit all outbound calls)
12-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
12+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
1313
with:
1414
egress-policy: audit
1515
- name: "Checkout Repository"
1616
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
1717
with:
1818
persist-credentials: false
1919
- name: "Dependency Review"
20-
uses: actions/dependency-review-action@56339e523c0409420f6c2c9a2f4292bbb3c07dd3 # v4.8.0
20+
uses: actions/dependency-review-action@3c4e3dcb1aa7874d2c16be7d79418e9b7efd6261 # v4.8.2

.github/workflows/docs_latest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ jobs:
1616
contents: write
1717
steps:
1818
- name: Harden the runner (audit all outbound calls)
19-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
19+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
2020
with:
2121
egress-policy: audit
2222
- name: Checkout repository

.github/workflows/docs_stable.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ jobs:
1414
contents: write
1515
steps:
1616
- name: Harden the runner (audit all outbound calls)
17-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
17+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
1818
with:
1919
egress-policy: audit
2020
- name: Checkout repository

.github/workflows/linter.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
runs-on: ubuntu-24.04
2121
steps:
2222
- name: Harden the runner (audit all outbound calls)
23-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
23+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
2424
with:
2525
egress-policy: audit
2626
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
@@ -48,15 +48,15 @@ jobs:
4848
contents: read
4949
steps:
5050
- name: Harden the runner (audit all outbound calls)
51-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
51+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
5252
with:
5353
egress-policy: audit
5454
- name: Checkout code
5555
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
5656
with:
5757
persist-credentials: false
5858
- name: Run Zizmor scan
59-
uses: open-edge-platform/geti-ci/actions/zizmor@db5335076dfe564b039b5a7480b8f6b6ae38370a
59+
uses: open-edge-platform/geti-ci/actions/zizmor@b7d997c1651b1e1b99a280033bd268b55ccb7923
6060
with:
6161
scan-scope: "changed"
6262
severity-level: "LOW"
@@ -68,15 +68,15 @@ jobs:
6868
contents: read
6969
steps:
7070
- name: Harden the runner (audit all outbound calls)
71-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
71+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
7272
with:
7373
egress-policy: audit
7474
- name: Checkout code
7575
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
7676
with:
7777
persist-credentials: false
7878
- name: Run Bandit scan
79-
uses: open-edge-platform/geti-ci/actions/bandit@db5335076dfe564b039b5a7480b8f6b6ae38370a
79+
uses: open-edge-platform/geti-ci/actions/bandit@b7d997c1651b1e1b99a280033bd268b55ccb7923
8080
with:
8181
scan-scope: "changed"
8282
severity-level: "LOW"

.github/workflows/pr_check.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ jobs:
3636
runs-on: ${{ matrix.os }}
3737
steps:
3838
- name: Harden the runner (audit all outbound calls)
39-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
39+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
4040
with:
4141
egress-policy: audit
4242

@@ -45,12 +45,12 @@ jobs:
4545
persist-credentials: false
4646

4747
- name: Installing Rust toolchain
48-
uses: dtolnay/rust-toolchain@6d653acede28d24f02e3cd41383119e8b1b35921
48+
uses: dtolnay/rust-toolchain@0f44b27771c32bda9f458f75a1e241b09791b331
4949
with:
5050
toolchain: stable
5151

5252
- name: Install uv and set the python version
53-
uses: astral-sh/setup-uv@d0cc045d04ccac9d8b7881df0226f9e82c39688e # v6.8.0
53+
uses: astral-sh/setup-uv@5a7eac68fb9809dea845d802897dc5c723910fa3 # v7.1.3
5454
with:
5555
enable-cache: false
5656
python-version: ${{ matrix.python-version }}

.github/workflows/publish_to_pypi.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ jobs:
1919
os: ["ubuntu-24.04", "windows-2022", "macos-13", "macos-15"]
2020
steps:
2121
- name: Harden the runner (audit all outbound calls)
22-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
22+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
2323
with:
2424
egress-policy: audit
2525
- name: Checkout
@@ -37,7 +37,7 @@ jobs:
3737
env:
3838
MACOSX_DEPLOYMENT_TARGET: 11.0
3939
run: python -m cibuildwheel --output-dir wheelhouse
40-
- uses: actions/upload-artifact@v4
40+
- uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5
4141
with:
4242
name: artifact-wheels_${{ matrix.os }}
4343
path: ./wheelhouse/*.whl
@@ -46,7 +46,7 @@ jobs:
4646
runs-on: ubuntu-latest
4747
steps:
4848
- name: Harden the runner (audit all outbound calls)
49-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
49+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
5050
with:
5151
egress-policy: audit
5252
- name: Checkout
@@ -61,7 +61,7 @@ jobs:
6161
run: python -m pip install build
6262
- name: Build sdist
6363
run: python -m build --sdist
64-
- uses: actions/upload-artifact@v4
64+
- uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5
6565
with:
6666
name: artifact-sdist_${{ matrix.os }}
6767
path: dist/*.tar.gz
@@ -75,11 +75,11 @@ jobs:
7575
id-token: write
7676
steps:
7777
- name: Harden the runner (audit all outbound calls)
78-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
78+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
7979
with:
8080
egress-policy: audit
8181
- name: Download artifacts
82-
uses: actions/download-artifact@v5
82+
uses: actions/download-artifact@018cc2cf5baa6db3ef3c5f8a56943fffe632ef53 # v6
8383
with:
8484
path: dist
8585
pattern: artifact-*
@@ -94,7 +94,7 @@ jobs:
9494
# Publish the built wheel and source tarball to github
9595
- name: Upload wheel and source files as github artifact
9696
if: ${{ steps.check-tag.outputs.match != '' }}
97-
uses: actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1 # v4.6.1
97+
uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5.0.0
9898
with:
9999
name: datumaro
100100
path: dist/*

.github/workflows/renovate.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ jobs:
7272
private-key: ${{ secrets.RENOVATE_APP_PEM }}
7373

7474
- name: Self-hosted Renovate
75-
uses: renovatebot/github-action@2d941ef4e268e53affdc1f11365c69a73e544f50 # v43.0.14
75+
uses: renovatebot/github-action@c5fdc9f98fdf9e9bb16b5760f7e560256eb79326 # v44.0.2
7676
with:
7777
configurationFile: .github/renovate.json5
7878
token: "${{ steps.get-github-app-token.outputs.token }}"

.github/workflows/scorecard.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ jobs:
2222

2323
steps:
2424
- name: Harden the runner (audit all outbound calls)
25-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
25+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
2626
with:
2727
egress-policy: audit
2828

@@ -40,6 +40,6 @@ jobs:
4040

4141
# Upload the results to GitHub's code scanning dashboard
4242
- name: Upload to code-scanning
43-
uses: github/codeql-action/upload-sarif@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6
43+
uses: github/codeql-action/upload-sarif@014f16e7ab1402f30e7c3329d33797e7948572db # v4.31.3
4444
with:
4545
sarif_file: results.sarif

.github/workflows/security-scan.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ jobs:
2020
security-events: write # Needed to upload the results to code-scanning dashboard
2121
steps:
2222
- name: Harden the runner (audit all outbound calls)
23-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
23+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
2424
with:
2525
egress-policy: audit
2626
- name: Checkout code
2727
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
2828
with:
2929
persist-credentials: false
3030
- name: Run Zizmor scan
31-
uses: open-edge-platform/geti-ci/actions/zizmor@db5335076dfe564b039b5a7480b8f6b6ae38370a
31+
uses: open-edge-platform/geti-ci/actions/zizmor@b7d997c1651b1e1b99a280033bd268b55ccb7923
3232
with:
3333
scan-scope: "all"
3434
severity-level: "LOW"
@@ -42,15 +42,15 @@ jobs:
4242
security-events: write # Needed to upload the results to code-scanning dashboard
4343
steps:
4444
- name: Harden the runner (audit all outbound calls)
45-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
45+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
4646
with:
4747
egress-policy: audit
4848
- name: Checkout code
4949
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
5050
with:
5151
persist-credentials: false
5252
- name: Run Bandit scan
53-
uses: open-edge-platform/geti-ci/actions/bandit@db5335076dfe564b039b5a7480b8f6b6ae38370a
53+
uses: open-edge-platform/geti-ci/actions/bandit@b7d997c1651b1e1b99a280033bd268b55ccb7923
5454
with:
5555
scan-scope: "all"
5656
severity-level: "LOW"
@@ -65,7 +65,7 @@ jobs:
6565
security-events: write # Needed to upload the results to code-scanning dashboard
6666
steps:
6767
- name: Harden the runner (audit all outbound calls)
68-
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
68+
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
6969
with:
7070
egress-policy: audit
7171
- name: Checkout code
@@ -75,7 +75,7 @@ jobs:
7575

7676
- name: Run Trivy scan
7777
id: trivy
78-
uses: open-edge-platform/geti-ci/actions/trivy@db5335076dfe564b039b5a7480b8f6b6ae38370a
78+
uses: open-edge-platform/geti-ci/actions/trivy@b7d997c1651b1e1b99a280033bd268b55ccb7923
7979
with:
8080
scan_type: "fs"
8181
scan-scope: all
@@ -97,7 +97,7 @@ jobs:
9797
persist-credentials: false
9898
- name: Run Semgrep scan
9999
id: semgrep
100-
uses: open-edge-platform/geti-ci/actions/semgrep@353d464dd966cc07ce9c5109e70c12c17fb60942
100+
uses: open-edge-platform/geti-ci/actions/semgrep@b7d997c1651b1e1b99a280033bd268b55ccb7923
101101
with:
102102
scan-scope: "all"
103103
severity: "LOW"

0 commit comments

Comments
 (0)