Skip to content

Commit a802cc5

Browse files
build(deps): bump the actions-all group across 1 directory with 6 updates
Bumps the actions-all group with 6 updates in the / directory: | Package | From | To | | --- | --- | --- | | [step-security/harden-runner](https://github.com/step-security/harden-runner) | `2.13.3` | `2.14.0` | | [actions/upload-artifact](https://github.com/actions/upload-artifact) | `5.0.0` | `6.0.0` | | [github/codeql-action](https://github.com/github/codeql-action) | `4.31.7` | `4.31.9` | | [actions/cache](https://github.com/actions/cache) | `4.3.0` | `5.0.1` | | [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action) | `3.11.1` | `3.12.0` | | [actions/attest-build-provenance](https://github.com/actions/attest-build-provenance) | `3.0.0` | `3.1.0` | Updates `step-security/harden-runner` from 2.13.3 to 2.14.0 - [Release notes](https://github.com/step-security/harden-runner/releases) - [Commits](step-security/harden-runner@df199fb...20cf305) Updates `actions/upload-artifact` from 5.0.0 to 6.0.0 - [Release notes](https://github.com/actions/upload-artifact/releases) - [Commits](actions/upload-artifact@330a01c...b7c566a) Updates `github/codeql-action` from 4.31.7 to 4.31.9 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@cf1bb45...5d4e8d1) Updates `actions/cache` from 4.3.0 to 5.0.1 - [Release notes](https://github.com/actions/cache/releases) - [Changelog](https://github.com/actions/cache/blob/main/RELEASES.md) - [Commits](actions/cache@0057852...9255dc7) Updates `docker/setup-buildx-action` from 3.11.1 to 3.12.0 - [Release notes](https://github.com/docker/setup-buildx-action/releases) - [Commits](docker/setup-buildx-action@e468171...8d2750c) Updates `actions/attest-build-provenance` from 3.0.0 to 3.1.0 - [Release notes](https://github.com/actions/attest-build-provenance/releases) - [Changelog](https://github.com/actions/attest-build-provenance/blob/main/RELEASE.md) - [Commits](actions/attest-build-provenance@977bb37...00014ed) --- updated-dependencies: - dependency-name: step-security/harden-runner dependency-version: 2.14.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: actions-all - dependency-name: actions/upload-artifact dependency-version: 6.0.0 dependency-type: direct:production update-type: version-update:semver-major dependency-group: actions-all - dependency-name: github/codeql-action dependency-version: 4.31.9 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: actions-all - dependency-name: actions/cache dependency-version: 5.0.1 dependency-type: direct:production update-type: version-update:semver-major dependency-group: actions-all - dependency-name: docker/setup-buildx-action dependency-version: 3.12.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: actions-all - dependency-name: actions/attest-build-provenance dependency-version: 3.1.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: actions-all ... Signed-off-by: dependabot[bot] <support@github.com>
1 parent 2cb25ae commit a802cc5

File tree

9 files changed

+26
-26
lines changed

9 files changed

+26
-26
lines changed

.github/workflows/ci.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ jobs:
5353
runs-on: ubuntu-22.04
5454
steps:
5555
- name: Harden Runner
56-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
56+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
5757
with:
5858
egress-policy: audit
5959

@@ -110,7 +110,7 @@ jobs:
110110
# Right now this is handled by the e2e suite, but we can migrate that here.
111111
steps:
112112
- name: Harden Runner
113-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
113+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
114114
with:
115115
egress-policy: audit
116116

@@ -264,14 +264,14 @@ jobs:
264264
curl -sSLf localhost:16686/api/traces?service=docker > /tmp/reports/jaeger-docker.json
265265
- name: Upload reports
266266
if: always()
267-
uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5.0.0
267+
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
268268
with:
269269
name: integration-test-reports-${{matrix.suite}}
270270
path: /tmp/reports/*
271271
retention-days: 1
272272
- name: Upload reports
273273
if: always()
274-
uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5.0.0
274+
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
275275
with:
276276
name: integration-test-logs-${{matrix.suite}}
277277
path: /tmp/testlogs/*
@@ -288,7 +288,7 @@ jobs:
288288
sudo journalctl -u docker > "${f}"
289289
- name: Upload buildkit logs
290290
if: failure()
291-
uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5.0.0
291+
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
292292
with:
293293
name: e2e-dockerd-logs-${{ matrix.suite }}
294294
path: ${{ steps.dump-logs.outputs.DOCKERD_LOG_PATH }}
@@ -298,7 +298,7 @@ jobs:
298298
runs-on: ubuntu-22.04
299299
steps:
300300
- name: Harden Runner
301-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
301+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
302302
with:
303303
egress-policy: audit
304304

@@ -325,7 +325,7 @@ jobs:
325325
FRONTEND_REF: localhost:5000/dalec/frontend
326326
steps:
327327
- name: Harden Runner
328-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
328+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
329329
with:
330330
egress-policy: audit
331331

@@ -390,7 +390,7 @@ jobs:
390390
fi
391391
- name: Upload buildkit logs
392392
if: failure()
393-
uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5.0.0
393+
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
394394
with:
395395
name: e2e-dockerd-logs-diffmerge=${{ matrix.disable_diff_merge }}
396396
path: ${{ steps.dump-logs.outputs.DOCKERD_LOG_PATH }}

.github/workflows/codeql.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ jobs:
4545

4646
steps:
4747
- name: Harden Runner
48-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
48+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
4949
with:
5050
egress-policy: audit
5151

@@ -54,7 +54,7 @@ jobs:
5454

5555
# Initializes the CodeQL tools for scanning.
5656
- name: Initialize CodeQL
57-
uses: github/codeql-action/init@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7
57+
uses: github/codeql-action/init@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
5858
with:
5959
languages: ${{ matrix.language }}
6060
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -64,7 +64,7 @@ jobs:
6464
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
6565
# If this step fails, then you should remove it and run the build manually (see below)
6666
- name: Autobuild
67-
uses: github/codeql-action/autobuild@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7
67+
uses: github/codeql-action/autobuild@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
6868

6969
# ℹ️ Command-line programs to run using the OS shell.
7070
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
@@ -77,6 +77,6 @@ jobs:
7777
# ./location_of_script_within_repo/buildscript.sh
7878

7979
- name: Perform CodeQL Analysis
80-
uses: github/codeql-action/analyze@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7
80+
uses: github/codeql-action/analyze@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
8181
with:
8282
category: "/language:${{matrix.language}}"

.github/workflows/dependency-review.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
runs-on: ubuntu-latest
2121
steps:
2222
- name: Harden Runner
23-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
23+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
2424
with:
2525
egress-policy: audit
2626

.github/workflows/deploy-docs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
3232

3333
- name: Harden Runner
34-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2
34+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76
3535
with:
3636
disable-sudo: true
3737
egress-policy: block
@@ -51,7 +51,7 @@ jobs:
5151
run: echo "dir=$(yarn cache dir)" > $GITHUB_OUTPUT
5252

5353
- name: Cache dependencies
54-
uses: actions/cache@0057852bfaa89a56745cba8c7296529d2fc39830 # v4.3.0
54+
uses: actions/cache@9255dc7a253b0ccc959486e2bca901246202afeb # v5.0.1
5555
with:
5656
path: ${{ steps.yarn-cache.outputs.dir }}
5757
key: ${{ runner.os }}-website-${{ hashFiles('**/yarn.lock') }}

.github/workflows/frontend-image.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ jobs:
3030
attestations: write # Required for GitHub attestations
3131
steps:
3232
- name: Harden Runner
33-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
33+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
3434
with:
3535
egress-policy: audit
3636
allowed-endpoints: >
@@ -58,7 +58,7 @@ jobs:
5858
password: ${{ secrets.GITHUB_TOKEN }}
5959

6060
- name: Set up Docker Buildx
61-
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
61+
uses: docker/setup-buildx-action@8d2750c68a42422c14e847fe6c8ac0403b4cbd6f # v3.12.0
6262

6363
- name: Docker metadata
6464
id: meta
@@ -101,7 +101,7 @@ jobs:
101101
--certificate-identity https://github.com/${{ github.repository }}/.github/workflows/frontend-image.yml@${{ github.ref }}
102102
103103
- name: Attest build provenance
104-
uses: actions/attest-build-provenance@977bb373ede98d70efdf65b84cb5f73e068dcc2a # v2.0.0
104+
uses: actions/attest-build-provenance@00014ed6ed5efc5b1ab7f7f34a39eb55d41aa4f8 # v2.0.0
105105
with:
106106
subject-name: ghcr.io/${{ github.repository }}/frontend
107107
subject-digest: ${{ steps.build-and-push.outputs.digest }}

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ jobs:
1919
tags: ${{ steps.tags.outputs.OUTPUT_TAGS }}
2020
steps:
2121
- name: Harden the runner (Audit all outbound calls)
22-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
22+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
2323
with:
2424
egress-policy: audit
2525
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1

.github/workflows/retag.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ jobs:
2323
runs-on: ubuntu-latest
2424
steps:
2525
- name: Harden the runner (Audit all outbound calls)
26-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
26+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
2727
with:
2828
egress-policy: audit
2929

.github/workflows/scorecards.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ jobs:
3333

3434
steps:
3535
- name: Harden Runner
36-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
36+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
3737
with:
3838
egress-policy: audit
3939

@@ -65,14 +65,14 @@ jobs:
6565
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
6666
# format to the repository Actions tab.
6767
- name: "Upload artifact"
68-
uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4 # v5.0.0
68+
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
6969
with:
7070
name: SARIF file
7171
path: results.sarif
7272
retention-days: 5
7373

7474
# Upload the results to GitHub's code scanning dashboard.
7575
- name: "Upload to code-scanning"
76-
uses: github/codeql-action/upload-sarif@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7
76+
uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
7777
with:
7878
sarif_file: results.sarif

.github/workflows/worker-images.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ jobs:
2525
runs-on: ubuntu-22.04
2626
steps:
2727
- name: Harden the runner (Audit all outbound calls)
28-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
28+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
2929
with:
3030
egress-policy: audit
3131

@@ -50,7 +50,7 @@ jobs:
5050

5151
steps:
5252
- name: Harden the runner (Audit all outbound calls)
53-
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
53+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
5454
with:
5555
egress-policy: audit
5656
allowed-endpoints: >
@@ -185,7 +185,7 @@ jobs:
185185
echo "image-name=ghcr.io/${BASE_REPO}" >> $GITHUB_OUTPUT
186186
- name: Attest build provenance
187187
if: ${{ (github.event_name == 'push' && startsWith(github.ref, 'refs/tags/')) || github.event_name == 'workflow_dispatch' }}
188-
uses: actions/attest-build-provenance@977bb373ede98d70efdf65b84cb5f73e068dcc2a # v2.0.0
188+
uses: actions/attest-build-provenance@00014ed6ed5efc5b1ab7f7f34a39eb55d41aa4f8 # v2.0.0
189189
with:
190190
subject-name: ${{ steps.sign.outputs.image-name }}
191191
subject-digest: ${{ steps.sign.outputs.digest }}

0 commit comments

Comments
 (0)