8000 Bump the actions group with 4 updates (#5202) · nginx/kubernetes-ingress@0f603ee · GitHub
[go: up one dir, main page]

Skip to content

Commit 0f603ee

Browse files
Bump the actions group with 4 updates (#5202)
Bumps the actions group with 4 updates: [actions/cache](https://github.com/actions/cache), [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action), [github/codeql-action](https://github.com/github/codeql-action) and [anchore/sbom-action](https://github.com/anchore/sbom-action). Updates `actions/cache` from 4.0.0 to 4.0.1 - [Release notes](https://github.com/actions/cache/releases) - [Changelog](https://github.com/actions/cache/blob/main/RELEASES.md) - [Commits](actions/cache@13aacd8...ab5e6d0) Updates `aquasecurity/trivy-action` from 0.17.0 to 0.18.0 - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@84384bd...062f259) Updates `github/codeql-action` from 3.24.5 to 3.24.6 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@47b3d88...8a470fd) Updates `anchore/sbom-action` from 0.15.8 to 0.15.9 - [Release notes](https://github.com/anchore/sbom-action/releases) - [Commits](anchore/sbom-action@b6a39da...9fece9e) --- updated-dependencies: - dependency-name: actions/cache dependency-type: direct:production update-type: version-update:semver-patch dependency-group: actions - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: actions - dependency-name: github/codeql-action dependency-type: direct:production update-type: version-update:semver-patch dependency-group: actions - dependency-name: anchore/sbom-action dependency-type: direct:production update-type: version-update:semver-patch dependency-group: actions ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent d69b1ab commit 0f603ee

File tree

6 files changed

+16
-16
lines changed

6 files changed

+16
-16
lines changed

.github/workflows/build-oss.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ jobs:
5151
fetch-depth: 0
5252

5353
- name: Fetch Cached Artifacts
54-
uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2 # v4.0.0
54+
uses: actions/cache@ab5e6d0c87105b4c9c2047343972218f562e4319 # v4.0.1
5555
with:
5656
path: ${{ github.workspace }}/dist
5757
key: nginx-ingress-${{ inputs.go-md5 }}
@@ -197,7 +197,7 @@ jobs:
197197
if: ${{ github.ref_type == 'tag' && contains(inputs.image, 'ubi') }}
198198

199199
- name: Run Trivy vulnerability scanner
200-
uses: aquasecurity/trivy-action@84384bd6e777ef152729993b8145ea352e9dd3ef # 0.17.0
200+
uses: aquasecurity/trivy-action@062f2592684a31eb3aa050cc61e7ca1451cecd3d # 0.18.0
201201
continue-on-error: true
202202
with:
203203
image-ref: nginx/nginx-ingress:${{ steps.meta.outputs.version }}
@@ -206,7 +206,7 @@ jobs:
206206
ignore-unfixed: "true"
207207

208208
- name: Upload Trivy scan results to GitHub Security tab
209-
uses: github/codeql-action/upload-sarif@47b3d888fe66b639e431abf22ebca059152f1eea # v3.24.5
209+
uses: github/codeql-action/upload-sarif@8a470fddafa5cbb6266ee11b37ef4d8aae19c571 # v3.24.6
210210
continue-on-error: true
211211
with:
212212
sarif_file: "trivy-results-${{ inputs.image }}.sarif"

.github/workflows/build-plus.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ jobs:
6161
fetch-depth: 0
6262

6363
- name: Fetch Cached Artifacts
64-
uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2 # v4.0.0
64+
uses: actions/cache@ab5e6d0c87105b4c9c2047343972218f562e4319 # v4.0.1
6565
with:
6666
path: ${{ github.workspace }}/dist
6767
key: nginx-ingress-${{ inputs.go-md5 }}
@@ -241,7 +241,7 @@ jobs:
241241
if: ${{ inputs.publish-image }}
242242

243243
- name: Run Trivy vulnerability scanner
244-
uses: aquasecurity/trivy-action@84384bd6e777ef152729993b8145ea352e9dd3ef # 0.17.0
244+
uses: aquasecurity/trivy-action@062f2592684a31eb3aa050cc61e7ca1451cecd3d # 0.18.0
245245
continue-on-error: true
246246
with:
247247
image-ref: ${{ steps.trivy-tag.outputs.tag }}
@@ -251,7 +251,7 @@ jobs:
251251
if: ${{ inputs.publish-image }}
252252

253253
- name: Upload Trivy scan results to GitHub Security tab
254-
uses: github/codeql-action/upload-sarif@47b3d888fe66b639e431abf22ebca059152f1eea # v3.24.5
254+
uses: github/codeql-action/upload-sarif@8a470fddafa5cbb6266ee11b37ef4d8aae19c571 # v3.24.6
255255
continue-on-error: true
256256
with:
257257
sarif_file: "trivy-results-${{ inputs.image }}.sarif"

.github/workflows/ci.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ jobs:
100100
101101
- name: Fetch Cached Binary Artifacts
102102
id: binary-cache
103-
uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2 # v4.0.0
103+
uses: actions/cache@ab5e6d0c87105b4c9c2047343972218f562e4319 # v4.0.1
104104
with:
105105
path: ${{ github.workspace }}/dist
106106
key: nginx-ingress-${{ steps.vars.outputs.go_code_md5 }}
@@ -197,7 +197,7 @@ jobs:
197197
if: ${{ needs.checks.outputs.binary_cache_hit != 'true' }}
198198

199199
- name: Download Syft
200-
uses: anchore/sbom-action/download-syft@b6a39da80722a2cb0ef5d197531764a89b5d48c3 # v0.15.8
200+
uses: anchore/sbom-action/download-syft@9fece9e20048ca9590af301449208b2b8861333b # v0.15.9
201201
if: github.ref_type == 'tag'
202202

203203
- name: Install Cosign
@@ -228,7 +228,7 @@ jobs:
228228
if: ${{ needs.checks.outputs.binary_cache_hit != 'true' }}
229229

230230
- name: Store Artifacts in Cache
231-
uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2 # v4.0.0
231+
uses: actions/cache@ab5e6d0c87105b4c9c2047343972218f562e4319 # v4.0.1
232232
with:
233233
path: ${{ github.workspace }}/dist
234234
key: nginx-ingress-${{ needs.checks.outputs.go_code_md5 }}
@@ -255,7 +255,7 @@ jobs:
255255
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
256256

257257
- name: Fetch Cached Artifacts
258-
uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2 # v4.0.0
258+
uses: actions/cache@ab5e6d0c87105b4c9c2047343972218f562e4319 # v4.0.1
259259
with:
260260
path: ${{ github.workspace }}/dist
261261
key: nginx-ingress-${{ needs.checks.outputs.go_code_md5 }}

.github/workflows/codeql-analysis.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ jobs:
4343

4444
# Initializes the CodeQL tools for scanning.
4545
- name: Initialize CodeQL
46-
uses: github/codeql-action/init@47b3d888fe66b639e431abf22ebca059152f1eea # v3.24.5
46+
uses: github/codeql-action/init@8a470fddafa5cbb6266ee11b37ef4d8aae19c571 # v3.24.6
4747
with:
4848
languages: ${{ matrix.language }}
4949
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -62,7 +62,7 @@ jobs:
6262
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
6363
# If this step fails, then you should remove it and run the build manually (see below)
6464
- name: Autobuild
65-
uses: github/codeql-action/autobuild@47b3d888fe66b639e431abf22ebca059152f1eea # v3.24.5
65+
uses: github/codeql-action/autobuild@8a470fddafa5cbb6266ee11b37ef4d8aae19c571 # v3.24.6
6666

6767
# ℹ️ Command-line programs to run using the OS shell.
6868
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
@@ -75,6 +75,6 @@ jobs:
7575
# ./location_of_script_within_repo/buildscript.sh
7676

7777
- name: Perform CodeQL Analysis
78-
uses: github/codeql-action/analyze@47b3d888fe66b639e431abf22ebca059152f1eea # v3.24.5
78+
uses: github/codeql-action/analyze@8a470fddafa5cbb6266ee11b37ef4d8aae19c571 # v3.24.6
7979
with:
8080
category: "/language:${{matrix.language}}"

.github/workflows/scorecards.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,6 @@ jobs:
5757

5858
# Upload the results to GitHub's code scanning dashboard.
5959
- name: "Upload to code-scanning"
60-
uses: github/codeql-action/upload-sarif@47b3d888fe66b639e431abf22ebca059152f1eea # v3.24.5
60+
uses: github/codeql-action/upload-sarif@8a470fddafa5cbb6266ee11b37ef4d8aae19c571 # v3.24.6
6161
with:
6262
sarif_file: results.sarif

.github/workflows/update-docker-images.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ jobs:
6161

6262
- name: Fetch Cached Binary Artifacts
6363
id: binary-cache
64-
uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2 # v4.0.0
64+
uses: actions/cache@ab5e6d0c87105b4c9c2047343972218f562e4319 # v4.0.1
6565
with:
6666
path: ${{ github.workspace }}/dist
6767
key: nginx-ingress-${{ steps.md5.outputs.go_code_md5 }}
@@ -129,7 +129,7 @@ jobs:
129129
if: ${{ needs.variables.outputs.binary-cache-hit != 'true' }}
130130

131131
- name: Store Artifacts in Cache
132-
uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2 # v4.0.0
132+
uses: actions/cache@ab5e6d0c87105b4c9c2047343972218f562e4319 # v4.0.1
133133
with:
134134
path: ${{ github.workspace }}/dist
135135
key: nginx-ingress-${{ needs.variables.outputs.go-md5 }}

0 commit comments

Comments
 (0)
0