Skip to content

Commit ce850c3

Browse files
Bump the github-actions group across 1 directory with 3 updates (#86)
Bumps the github-actions group with 3 updates in the / directory: [actions/checkout](https://github.com/actions/checkout), [github/codeql-action](https://github.com/github/codeql-action) and [anchore/scan-action](https://github.com/anchore/scan-action). Updates `actions/checkout` from 6.0.1 to 6.0.2 - [Release notes](https://github.com/actions/checkout/releases) - [Commits](actions/checkout@v6.0.1...v6.0.2) Updates `github/codeql-action` from 4.31.9 to 4.31.11 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@5d4e8d1...19b2f06) Updates `anchore/scan-action` from 7.2.3 to 7.3.0 - [Release notes](https://github.com/anchore/scan-action/releases) - [Changelog](https://github.com/anchore/scan-action/blob/main/RELEASE.md) - [Commits](anchore/scan-action@62b74fb...0d444ed) --- updated-dependencies: - dependency-name: actions/checkout dependency-version: 6.0.2 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions - dependency-name: github/codeql-action dependency-version: 4.31.11 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions - dependency-name: anchore/scan-action dependency-version: 7.3.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent f6c93eb commit ce850c3

3 files changed

Lines changed: 9 additions & 9 deletions

File tree

.github/workflows/push.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ jobs:
4343
runs-on: self-hosted-generic
4444
steps:
4545
- name: Checkout
46-
uses: actions/checkout@v6.0.1
46+
uses: actions/checkout@v6.0.2
4747

4848
- name: Build and Push Greenbone Registry
4949
id: build

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ jobs:
1717
runs-on: self-hosted-generic
1818
steps:
1919
- name: Checkout
20-
uses: actions/checkout@v6.0.1
20+
uses: actions/checkout@v6.0.2
2121

2222
- name: Get dockerhub postgres service tags
2323
id: dtags

.github/workflows/research-vuln-scan.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
runs-on: self-hosted-generic
2121
steps:
2222
- name: Checkout code
23-
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v4.2.2
23+
uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2
2424

2525
- name: Run Trivy vulnerability scanner
2626
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8
@@ -36,7 +36,7 @@ jobs:
3636
TRIVY_PASSWORD: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }}
3737

3838
- name: Upload Trivy scan results to GitHub Security tab
39-
uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5
39+
uses: github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v3.29.5
4040
with:
4141
sarif_file: 'trivy-results.sarif'
4242
category: ${{ github.jobs[github.job].name }}
@@ -50,7 +50,7 @@ jobs:
5050
runs-on: self-hosted-generic
5151
steps:
5252
- name: Checkout code
53-
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v4.2.2
53+
uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2
5454

5555
- name: Login to Greenbone Product container registry
5656
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef #v3.6.0
@@ -60,15 +60,15 @@ jobs:
6060
password: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }}
6161

6262
- name: Run the Anchore Grype scan action
63-
uses: anchore/scan-action@62b74fb7bb810d2c45b1865f47a77655621862a5
63+
uses: anchore/scan-action@0d444ed77d83ee2ba7f5ced0d90d640a1281d762
6464
id: grype
6565
with:
6666
image: '${{ vars.GREENBONE_REGISTRY }}/opensight/opensight-postgres:16'
6767
fail-build: false
6868
severity-cutoff: medium
6969

7070
- name: Upload grype vulnerability report
71-
uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5
71+
uses: github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v3.29.5
7272
with:
7373
sarif_file: ${{ steps.grype.outputs.sarif }}
7474
category: ${{ github.jobs[github.job].name }}
@@ -83,7 +83,7 @@ jobs:
8383
runs-on: self-hosted-generic
8484
steps:
8585
- name: Checkout code
86-
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v4.2.2
86+
uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2
8787

8888
- name: Login to Greenbone Product container registry
8989
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef #v3.6.0
@@ -108,7 +108,7 @@ jobs:
108108
- name: Upload docker scout SARIF result
109109
id: upload-sarif
110110
if: ${{ github.event_name != 'pull_request_target' }}
111-
uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5
111+
uses: github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v3.29.5
112112
with:
113113
sarif_file: sarif.output.json
114114
category: ${{ github.jobs[github.job].name }}

0 commit comments

Comments
 (0)