Skip to content

Commit 77a997a

Browse files
chore(deps): update all-ci-updates
1 parent 2dfd4f3 commit 77a997a

6 files changed

Lines changed: 8 additions & 8 deletions

File tree

.github/workflows/coverage.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,12 @@ jobs:
2727
value: ${{ secrets.FOSSA_API_KEY }}
2828
- name: "Run FOSSA Scan"
2929
if: steps.checksecret.outputs.result == 'true'
30-
uses: fossas/fossa-action@3ebcea1862c6ffbd5cf1b4d0bd6b3fe7bd6f2cac # v1.7.0
30+
uses: fossas/fossa-action@c414b9ad82eaad041e47a7cf62a4f02411f427a0 # v1.8.0
3131
with:
3232
api-key: ${{ secrets.FOSSA_API_KEY }}
3333
- name: "Run FOSSA Test"
3434
if: steps.checksecret.outputs.result == 'true'
35-
uses: fossas/fossa-action@3ebcea1862c6ffbd5cf1b4d0bd6b3fe7bd6f2cac # v1.7.0
35+
uses: fossas/fossa-action@c414b9ad82eaad041e47a7cf62a4f02411f427a0 # v1.8.0
3636
with:
3737
api-key: ${{ secrets.FOSSA_API_KEY }}
3838
run-tests: true
@@ -52,7 +52,7 @@ jobs:
5252
with:
5353
go-version-file: 'go.mod'
5454
- name: Run Gosec Security Scanner
55-
uses: securego/gosec@424fc4cd9c82ea0fd6bee9cd49c2db2c3cc0c93f # v2.22.11
55+
uses: securego/gosec@398ad549bbf1a51dc978fd966169f660c59774de # v2.23.0
5656
with:
5757
args: '-no-fail -fmt sarif -out gosec.sarif ./...'
5858
- name: Upload SARIF file

.github/workflows/docker-build.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
- name: ko build
2929
run: VERSION=${{ github.sha }} make ko-build-all
3030
- name: Trivy Scan Image
31-
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
31+
uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0
3232
with:
3333
scan-type: 'fs'
3434
ignore-unfixed: true

.github/workflows/docker-publish.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
with:
2929
build-cache-key: publish-images
3030
- name: Run Trivy vulnerability (Repo)
31-
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
31+
uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0
3232
with:
3333
scan-type: 'fs'
3434
ignore-unfixed: true

.github/workflows/scorecard.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,6 @@ jobs:
3737
path: results.sarif
3838
retention-days: 5
3939
- name: Upload to code-scanning
40-
uses: github/codeql-action/upload-sarif@6bc82e05fd0ea64601dd4b465378bbcf57de0314 # v4.32.1
40+
uses: github/codeql-action/upload-sarif@45cbd0c69e560cd9e7cd7f8c32362050c9b7ded2 # v4.32.2
4141
with:
4242
sarif_file: results.sarif

hack/distro/argocd/release.flux.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
chart:
1414
spec:
1515
chart: argo-cd
16-
version: "9.3.7"
16+
version: "9.4.1"
1717
sourceRef:
1818
kind: HelmRepository
1919
name: argocd

hack/distro/monitoring/kube-prometheus-stack/release.flux.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
chart:
1414
spec:
1515
chart: kube-prometheus-stack
16-
version: "81.4.2"
16+
version: "81.6.4"
1717
sourceRef:
1818
kind: HelmRepository
1919
name: kube-prometheus-stack

0 commit comments

Comments
 (0)