From f75ae8ca44add629ae4db7ce9e58ec2b600964f0 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Mon, 15 Jul 2024 06:04:19 +0000 Subject: [PATCH] Bump the gh-minor group across 1 directory with 3 updates Bumps the gh-minor group with 3 updates in the / directory: [docker/setup-qemu-action](https://github.com/docker/setup-qemu-action), [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action) and [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action). Updates `docker/setup-qemu-action` from 3.0.0 to 3.1.0 - [Release notes](https://github.com/docker/setup-qemu-action/releases) - [Commits](https://github.com/docker/setup-qemu-action/compare/68827325e0b33c7199eb31dd4e31fbe9023e06e3...5927c834f5b4fdf503fca6f4c7eccda82949e1ee) Updates `docker/setup-buildx-action` from 3.3.0 to 3.4.0 - [Release notes](https://github.com/docker/setup-buildx-action/releases) - [Commits](https://github.com/docker/setup-buildx-action/compare/d70bba72b1f3fd22344832f00baa16ece964efeb...4fd812986e6c8c2a69e18311145f9371337f27d4) Updates `aquasecurity/trivy-action` from 0.22.0 to 0.24.0 - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](https://github.com/aquasecurity/trivy-action/compare/595be6a0f6560a0a8fc419ddf630567fc623531d...6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8) --- updated-dependencies: - dependency-name: docker/setup-qemu-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: gh-minor - dependency-name: docker/setup-buildx-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: gh-minor - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: gh-minor ... Signed-off-by: dependabot[bot] --- .github/workflows/build-and-publish.yaml | 4 ++-- .github/workflows/release-runners.yaml | 8 ++++---- .github/workflows/release.yaml | 4 ++-- .github/workflows/scan.yaml | 8 ++++---- 4 files changed, 12 insertions(+), 12 deletions(-) diff --git a/.github/workflows/build-and-publish.yaml b/.github/workflows/build-and-publish.yaml index e0f1a71f..98dc6309 100644 --- a/.github/workflows/build-and-publish.yaml +++ b/.github/workflows/build-and-publish.yaml @@ -57,12 +57,12 @@ jobs: echo "BUILD_VERSION=${BUILD_VERSION}" >> "$GITHUB_OUTPUT" echo "BUILD_SHA=${BUILD_SHA}" >> "$GITHUB_OUTPUT" - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to GitHub Container Registry diff --git a/.github/workflows/release-runners.yaml b/.github/workflows/release-runners.yaml index 5bdb532a..9bb0aec6 100644 --- a/.github/workflows/release-runners.yaml +++ b/.github/workflows/release-runners.yaml @@ -31,12 +31,12 @@ jobs: - name: Check out uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62 # v4.0.0 - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to Docker Registry @@ -80,12 +80,12 @@ jobs: - name: Check out uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62 # v4.0.0 - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to Docker Registry diff --git a/.github/workflows/release.yaml b/.github/workflows/release.yaml index f22e5b6e..93faa747 100644 --- a/.github/workflows/release.yaml +++ b/.github/workflows/release.yaml @@ -47,12 +47,12 @@ jobs: echo "BUILD_DATE=$(date -u +'%Y-%m-%dT%H:%M:%SZ')" >> "$GITHUB_OUTPUT" echo "VERSION=${VERSION}" >> "$GITHUB_OUTPUT" - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to GitHub Container Registry diff --git a/.github/workflows/scan.yaml b/.github/workflows/scan.yaml index f3fd0723..005adfb5 100644 --- a/.github/workflows/scan.yaml +++ b/.github/workflows/scan.yaml @@ -57,7 +57,7 @@ jobs: run: | make docker-buildx - name: Run Trivy vulnerability scanner on controller image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/tofu-controller:latest' format: 'table' @@ -66,7 +66,7 @@ jobs: vuln-type: 'os,library' severity: 'CRITICAL,HIGH' - name: Run Trivy vulnerability scanner on runner image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/tf-runner:latest' format: 'table' @@ -76,7 +76,7 @@ jobs: severity: 'CRITICAL,HIGH' skip-files: '/usr/local/bin/terraform' # false positive - name: Run Trivy vulnerability scanner on runner image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/tf-runner-azure:latest' format: 'table' @@ -86,7 +86,7 @@ jobs: severity: 'CRITICAL,HIGH' skip-files: '/usr/local/bin/terraform' # false positive - name: Run Trivy vulnerability scanner on planner image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/branch-planner:latest' format: 'table'