Skip to content

Commit 4434597

Browse files
build(deps): bump the dependencies group across 1 directory with 7 updates
Bumps the dependencies group with 7 updates in the / directory: | Package | From | To | | --- | --- | --- | | [actions/checkout](https://github.com/actions/checkout) | `4.1.2` | `4.1.6` | | [docker/login-action](https://github.com/docker/login-action) | `3.1.0` | `3.2.0` | | [github/codeql-action](https://github.com/github/codeql-action) | `3.25.0` | `3.25.8` | | [actions/upload-artifact](https://github.com/actions/upload-artifact) | `4.3.1` | `4.3.3` | | [checkmarx/kics-github-action](https://github.com/checkmarx/kics-github-action) | `1.7.0` | `2.0.0` | | [amannn/action-semantic-pull-request](https://github.com/amannn/action-semantic-pull-request) | `5.4.0` | `5.5.2` | | [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) | `0.19.0` | `0.22.0` | Updates `actions/checkout` from 4.1.2 to 4.1.6 - [Release notes](https://github.com/actions/checkout/releases) - [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md) - [Commits](actions/checkout@9bb5618...a5ac7e5) Updates `docker/login-action` from 3.1.0 to 3.2.0 - [Release notes](https://github.com/docker/login-action/releases) - [Commits](docker/login-action@e92390c...0d4c9c5) Updates `github/codeql-action` from 3.25.0 to 3.25.8 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@df5a14d...2e230e8) Updates `actions/upload-artifact` from 4.3.1 to 4.3.3 - [Release notes](https://github.com/actions/upload-artifact/releases) - [Commits](actions/upload-artifact@5d5d22a...6546280) Updates `checkmarx/kics-github-action` from 1.7.0 to 2.0.0 - [Release notes](https://github.com/checkmarx/kics-github-action/releases) - [Commits](Checkmarx/kics-github-action@8a44970...d1b692d) Updates `amannn/action-semantic-pull-request` from 5.4.0 to 5.5.2 - [Release notes](https://github.com/amannn/action-semantic-pull-request/releases) - [Changelog](https://github.com/amannn/action-semantic-pull-request/blob/main/CHANGELOG.md) - [Commits](amannn/action-semantic-pull-request@e9fabac...cfb6070) Updates `aquasecurity/trivy-action` from 0.19.0 to 0.22.0 - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](aquasecurity/trivy-action@d710430...595be6a) --- updated-dependencies: - dependency-name: actions/checkout dependency-type: direct:production update-type: version-update:semver-patch dependency-group: dependencies - dependency-name: docker/login-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: dependencies - dependency-name: github/codeql-action dependency-type: direct:production update-type: version-update:semver-patch dependency-group: dependencies - dependency-name: actions/upload-artifact dependency-type: direct:production update-type: version-update:semver-patch dependency-group: dependencies - dependency-name: checkmarx/kics-github-action dependency-type: direct:production update-type: version-update:semver-major dependency-group: dependencies - dependency-name: amannn/action-semantic-pull-request dependency-type: direct:production update-type: version-update:semver-minor dependency-group: dependencies - dependency-name: aquasecurity/trivy-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: dependencies ... Signed-off-by: dependabot[bot] <[email protected]>
1 parent 989a572 commit 4434597

11 files changed

+32
-32
lines changed

.github/workflows/build.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ jobs:
4141

4242
steps:
4343
- name: Checkout repository
44-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
44+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
4545

4646
- name: Setup Node
4747
uses: actions/setup-node@60edb5dd545a775178f52524783378180af0d1f8 # v4.0.2
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Login to DockerHub
7171
if: github.event_name != 'pull_request'
72-
uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
72+
uses: docker/login-action@0d4c9c5ea7693da7b068278f7b52bda2a190a446 # v3.2.0
7373
with:
7474
username: ${{ secrets.DOCKER_HUB_USER }}
7575
password: ${{ secrets.DOCKER_HUB_TOKEN }}

.github/workflows/checks.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ jobs:
3030

3131
steps:
3232
- name: Checkout repository
33-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
33+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
3434

3535
- name: Setup Node
3636
uses: actions/setup-node@60edb5dd545a775178f52524783378180af0d1f8 # v4.0.2

.github/workflows/codeql.yml

+4-4
Original file line numberDiff line numberDiff line change
@@ -71,11 +71,11 @@ jobs:
7171

7272
steps:
7373
- name: Checkout repository
74-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
74+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
7575

7676
# Initializes the CodeQL tools for scanning.
7777
- name: Initialize CodeQL
78-
uses: github/codeql-action/init@df5a14dc28094dc936e103b37d749c6628682b60 # v2.227
78+
uses: github/codeql-action/init@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v2.227
7979
with:
8080
languages: ${{ matrix.language }}
8181
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -89,7 +89,7 @@ jobs:
8989
# Automates dependency installation for Python, Ruby, and JavaScript, optimizing the CodeQL analysis setup.
9090
# If this step fails, then you should remove it and run the build manually (see below)
9191
- name: Autobuild
92-
uses: github/codeql-action/autobuild@df5a14dc28094dc936e103b37d749c6628682b60 # v2.227
92+
uses: github/codeql-action/autobuild@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v2.227
9393

9494
# ℹ️ Command-line programs to run using the OS shell.
9595
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
@@ -102,6 +102,6 @@ jobs:
102102
# ./location_of_script_within_repo/buildscript.sh
103103

104104
- name: Perform CodeQL Analysis
105-
uses: github/codeql-action/analyze@df5a14dc28094dc936e103b37d749c6628682b60 # v2.227
105+
uses: github/codeql-action/analyze@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v2.227
106106
with:
107107
category: "/language:${{matrix.language}}"

.github/workflows/dependencies.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ jobs:
4040
java-version: '17'
4141

4242
- name: Checkout repository
43-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
43+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
4444

4545
- name: Generate Dependencies file
4646
run: java -jar ./scripts/download/org.eclipse.dash.licenses-1.1.1.jar yarn.lock -project automotive.tractusx -summary DEPENDENCIES || true
@@ -67,7 +67,7 @@ jobs:
6767
if: steps.dependencies-changed.outputs.changed == 'true'
6868

6969
- name: Upload DEPENDENCIES file
70-
uses: actions/upload-artifact@5d5d22a31266ced268874388b861e4b58bb5c2f3 # v4.3.1
70+
uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3
7171
with:
7272
path: DEPENDENCIES
7373
if: steps.dependencies-changed.outputs.changed == 'true'

.github/workflows/kics.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,10 @@ jobs:
4242
security-events: write
4343

4444
steps:
45-
- uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
45+
- uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
4646

4747
- name: KICS scan
48-
uses: checkmarx/kics-github-action@8a44970e3d2eca668be41abe9d4e06709c3b3609 # v1.7.0
48+
uses: checkmarx/kics-github-action@d1b692d84c536f4e8696954ce7aab6818f95f5bc # v2.0.0
4949
with:
5050
# Scanning directory .
5151
path: "."
@@ -67,7 +67,7 @@ jobs:
6767
# Upload findings to GitHub Advanced Security Dashboard
6868
- name: Upload SARIF file for GitHub Advanced Security Dashboard
6969
if: always()
70-
uses: github/codeql-action/upload-sarif@df5a14dc28094dc936e103b37d749c6628682b60 # v3.25.0
70+
uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
7171
with:
7272
sarif_file: kicsResults/results.sarif
7373

.github/workflows/pullRequest-lint.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
name: Validate PR title
3232
runs-on: ubuntu-latest
3333
steps:
34-
- uses: amannn/action-semantic-pull-request@e9fabac35e210fea40ca5b14c0da95a099eff26f # v5.4.0
34+
- uses: amannn/action-semantic-pull-request@cfb60706e18bc85e8aec535e3c577abe8f70378e # v5.5.2
3535
id: lint_pr_title
3636
env:
3737
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

.github/workflows/release-release_candidate.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ jobs:
4141

4242
steps:
4343
- name: Checkout repository
44-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
44+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
4545

4646
- name: Setup Node
4747
uses: actions/setup-node@60edb5dd545a775178f52524783378180af0d1f8 # v4.0.2
@@ -88,7 +88,7 @@ jobs:
8888

8989
- name: Login to DockerHub
9090
if: github.event_name != 'pull_request'
91-
uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
91+
uses: docker/login-action@0d4c9c5ea7693da7b068278f7b52bda2a190a446 # v3.2.0
9292
with:
9393
username: ${{ secrets.DOCKER_HUB_USER }}
9494
password: ${{ secrets.DOCKER_HUB_TOKEN }}

.github/workflows/release.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ jobs:
4242

4343
steps:
4444
- name: Checkout repository
45-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
45+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
4646

4747
- name: Setup Node
4848
uses: actions/setup-node@60edb5dd545a775178f52524783378180af0d1f8 # v4.0.2
@@ -89,7 +89,7 @@ jobs:
8989

9090
- name: Login to DockerHub
9191
if: github.event_name != 'pull_request'
92-
uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
92+
uses: docker/login-action@0d4c9c5ea7693da7b068278f7b52bda2a190a446 # v3.2.0
9393
with:
9494
username: ${{ secrets.DOCKER_HUB_USER }}
9595
password: ${{ secrets.DOCKER_HUB_TOKEN }}
@@ -137,7 +137,7 @@ jobs:
137137
run: echo "RELEASE_VERSION=${{ env.REF_NAME }}" >> $GITHUB_ENV
138138

139139
- name: Checkout repository
140-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
140+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
141141

142142
- name: Check for hotfix version
143143
id: hf-check

.github/workflows/release_candidate.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ jobs:
4141

4242
steps:
4343
- name: Checkout repository
44-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
44+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
4545

4646
- name: Setup Node
4747
uses: actions/setup-node@60edb5dd545a775178f52524783378180af0d1f8 # v4.0.2
@@ -69,7 +69,7 @@ jobs:
6969

7070
- name: Login to DockerHub
7171
if: github.event_name != 'pull_request'
72-
uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0
72+
uses: docker/login-action@0d4c9c5ea7693da7b068278f7b52bda2a190a446 # v3.2.0
7373
with:
7474
username: ${{ secrets.DOCKER_HUB_USER }}
7575
password: ${{ secrets.DOCKER_HUB_TOKEN }}

.github/workflows/trivy-dev.yml

+6-6
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ jobs:
5151

5252
steps:
5353
- name: Checkout repository
54-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
54+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
5555

5656
- name: Run Trivy vulnerability scanner in repo mode
57-
uses: aquasecurity/trivy-action@d710430a6722f083d3b36b8339ff66b32f22ee55 # v0.19.0
57+
uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0
5858
with:
5959
scan-type: "config"
6060
hide-progress: false
@@ -63,7 +63,7 @@ jobs:
6363
vuln-type: "os,library"
6464

6565
- name: Upload Trivy scan results to GitHub Security tab
66-
uses: github/codeql-action/upload-sarif@df5a14dc28094dc936e103b37d749c6628682b60 # v3.25.0
66+
uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
6767
if: always()
6868
with:
6969
sarif_file: "trivy-results1.sarif"
@@ -77,7 +77,7 @@ jobs:
7777

7878
steps:
7979
- name: Checkout repository
80-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
80+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
8181

8282
# It's also possible to scan your private registry with Trivy's built-in image scan.
8383
# All you have to do is set ENV vars.
@@ -86,7 +86,7 @@ jobs:
8686
# For public images, no ENV vars must be set.
8787
- name: Run Trivy vulnerability scanner
8888
if: always()
89-
uses: aquasecurity/trivy-action@d710430a6722f083d3b36b8339ff66b32f22ee55 # v0.19.0
89+
uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0
9090
with:
9191
# Path to Docker image
9292
image-ref: "${{ env.IMAGE_NAMESPACE}}/${{ env.IMAGE_NAME }}:dev"
@@ -96,6 +96,6 @@ jobs:
9696

9797
- name: Upload Trivy scan results to GitHub Security tab
9898
if: always()
99-
uses: github/codeql-action/upload-sarif@df5a14dc28094dc936e103b37d749c6628682b60 # v3.25.0
99+
uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
100100
with:
101101
sarif_file: "trivy-results2.sarif"

.github/workflows/trivy.yml

+6-6
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ jobs:
5151

5252
steps:
5353
- name: Checkout repository
54-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
54+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
5555

5656
- name: Run Trivy vulnerability scanner in repo mode
57-
uses: aquasecurity/trivy-action@d710430a6722f083d3b36b8339ff66b32f22ee55 # v0.19.0
57+
uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0
5858
with:
5959
scan-type: "config"
6060
hide-progress: false
@@ -63,7 +63,7 @@ jobs:
6363
vuln-type: "os,library"
6464

6565
- name: Upload Trivy scan results to GitHub Security tab
66-
uses: github/codeql-action/upload-sarif@df5a14dc28094dc936e103b37d749c6628682b60 # v3.25.0
66+
uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
6767
if: always()
6868
with:
6969
sarif_file: "trivy-results1.sarif"
@@ -77,7 +77,7 @@ jobs:
7777

7878
steps:
7979
- name: Checkout repository
80-
uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2
80+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
8181

8282
# It's also possible to scan your private registry with Trivy's built-in image scan.
8383
# All you have to do is set ENV vars.
@@ -86,7 +86,7 @@ jobs:
8686
# For public images, no ENV vars must be set.
8787
- name: Run Trivy vulnerability scanner
8888
if: always()
89-
uses: aquasecurity/trivy-action@d710430a6722f083d3b36b8339ff66b32f22ee55 # v0.19.0
89+
uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0
9090
with:
9191
# Path to Docker image
9292
image-ref: "${{ env.IMAGE_NAMESPACE }}/${{ env.IMAGE_NAME }}:latest"
@@ -96,6 +96,6 @@ jobs:
9696

9797
- name: Upload Trivy scan results to GitHub Security tab
9898
if: always()
99-
uses: github/codeql-action/upload-sarif@df5a14dc28094dc936e103b37d749c6628682b60 # v3.25.0
99+
uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # v3.25.8
100100
with:
101101
sarif_file: "trivy-results2.sarif"

0 commit comments

Comments
 (0)