Skip to content

Commit 333a523

Browse files
chore(deps): update all dependencies
1 parent 75c9af2 commit 333a523

File tree

23 files changed

+337
-335
lines changed

23 files changed

+337
-335
lines changed

.github/workflows/artifacts.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ jobs:
196196
tar -xf image.tar -C image
197197
198198
- name: Run Trivy vulnerability scanner
199-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
199+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
200200
env:
201201
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
202202
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -213,7 +213,7 @@ jobs:
213213
retention-days: 5
214214

215215
- name: Upload Trivy scan results to GitHub Security tab
216-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
216+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
217217
with:
218218
sarif_file: trivy-results.sarif
219219

@@ -351,7 +351,7 @@ jobs:
351351
fi
352352
353353
- name: Run Trivy vulnerability scanner
354-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
354+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
355355
env:
356356
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
357357
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -369,7 +369,7 @@ jobs:
369369
retention-days: 5
370370

371371
- name: Upload Trivy scan results to GitHub Security tab
372-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
372+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
373373
with:
374374
sarif_file: trivy-results.sarif
375375

@@ -475,7 +475,7 @@ jobs:
475475
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
476476
477477
- name: Run Trivy vulnerability scanner
478-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
478+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
479479
env:
480480
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
481481
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -493,6 +493,6 @@ jobs:
493493
retention-days: 5
494494

495495
- name: Upload Trivy scan results to GitHub Security tab
496-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
496+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
497497
with:
498498
sarif_file: trivy-results.sarif

.github/workflows/ci.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
run: make generate-test-coverage
3232

3333
- name: Test Coverage
34-
uses: vladopajic/go-test-coverage@d4177aaab9307eb783516275d495c01254da2fb9 # v2.16.0
34+
uses: vladopajic/go-test-coverage@7582aebae0a74a798d6552c9e7b65ff5f2cf91f8 # v2.16.1
3535
with:
3636
config: ./.testcoverage.yml
3737
source-dir: ./

.github/workflows/config-reloader.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
133+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/e2e.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ jobs:
121121
# SHARDS: ${{ matrix.SHARDS }}
122122

123123
- name: Run coverage report
124-
uses: vladopajic/go-test-coverage@d4177aaab9307eb783516275d495c01254da2fb9 # v2.16.0
124+
uses: vladopajic/go-test-coverage@7582aebae0a74a798d6552c9e7b65ff5f2cf91f8 # v2.16.1
125125
with:
126126
profile: ./build/_test_coverage/coverage_e2e.out
127127
source-dir: ./

.github/workflows/fluentd-drain-watch.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ jobs:
114114
tar -xf image.tar -C image
115115
116116
- name: Run Trivy vulnerability scanner
117-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
117+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
118118
env:
119119
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
120120
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -131,6 +131,6 @@ jobs:
131131
retention-days: 5
132132

133133
- name: Upload Trivy scan results to GitHub Security tab
134-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
134+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
135135
with:
136136
sarif_file: trivy-results.sarif

.github/workflows/fluentd-images.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ jobs:
134134
tar -xf image.tar -C image
135135
136136
- name: Run Trivy vulnerability scanner
137-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
137+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
138138
env:
139139
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
140140
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -151,7 +151,7 @@ jobs:
151151
retention-days: 5
152152

153153
- name: Upload Trivy scan results to GitHub Security tab
154-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
154+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
155155
with:
156156
sarif_file: trivy-results.sarif
157157

@@ -377,7 +377,7 @@ jobs:
377377
tar -xf image.tar -C image
378378
379379
- name: Run Trivy vulnerability scanner
380-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
380+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
381381
env:
382382
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
383383
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -394,6 +394,6 @@ jobs:
394394
retention-days: 5
395395

396396
- name: Upload Trivy scan results to GitHub Security tab
397-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
397+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
398398
with:
399399
sarif_file: trivy-results.sarif

.github/workflows/node-exporter.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
133+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/syslog-ng-reloader.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
133+
uses: github/codeql-action/upload-sarif@192325c86100d080feab897ff886c34abd4c83a3 # v3.30.3
134134
with:
135135
sarif_file: trivy-results.sarif

.tool-versions

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
golang 1.25.0
1+
golang 1.25.1

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ COPY --from=builder /usr/local/bin/manager /manager
4545
ENTRYPOINT ["/manager"]
4646

4747

48-
FROM gcr.io/distroless/static:latest@sha256:2e114d20aa6371fd271f854aa3d6b2b7d2e70e797bb3ea44fb677afec60db22c
48+
FROM gcr.io/distroless/static:latest@sha256:87bce11be0af225e4ca761c40babb06d6d559f5767fbf7dc3c47f0f1a466b92c
4949

5050
COPY --from=builder /usr/local/bin/manager /manager
5151

0 commit comments

Comments
 (0)