Skip to content

Commit df267ea

Browse files
chore(deps): update all dependencies
1 parent 57ab57b commit df267ea

File tree

23 files changed

+375
-377
lines changed

23 files changed

+375
-377
lines changed

.github/workflows/artifacts.yaml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ jobs:
7777
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
7878

7979
- name: Set up Cosign
80-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
80+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
8181
if: ${{ inputs.publish }}
8282

8383
- name: Set image name
@@ -196,7 +196,7 @@ jobs:
196196
tar -xf image.tar -C image
197197
198198
- name: Run Trivy vulnerability scanner
199-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
199+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
200200
env:
201201
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
202202
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -213,7 +213,7 @@ jobs:
213213
retention-days: 5
214214

215215
- name: Upload Trivy scan results to GitHub Security tab
216-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
216+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
217217
with:
218218
sarif_file: trivy-results.sarif
219219

@@ -242,7 +242,7 @@ jobs:
242242
version: v3.13.3
243243

244244
- name: Set up Cosign
245-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
245+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
246246
if: inputs.publish && inputs.release
247247

248248
- name: Set chart name
@@ -351,7 +351,7 @@ jobs:
351351
fi
352352
353353
- name: Run Trivy vulnerability scanner
354-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
354+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
355355
env:
356356
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
357357
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -369,7 +369,7 @@ jobs:
369369
retention-days: 5
370370

371371
- name: Upload Trivy scan results to GitHub Security tab
372-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
372+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
373373
with:
374374
sarif_file: trivy-results.sarif
375375

@@ -403,7 +403,7 @@ jobs:
403403
version: v3.13.3
404404

405405
- name: Set up Cosign
406-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
406+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
407407
if: inputs.publish && inputs.release
408408

409409
- name: Set chart name
@@ -475,7 +475,7 @@ jobs:
475475
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
476476
477477
- name: Run Trivy vulnerability scanner
478-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
478+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
479479
env:
480480
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
481481
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -493,6 +493,6 @@ jobs:
493493
retention-days: 5
494494

495495
- name: Upload Trivy scan results to GitHub Security tab
496-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
496+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
497497
with:
498498
sarif_file: trivy-results.sarif

.github/workflows/ci.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
run: make generate-test-coverage
3232

3333
- name: Test Coverage
34-
uses: vladopajic/go-test-coverage@d4177aaab9307eb783516275d495c01254da2fb9 # v2.16.0
34+
uses: vladopajic/go-test-coverage@cc5012c2cfa84542e02b079141958a885861d326 # v2.17.0
3535
with:
3636
config: ./.testcoverage.yml
3737
source-dir: ./
@@ -68,7 +68,7 @@ jobs:
6868
go-version-file: '.go-version'
6969

7070
- name: Cache licenses
71-
uses: actions/cache@0400d5f644dc74513175e3cd8d07132dd4860809 # v4.2.4
71+
uses: actions/cache@0057852bfaa89a56745cba8c7296529d2fc39830 # v4.3.0
7272
with:
7373
key: licensei-v2-${{ hashFiles('go.sum') }}
7474
path: |

.github/workflows/config-reloader.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
37+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
133+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/e2e.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ jobs:
121121
# SHARDS: ${{ matrix.SHARDS }}
122122

123123
- name: Run coverage report
124-
uses: vladopajic/go-test-coverage@d4177aaab9307eb783516275d495c01254da2fb9 # v2.16.0
124+
uses: vladopajic/go-test-coverage@cc5012c2cfa84542e02b079141958a885861d326 # v2.17.0
125125
with:
126126
profile: ./build/_test_coverage/coverage_e2e.out
127127
source-dir: ./

.github/workflows/fluentd-drain-watch.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ jobs:
3535
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3636

3737
- name: Set up Cosign
38-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
38+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3939
if: ${{ inputs.publish }}
4040

4141
- name: Set image name
@@ -114,7 +114,7 @@ jobs:
114114
tar -xf image.tar -C image
115115
116116
- name: Run Trivy vulnerability scanner
117-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
117+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
118118
env:
119119
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
120120
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -131,6 +131,6 @@ jobs:
131131
retention-days: 5
132132

133133
- name: Upload Trivy scan results to GitHub Security tab
134-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
134+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
135135
with:
136136
sarif_file: trivy-results.sarif

.github/workflows/fluentd-images.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ jobs:
134134
tar -xf image.tar -C image
135135
136136
- name: Run Trivy vulnerability scanner
137-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
137+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
138138
env:
139139
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
140140
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -151,7 +151,7 @@ jobs:
151151
retention-days: 5
152152

153153
- name: Upload Trivy scan results to GitHub Security tab
154-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
154+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
155155
with:
156156
sarif_file: trivy-results.sarif
157157

@@ -202,7 +202,7 @@ jobs:
202202
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
203203

204204
- name: Set up Cosign
205-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
205+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
206206

207207
- name: Set image name
208208
id: image-name
@@ -302,7 +302,7 @@ jobs:
302302
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
303303

304304
- name: Set up Cosign
305-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
305+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
306306

307307
- name: Login to GitHub Container Registry
308308
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
@@ -377,7 +377,7 @@ jobs:
377377
tar -xf image.tar -C image
378378
379379
- name: Run Trivy vulnerability scanner
380-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
380+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
381381
env:
382382
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
383383
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -394,6 +394,6 @@ jobs:
394394
retention-days: 5
395395

396396
- name: Upload Trivy scan results to GitHub Security tab
397-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
397+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
398398
with:
399399
sarif_file: trivy-results.sarif

.github/workflows/node-exporter.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
37+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
133+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
134134
with:
135135
sarif_file: trivy-results.sarif

.github/workflows/syslog-ng-reloader.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
37+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -130,6 +130,6 @@ jobs:
130130
retention-days: 5
131131

132132
- name: Upload Trivy scan results to GitHub Security tab
133-
uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.11
133+
uses: github/codeql-action/upload-sarif@303c0aef88fc2fe5ff6d63d3b1596bfd83dfa1f9 # v3.30.4
134134
with:
135135
sarif_file: trivy-results.sarif

.tool-versions

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
golang 1.25.0
1+
golang 1.25.1

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ COPY --from=builder /usr/local/bin/manager /manager
4545
ENTRYPOINT ["/manager"]
4646

4747

48-
FROM gcr.io/distroless/static:latest@sha256:2e114d20aa6371fd271f854aa3d6b2b7d2e70e797bb3ea44fb677afec60db22c
48+
FROM gcr.io/distroless/static:latest@sha256:87bce11be0af225e4ca761c40babb06d6d559f5767fbf7dc3c47f0f1a466b92c
4949

5050
COPY --from=builder /usr/local/bin/manager /manager
5151

0 commit comments

Comments
 (0)