diff --git a/.github/workflows/coverage.yml b/.github/workflows/coverage.yml index 4f4ea381..ab04c220 100644 --- a/.github/workflows/coverage.yml +++ b/.github/workflows/coverage.yml @@ -27,12 +27,12 @@ jobs: value: ${{ secrets.FOSSA_API_KEY }} - name: "Run FOSSA Scan" if: steps.checksecret.outputs.result == 'true' - uses: fossas/fossa-action@3ebcea1862c6ffbd5cf1b4d0bd6b3fe7bd6f2cac # v1.7.0 + uses: fossas/fossa-action@c414b9ad82eaad041e47a7cf62a4f02411f427a0 # v1.8.0 with: api-key: ${{ secrets.FOSSA_API_KEY }} - name: "Run FOSSA Test" if: steps.checksecret.outputs.result == 'true' - uses: fossas/fossa-action@3ebcea1862c6ffbd5cf1b4d0bd6b3fe7bd6f2cac # v1.7.0 + uses: fossas/fossa-action@c414b9ad82eaad041e47a7cf62a4f02411f427a0 # v1.8.0 with: api-key: ${{ secrets.FOSSA_API_KEY }} run-tests: true @@ -52,7 +52,7 @@ jobs: with: go-version-file: 'go.mod' - name: Run Gosec Security Scanner - uses: securego/gosec@424fc4cd9c82ea0fd6bee9cd49c2db2c3cc0c93f # v2.22.11 + uses: securego/gosec@398ad549bbf1a51dc978fd966169f660c59774de # v2.23.0 with: args: '-no-fail -fmt sarif -out gosec.sarif ./...' - name: Upload SARIF file diff --git a/.github/workflows/docker-build.yml b/.github/workflows/docker-build.yml index df23e47c..d46f9dd0 100644 --- a/.github/workflows/docker-build.yml +++ b/.github/workflows/docker-build.yml @@ -28,7 +28,7 @@ jobs: - name: ko build run: VERSION=${{ github.sha }} make ko-build-all - name: Trivy Scan Image - uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0 with: scan-type: 'fs' ignore-unfixed: true diff --git a/.github/workflows/docker-publish.yml b/.github/workflows/docker-publish.yml index cd6bbe60..619369ed 100644 --- a/.github/workflows/docker-publish.yml +++ b/.github/workflows/docker-publish.yml @@ -28,7 +28,7 @@ jobs: with: build-cache-key: publish-images - name: Run Trivy vulnerability (Repo) - uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0 with: scan-type: 'fs' ignore-unfixed: true diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index a2ff1a48..e393cf99 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -37,6 +37,6 @@ jobs: path: results.sarif retention-days: 5 - name: Upload to code-scanning - uses: github/codeql-action/upload-sarif@6bc82e05fd0ea64601dd4b465378bbcf57de0314 # v4.32.1 + uses: github/codeql-action/upload-sarif@9e907b5e64f6b83e7804b09294d44122997950d6 # v4.32.3 with: sarif_file: results.sarif diff --git a/hack/distro/argocd/release.flux.yaml b/hack/distro/argocd/release.flux.yaml index c96c4558..b7a61643 100644 --- a/hack/distro/argocd/release.flux.yaml +++ b/hack/distro/argocd/release.flux.yaml @@ -13,7 +13,7 @@ spec: chart: spec: chart: argo-cd - version: "9.3.7" + version: "9.4.2" sourceRef: kind: HelmRepository name: argocd diff --git a/hack/distro/monitoring/kube-prometheus-stack/release.flux.yaml b/hack/distro/monitoring/kube-prometheus-stack/release.flux.yaml index 0ad78aa9..f108b14f 100644 --- a/hack/distro/monitoring/kube-prometheus-stack/release.flux.yaml +++ b/hack/distro/monitoring/kube-prometheus-stack/release.flux.yaml @@ -13,7 +13,7 @@ spec: chart: spec: chart: kube-prometheus-stack - version: "81.4.2" + version: "81.6.9" sourceRef: kind: HelmRepository name: kube-prometheus-stack