Skip to content

Commit 3c5bf5f

Browse files
committed
chore(deps): bump some deps switch env signatures
Signed-off-by: Bence Csati <bence.csati@axoflow.com>
1 parent 7536980 commit 3c5bf5f

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

.github/workflows/artifacts.yaml

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ jobs:
210210
tar -xf image.tar -C image
211211
212212
- name: Run Trivy vulnerability scanner
213-
uses: aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # 0.28.0
213+
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
214214
env:
215215
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
216216
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:1
@@ -227,7 +227,7 @@ jobs:
227227
retention-days: 5
228228

229229
- name: Upload Trivy scan results to GitHub Security tab
230-
uses: github/codeql-action/upload-sarif@407ffafae6a767df3e0230c3df91b6443ae8df75 # v2.22.8
230+
uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
231231
with:
232232
sarif_file: trivy-results.sarif
233233

@@ -251,9 +251,9 @@ jobs:
251251
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
252252

253253
- name: Set up Helm
254-
uses: azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
254+
uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
255255
with:
256-
version: v3.12.0
256+
version: v3.13.3
257257

258258
- name: Set up Cosign
259259
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
@@ -361,7 +361,7 @@ jobs:
361361
fi
362362
363363
- name: Run Trivy vulnerability scanner
364-
uses: aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # 0.28.0
364+
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
365365
env:
366366
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
367367
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:1
@@ -379,7 +379,7 @@ jobs:
379379
retention-days: 5
380380

381381
- name: Upload Trivy scan results to GitHub Security tab
382-
uses: github/codeql-action/upload-sarif@407ffafae6a767df3e0230c3df91b6443ae8df75 # v2.22.8
382+
uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
383383
with:
384384
sarif_file: trivy-results.sarif
385385

@@ -408,16 +408,16 @@ jobs:
408408
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
409409

410410
- name: Set up Helm
411-
uses: azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
411+
uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
412412
with:
413-
version: v3.12.0
413+
version: v3.13.3
414414

415415
- name: Set up Cosign
416416
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
417417

418418
- name: Set chart name
419419
id: chart-name
420-
run: echo "value=${{ github.event.repository.name }}/$subchartName" >> "$GITHUB_OUTPUT"
420+
run: echo "value=${{ github.event.repository.name }}/${{ env.subchartName }}" >> "$GITHUB_OUTPUT"
421421

422422
- name: Set OCI registry name
423423
id: oci-registry-name
@@ -428,7 +428,7 @@ jobs:
428428
run: echo "value=${{ steps.oci-registry-name.outputs.value }}/${{ steps.chart-name.outputs.value }}" >> "$GITHUB_OUTPUT"
429429

430430
- name: Helm lint
431-
run: helm lint charts/$subchartPath
431+
run: helm lint charts/${{ env.subchartPath }}
432432

433433
- name: Determine raw version
434434
uses: haya14busa/action-cond@94f77f7a80cd666cb3155084e428254fea4281fd # v1.2.1
@@ -441,8 +441,8 @@ jobs:
441441
- name: Helm package
442442
id: build
443443
run: |
444-
helm package charts/$subchartPath --version ${{ steps.version.outputs.value }} --app-version ${{ steps.version.outputs.value }}
445-
echo "package=${{ github.workspace }}/$subchartName-${{ steps.version.outputs.value }}.tgz" >> "$GITHUB_OUTPUT"
444+
helm package charts/${{ env.subchartPath }} --version ${{ steps.version.outputs.value }} --app-version ${{ steps.version.outputs.value }}
445+
echo "package=${{ github.workspace }}/${{ env.subchartName }}-${{ steps.version.outputs.value }}.tgz" >> "$GITHUB_OUTPUT"
446446
447447
- name: Upload chart as artifact
448448
uses: actions/upload-artifact@a8a3f3ad30e3422c9c7b888a15615d19a852ae32 # v3.1.3
@@ -484,13 +484,13 @@ jobs:
484484
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
485485
486486
- name: Run Trivy vulnerability scanner
487-
uses: aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # 0.28.0
487+
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
488488
env:
489489
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
490490
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:1
491491
with:
492492
scan-type: config
493-
scan-ref: charts/$subchartPath
493+
scan-ref: charts/${{ env.subchartPath }}
494494
format: sarif
495495
output: trivy-results.sarif
496496

@@ -502,6 +502,6 @@ jobs:
502502
retention-days: 5
503503

504504
- name: Upload Trivy scan results to GitHub Security tab
505-
uses: github/codeql-action/upload-sarif@407ffafae6a767df3e0230c3df91b6443ae8df75 # v2.22.8
505+
uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
506506
with:
507507
sarif_file: trivy-results.sarif

0 commit comments

Comments
 (0)