From aff3220942766a4e807175a92393087ddf54982a Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Mon, 26 Jan 2026 04:09:27 +0000 Subject: [PATCH] Bump the github-actions group across 1 directory with 3 updates Bumps the github-actions group with 3 updates in the / directory: [actions/checkout](https://github.com/actions/checkout), [github/codeql-action](https://github.com/github/codeql-action) and [anchore/scan-action](https://github.com/anchore/scan-action). Updates `actions/checkout` from 6.0.1 to 6.0.2 - [Release notes](https://github.com/actions/checkout/releases) - [Commits](https://github.com/actions/checkout/compare/v6.0.1...v6.0.2) Updates `github/codeql-action` from 4.31.9 to 4.31.11 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](https://github.com/github/codeql-action/compare/5d4e8d1aca955e8d8589aabd499c5cae939e33c7...19b2f06db2b6f5108140aeb04014ef02b648f789) Updates `anchore/scan-action` from 7.2.3 to 7.3.0 - [Release notes](https://github.com/anchore/scan-action/releases) - [Changelog](https://github.com/anchore/scan-action/blob/main/RELEASE.md) - [Commits](https://github.com/anchore/scan-action/compare/62b74fb7bb810d2c45b1865f47a77655621862a5...0d444ed77d83ee2ba7f5ced0d90d640a1281d762) --- updated-dependencies: - dependency-name: actions/checkout dependency-version: 6.0.2 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions - dependency-name: github/codeql-action dependency-version: 4.31.11 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: github-actions - dependency-name: anchore/scan-action dependency-version: 7.3.0 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: github-actions ... Signed-off-by: dependabot[bot] --- .github/workflows/push.yml | 2 +- .github/workflows/release.yml | 2 +- .github/workflows/research-vuln-scan.yml | 14 +++++++------- 3 files changed, 9 insertions(+), 9 deletions(-) diff --git a/.github/workflows/push.yml b/.github/workflows/push.yml index ce87ab3..a549776 100644 --- a/.github/workflows/push.yml +++ b/.github/workflows/push.yml @@ -43,7 +43,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout - uses: actions/checkout@v6.0.1 + uses: actions/checkout@v6.0.2 - name: Build and Push Greenbone Registry id: build diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index c249a8b..798fdd2 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -17,7 +17,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout - uses: actions/checkout@v6.0.1 + uses: actions/checkout@v6.0.2 - name: Get dockerhub postgres service tags id: dtags diff --git a/.github/workflows/research-vuln-scan.yml b/.github/workflows/research-vuln-scan.yml index b5a8894..4fccd65 100644 --- a/.github/workflows/research-vuln-scan.yml +++ b/.github/workflows/research-vuln-scan.yml @@ -20,7 +20,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout code - uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v4.2.2 + uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2 - name: Run Trivy vulnerability scanner uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 @@ -36,7 +36,7 @@ jobs: TRIVY_PASSWORD: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }} - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5 + uses: github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v3.29.5 with: sarif_file: 'trivy-results.sarif' category: ${{ github.jobs[github.job].name }} @@ -50,7 +50,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout code - uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v4.2.2 + uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2 - name: Login to Greenbone Product container registry uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef #v3.6.0 @@ -60,7 +60,7 @@ jobs: password: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }} - name: Run the Anchore Grype scan action - uses: anchore/scan-action@62b74fb7bb810d2c45b1865f47a77655621862a5 + uses: anchore/scan-action@0d444ed77d83ee2ba7f5ced0d90d640a1281d762 id: grype with: image: '${{ vars.GREENBONE_REGISTRY }}/opensight/opensight-postgres:16' @@ -68,7 +68,7 @@ jobs: severity-cutoff: medium - name: Upload grype vulnerability report - uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5 + uses: github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v3.29.5 with: sarif_file: ${{ steps.grype.outputs.sarif }} category: ${{ github.jobs[github.job].name }} @@ -83,7 +83,7 @@ jobs: runs-on: self-hosted-generic steps: - name: Checkout code - uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v4.2.2 + uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2 - name: Login to Greenbone Product container registry uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef #v3.6.0 @@ -108,7 +108,7 @@ jobs: - name: Upload docker scout SARIF result id: upload-sarif if: ${{ github.event_name != 'pull_request_target' }} - uses: github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v3.29.5 + uses: github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v3.29.5 with: sarif_file: sarif.output.json category: ${{ github.jobs[github.job].name }}