diff --git a/.github/workflows/build-and-publish.yaml b/.github/workflows/build-and-publish.yaml index e0f1a71f..98dc6309 100644 --- a/.github/workflows/build-and-publish.yaml +++ b/.github/workflows/build-and-publish.yaml @@ -57,12 +57,12 @@ jobs: echo "BUILD_VERSION=${BUILD_VERSION}" >> "$GITHUB_OUTPUT" echo "BUILD_SHA=${BUILD_SHA}" >> "$GITHUB_OUTPUT" - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to GitHub Container Registry diff --git a/.github/workflows/release-runners.yaml b/.github/workflows/release-runners.yaml index 5bdb532a..9bb0aec6 100644 --- a/.github/workflows/release-runners.yaml +++ b/.github/workflows/release-runners.yaml @@ -31,12 +31,12 @@ jobs: - name: Check out uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62 # v4.0.0 - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to Docker Registry @@ -80,12 +80,12 @@ jobs: - name: Check out uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62 # v4.0.0 - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to Docker Registry diff --git a/.github/workflows/release.yaml b/.github/workflows/release.yaml index f22e5b6e..93faa747 100644 --- a/.github/workflows/release.yaml +++ b/.github/workflows/release.yaml @@ -47,12 +47,12 @@ jobs: echo "BUILD_DATE=$(date -u +'%Y-%m-%dT%H:%M:%SZ')" >> "$GITHUB_OUTPUT" echo "VERSION=${VERSION}" >> "$GITHUB_OUTPUT" - name: Setup QEMU - uses: docker/setup-qemu-action@68827325e0b33c7199eb31dd4e31fbe9023e06e3 # v3.0.0 + uses: docker/setup-qemu-action@5927c834f5b4fdf503fca6f4c7eccda82949e1ee # v3.1.0 with: platforms: all - name: Setup Docker Buildx id: buildx - uses: docker/setup-buildx-action@d70bba72b1f3fd22344832f00baa16ece964efeb # v3.3.0 + uses: docker/setup-buildx-action@4fd812986e6c8c2a69e18311145f9371337f27d4 # v3.4.0 with: buildkitd-flags: "--debug" - name: Login to GitHub Container Registry diff --git a/.github/workflows/scan.yaml b/.github/workflows/scan.yaml index f3fd0723..005adfb5 100644 --- a/.github/workflows/scan.yaml +++ b/.github/workflows/scan.yaml @@ -57,7 +57,7 @@ jobs: run: | make docker-buildx - name: Run Trivy vulnerability scanner on controller image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/tofu-controller:latest' format: 'table' @@ -66,7 +66,7 @@ jobs: vuln-type: 'os,library' severity: 'CRITICAL,HIGH' - name: Run Trivy vulnerability scanner on runner image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/tf-runner:latest' format: 'table' @@ -76,7 +76,7 @@ jobs: severity: 'CRITICAL,HIGH' skip-files: '/usr/local/bin/terraform' # false positive - name: Run Trivy vulnerability scanner on runner image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/tf-runner-azure:latest' format: 'table' @@ -86,7 +86,7 @@ jobs: severity: 'CRITICAL,HIGH' skip-files: '/usr/local/bin/terraform' # false positive - name: Run Trivy vulnerability scanner on planner image - uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d # v0.22.0 + uses: aquasecurity/trivy-action@6e7b7d1fd3e4fef0c5fa8cce1229c54b2c9bd0d8 # v0.24.0 with: image-ref: 'ghcr.io/flux-iac/branch-planner:latest' format: 'table'