From 5d984adb311ee324471196ba353928a91699bf71 Mon Sep 17 00:00:00 2001 From: jacdavi <86626873+jacdavi@users.noreply.github.com> Date: Tue, 5 May 2026 14:48:31 -0700 Subject: [PATCH] build: update all github action dependencies to latest use sha when immutable release tags not enabled --- .github/workflows/m365_image_build.yaml | 14 ++++++-------- .github/workflows/release.yaml | 6 +++--- .github/workflows/terraform_scan.yaml | 6 +++--- 3 files changed, 12 insertions(+), 14 deletions(-) diff --git a/.github/workflows/m365_image_build.yaml b/.github/workflows/m365_image_build.yaml index cda538f..d76b32d 100644 --- a/.github/workflows/m365_image_build.yaml +++ b/.github/workflows/m365_image_build.yaml @@ -42,7 +42,7 @@ jobs: steps: - name: Checkout repository - uses: actions/checkout@v4 + uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 with: ref: ${{ matrix.version.ref }} @@ -50,15 +50,13 @@ jobs: # https://github.com/sigstore/cosign-installer - name: Install cosign if: github.event_name != 'pull_request' - uses: sigstore/cosign-installer@v3 - with: - cosign-release: 'v2.2.4' + uses: sigstore/cosign-installer@cad07c2e89fa2edd6e2d7bab4c1aa38e53f76003 # v4.1.1 # Login against a Docker registry except on PR # https://github.com/docker/login-action - name: Log into registry ${{ env.REGISTRY }} if: github.event_name != 'pull_request' - uses: docker/login-action@v3 + uses: docker/login-action@v4.1.0 with: registry: ${{ env.REGISTRY }} username: ${{ github.actor }} @@ -68,7 +66,7 @@ jobs: # https://github.com/docker/metadata-action - name: Extract Docker metadata id: meta - uses: docker/metadata-action@v5 + uses: docker/metadata-action@v6.0.0 with: context: git images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} @@ -138,14 +136,14 @@ jobs: runs-on: ubuntu-latest steps: - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 + uses: aquasecurity/trivy-action@v0.36.0 with: image-ref: ${{ needs.build.outputs.image }}:latest format: 'sarif' output: 'trivy-results.sarif' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3 + uses: github/codeql-action/upload-sarif@v4.35.3 with: sarif_file: 'trivy-results.sarif' category: m365-image diff --git a/.github/workflows/release.yaml b/.github/workflows/release.yaml index 32fefda..8382325 100644 --- a/.github/workflows/release.yaml +++ b/.github/workflows/release.yaml @@ -29,7 +29,7 @@ jobs: if: github.event_name != 'pull_request' || github.event.pull_request.head.repo.full_name != github.event.pull_request.base.repo.full_name steps: - name: Checkout - uses: actions/checkout@v4 + uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 with: path: repo - name: Install Azure Signing Tool @@ -39,7 +39,7 @@ jobs: Install-AzureSignTool # OpenID Connect (OIDC) login to Azure Public Cloud with AzPowershell - name: Login to Azure - uses: azure/login@v2 + uses: azure/login@532459ea530d8321f2fb9bb10d1e0bcf23869a43 # v3.0.0 with: client-id: ${{ secrets.AZURE_CLIENT_ID }} tenant-id: ${{ secrets.AZURE_TENANT_ID }} @@ -58,7 +58,7 @@ jobs: -RootFolderName "repo" # Creates release assets - name: Create Release - uses: softprops/action-gh-release@v1 + uses: softprops/action-gh-release@b4309332981a82ec1c5618f44dd2e27cc8bfbfda # v3.0.0 id: create-release with: draft: true diff --git a/.github/workflows/terraform_scan.yaml b/.github/workflows/terraform_scan.yaml index bb35b37..bee3c12 100644 --- a/.github/workflows/terraform_scan.yaml +++ b/.github/workflows/terraform_scan.yaml @@ -14,10 +14,10 @@ jobs: if: github.event_name != 'pull_request' || github.event.pull_request.head.repo.full_name != github.event.pull_request.base.repo.full_name steps: - name: Checkout code - uses: actions/checkout@v4 + uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 - name: Run Trivy vulnerability scanner in IaC mode - uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 + uses: aquasecurity/trivy-action@v0.36.0 with: scan-type: 'config' hide-progress: true @@ -26,7 +26,7 @@ jobs: exit-code: '0' severity: 'CRITICAL,HIGH,MEDIUM' - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@v3 + uses: github/codeql-action/upload-sarif@v4.35.3 with: sarif_file: 'trivy-results.sarif' category: terraform