Skip to content

Commit be9be30

Browse files
Merge pull request #2094 from kube-logging/renovate/all
chore(deps): update all dependencies
2 parents 34ac4af + 71050a2 commit be9be30

File tree

76 files changed

+2858
-704
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+2858
-704
lines changed

.github/workflows/artifacts.yaml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ jobs:
7777
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
7878

7979
- name: Set up Cosign
80-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
80+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
8181
if: ${{ inputs.publish }}
8282

8383
- name: Set image name
@@ -103,7 +103,7 @@ jobs:
103103
org.opencontainers.image.documentation=https://kube-logging.dev/docs/
104104
105105
- name: Login to GitHub Container Registry
106-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
106+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
107107
with:
108108
registry: ghcr.io
109109
username: ${{ github.actor }}
@@ -196,7 +196,7 @@ jobs:
196196
tar -xf image.tar -C image
197197
198198
- name: Run Trivy vulnerability scanner
199-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
199+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
200200
env:
201201
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
202202
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -239,10 +239,10 @@ jobs:
239239
- name: Set up Helm
240240
uses: azure/setup-helm@1a275c3b69536ee54be43f2070a358922e12c8d4 # v4.3.1
241241
with:
242-
version: v3.13.3
242+
version: v3.19.0
243243

244244
- name: Set up Cosign
245-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
245+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
246246
if: inputs.publish && inputs.release
247247

248248
- name: Set chart name
@@ -284,7 +284,7 @@ jobs:
284284
path: ${{ steps.build.outputs.package }}
285285

286286
- name: Login to GitHub Container Registry
287-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
287+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
288288
with:
289289
registry: ghcr.io
290290
username: ${{ github.actor }}
@@ -351,7 +351,7 @@ jobs:
351351
fi
352352
353353
- name: Run Trivy vulnerability scanner
354-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
354+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
355355
env:
356356
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
357357
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -400,10 +400,10 @@ jobs:
400400
- name: Set up Helm
401401
uses: azure/setup-helm@1a275c3b69536ee54be43f2070a358922e12c8d4 # v4.3.1
402402
with:
403-
version: v3.13.3
403+
version: v3.19.0
404404

405405
- name: Set up Cosign
406-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
406+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
407407
if: inputs.publish && inputs.release
408408

409409
- name: Set chart name
@@ -475,7 +475,7 @@ jobs:
475475
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" | jq
476476
477477
- name: Run Trivy vulnerability scanner
478-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
478+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
479479
env:
480480
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
481481
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1

.github/workflows/ci.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
run: make generate-test-coverage
3232

3333
- name: Test Coverage
34-
uses: vladopajic/go-test-coverage@d4177aaab9307eb783516275d495c01254da2fb9 # v2.16.0
34+
uses: vladopajic/go-test-coverage@cc5012c2cfa84542e02b079141958a885861d326 # v2.17.0
3535
with:
3636
config: ./.testcoverage.yml
3737
source-dir: ./
@@ -68,7 +68,7 @@ jobs:
6868
go-version-file: '.go-version'
6969

7070
- name: Cache licenses
71-
uses: actions/cache@0400d5f644dc74513175e3cd8d07132dd4860809 # v4.2.4
71+
uses: actions/cache@0057852bfaa89a56745cba8c7296529d2fc39830 # v4.3.0
7272
with:
7373
key: licensei-v2-${{ hashFiles('go.sum') }}
7474
path: |

.github/workflows/config-reloader.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
37+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -60,7 +60,7 @@ jobs:
6060
org.opencontainers.image.documentation=https://kube-logging.dev/docs/
6161
6262
- name: Login to GitHub Container Registry
63-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
63+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
6464
with:
6565
registry: ghcr.io
6666
username: ${{ github.actor }}
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1

.github/workflows/e2e.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ jobs:
137137
# SHARDS: ${{ matrix.SHARDS }}
138138

139139
- name: Run coverage report
140-
uses: vladopajic/go-test-coverage@d4177aaab9307eb783516275d495c01254da2fb9 # v2.16.0
140+
uses: vladopajic/go-test-coverage@cc5012c2cfa84542e02b079141958a885861d326 # v2.17.0
141141
with:
142142
profile: ./build/_test_coverage/coverage_e2e.out
143143
source-dir: ./
@@ -157,7 +157,7 @@ jobs:
157157
strategy:
158158
fail-fast: false
159159
matrix:
160-
kube: ["1.31", "1.32", "1.33"]
160+
kube: ["1.32", "1.33", "1.34"]
161161

162162
steps:
163163
- name: Set up Docker Buildx
@@ -193,12 +193,12 @@ jobs:
193193
id: node_image
194194
run: |
195195
case ${{ matrix.kube }} in
196-
1.31)
197-
NODE_IMAGE=kindest/node:v1.31.0@sha256:53df588e04085fd41ae12de0c3fe4c72f7013bba32a20e7325357a1ac94ba865 ;;
198196
1.32)
199197
NODE_IMAGE=kindest/node:v1.32.0@sha256:c48c62eac5da28cdadcf560d1d8616cfa6783b58f0d94cf63ad1bf49600cb027 ;;
200198
1.33)
201-
NODE_IMAGE=kindest/node:v1.33.0@sha256:02f73d6ae3f11ad5d543f16736a2cb2a63a300ad60e81dac22099b0b04784a4e
199+
NODE_IMAGE=kindest/node:v1.33.0@sha256:02f73d6ae3f11ad5d543f16736a2cb2a63a300ad60e81dac22099b0b04784a4e ;;
200+
1.34)
201+
NODE_IMAGE=kindest/node:v1.34.0@sha256:7416a61b42b1662ca6ca89f02028ac133a309a2a30ba309614e8ec94d976dc5a ;;
202202
esac
203203
204204
echo "image=$NODE_IMAGE" >> $GITHUB_OUTPUT

.github/workflows/fluentd-drain-watch.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ jobs:
3535
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3636

3737
- name: Set up Cosign
38-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
38+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3939
if: ${{ inputs.publish }}
4040

4141
- name: Set image name
@@ -61,7 +61,7 @@ jobs:
6161
org.opencontainers.image.documentation=https://kube-logging.dev/docs/
6262
6363
- name: Login to GitHub Container Registry
64-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
64+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
6565
with:
6666
registry: ghcr.io
6767
username: ${{ github.actor }}
@@ -114,7 +114,7 @@ jobs:
114114
tar -xf image.tar -C image
115115
116116
- name: Run Trivy vulnerability scanner
117-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
117+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
118118
env:
119119
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
120120
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1

.github/workflows/fluentd-images.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ jobs:
134134
tar -xf image.tar -C image
135135
136136
- name: Run Trivy vulnerability scanner
137-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
137+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
138138
env:
139139
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
140140
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
@@ -202,7 +202,7 @@ jobs:
202202
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
203203

204204
- name: Set up Cosign
205-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
205+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
206206

207207
- name: Set image name
208208
id: image-name
@@ -220,7 +220,7 @@ jobs:
220220
org.opencontainers.image.documentation=https://kube-logging.dev/docs/
221221
222222
- name: Login to GitHub Container Registry
223-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
223+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
224224
with:
225225
registry: ghcr.io
226226
username: ${{ github.actor }}
@@ -302,10 +302,10 @@ jobs:
302302
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
303303

304304
- name: Set up Cosign
305-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
305+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
306306

307307
- name: Login to GitHub Container Registry
308-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
308+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
309309
with:
310310
registry: ghcr.io
311311
username: ${{ github.actor }}
@@ -377,7 +377,7 @@ jobs:
377377
tar -xf image.tar -C image
378378
379379
- name: Run Trivy vulnerability scanner
380-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
380+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
381381
env:
382382
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
383383
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1

.github/workflows/node-exporter.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
37+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -60,7 +60,7 @@ jobs:
6060
org.opencontainers.image.documentation=https://kube-logging.dev/docs/
6161
6262
- name: Login to GitHub Container Registry
63-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
63+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
6464
with:
6565
registry: ghcr.io
6666
username: ${{ github.actor }}
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1

.github/workflows/syslog-ng-reloader.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
3535

3636
- name: Set up Cosign
37-
uses: sigstore/cosign-installer@d58896d6a1865668819e1d91763c7751a165e159 # v3.9.2
37+
uses: sigstore/cosign-installer@d7543c93d881b35a8faa02e8e3605f69b7a1ce62 # v3.10.0
3838
if: ${{ inputs.publish }}
3939

4040
- name: Set image name
@@ -60,7 +60,7 @@ jobs:
6060
org.opencontainers.image.documentation=https://kube-logging.dev/docs/
6161
6262
- name: Login to GitHub Container Registry
63-
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
63+
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
6464
with:
6565
registry: ghcr.io
6666
username: ${{ github.actor }}
@@ -113,7 +113,7 @@ jobs:
113113
tar -xf image.tar -C image
114114
115115
- name: Run Trivy vulnerability scanner
116-
uses: aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
116+
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
117117
env:
118118
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
119119
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1

.go-version

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.24.1
1+
1.25.2

.tool-versions

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
golang 1.25.0
1+
golang 1.25.2

0 commit comments

Comments
 (0)