-
Notifications
You must be signed in to change notification settings - Fork 882
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
build(deps): Bump the ci group with 4 updates #1644
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dependabot
bot
added
area/CI
dependencies
Pull requests that update a dependency file
labels
Oct 7, 2024
Bumps the ci group with 4 updates: [actions/cache](https://github.com/actions/cache), [github/codeql-action](https://github.com/github/codeql-action), [sigstore/cosign-installer](https://github.com/sigstore/cosign-installer) and [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action). Updates `actions/cache` from 4.0.2 to 4.1.0 - [Release notes](https://github.com/actions/cache/releases) - [Changelog](https://github.com/actions/cache/blob/main/RELEASES.md) - [Commits](actions/cache@0c45773...2cdf405) Updates `github/codeql-action` from 3.26.9 to 3.26.11 - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@461ef6c...6db8d63) Updates `sigstore/cosign-installer` from 3.6.0 to 3.7.0 - [Release notes](https://github.com/sigstore/cosign-installer/releases) - [Commits](sigstore/cosign-installer@4959ce0...dc72c7d) Updates `docker/setup-buildx-action` from 3.6.1 to 3.7.1 - [Release notes](https://github.com/docker/setup-buildx-action/releases) - [Commits](docker/setup-buildx-action@988b5a0...c47758b) --- updated-dependencies: - dependency-name: actions/cache dependency-type: direct:production update-type: version-update:semver-minor dependency-group: ci - dependency-name: github/codeql-action dependency-type: direct:production update-type: version-update:semver-patch dependency-group: ci - dependency-name: sigstore/cosign-installer dependency-type: direct:production update-type: version-update:semver-minor dependency-group: ci - dependency-name: docker/setup-buildx-action dependency-type: direct:production update-type: version-update:semver-minor dependency-group: ci ... Signed-off-by: dependabot[bot] <[email protected]>
felixfontein
force-pushed
the
dependabot/github_actions/ci-bcad948a9a
branch
from
October 8, 2024 05:20
3509fb6
to
ca00678
Compare
felixfontein
approved these changes
Oct 8, 2024
tmeijn
pushed a commit
to tmeijn/dotfiles
that referenced
this pull request
Dec 5, 2024
This MR contains the following updates: | Package | Update | Change | |---|---|---| | [getsops/sops](https://github.com/getsops/sops) | patch | `v3.9.1` -> `v3.9.2` | MR created with the help of [el-capitano/tools/renovate-bot](https://gitlab.com/el-capitano/tools/renovate-bot). **Proposed changes to behavior should be submitted there as MRs.** --- ### Release Notes <details> <summary>getsops/sops (getsops/sops)</summary> ### [`v3.9.2`](https://github.com/getsops/sops/releases/tag/v3.9.2) [Compare Source](getsops/sops@v3.9.1...v3.9.2) #### Installation To install `sops`, download one of the pre-built binaries provided for your platform from the artifacts attached to this release. For instance, if you are using Linux on an AMD64 architecture: ```shell ### Download the binary curl -LO https://github.com/getsops/sops/releases/download/v3.9.2/sops-v3.9.2.linux.amd64 ### Move the binary in to your PATH mv sops-v3.9.2.linux.amd64 /usr/local/bin/sops ### Make the binary executable chmod +x /usr/local/bin/sops ``` ##### Verify checksums file signature The checksums file provided within the artifacts attached to this release is signed using [Cosign](https://docs.sigstore.dev/cosign/overview/) with GitHub OIDC. To validate the signature of this file, run the following commands: ```shell ### Download the checksums file, certificate and signature curl -LO https://github.com/getsops/sops/releases/download/v3.9.2/sops-v3.9.2.checksums.txt curl -LO https://github.com/getsops/sops/releases/download/v3.9.2/sops-v3.9.2.checksums.pem curl -LO https://github.com/getsops/sops/releases/download/v3.9.2/sops-v3.9.2.checksums.sig ### Verify the checksums file cosign verify-blob sops-v3.9.2.checksums.txt \ --certificate sops-v3.9.2.checksums.pem \ --signature sops-v3.9.2.checksums.sig \ --certificate-identity-regexp=https://github.com/getsops \ --certificate-oidc-issuer=https://token.actions.githubusercontent.com ``` ##### Verify binary integrity To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature: ```shell ### Verify the binary using the checksums file sha256sum -c sops-v3.9.2.checksums.txt --ignore-missing ``` ##### Verify artifact provenance The [SLSA provenance](https://slsa.dev/provenance/v0.2) of the binaries, packages, and SBOMs can be found within the artifacts associated with this release. It is presented through an [in-toto](https://in-toto.io/) link metadata file named `sops-v3.9.2.intoto.jsonl`. To verify the provenance of an artifact, you can utilize the [`slsa-verifier`](https://github.com/slsa-framework/slsa-verifier#artifacts) tool: ```shell ### Download the metadata file curl -LO https://github.com/getsops/sops/releases/download/v3.9.2/sops-v3.9.2.intoto.jsonl ### Verify the provenance of the artifact slsa-verifier verify-artifact <artifact> \ --provenance-path sops-v3.9.2.intoto.jsonl \ --source-uri github.com/getsops/sops \ --source-tag v3.9.2 ``` #### Container Images The `sops` binaries are also available as container images, based on Debian (slim) and Alpine Linux. The Debian-based container images include any dependencies which may be required to make use of certain key services, such as GnuPG, AWS KMS, Azure Key Vault, and Google Cloud KMS. The Alpine-based container images are smaller in size, but do not include these dependencies. These container images are available for the following architectures: `linux/amd64` and `linux/arm64`. ##### GitHub Container Registry - `ghcr.io/getsops/sops:v3.9.2` - `ghcr.io/getsops/sops:v3.9.2-alpine` ##### Quay.io - `quay.io/getsops/sops:v3.9.2` - `quay.io/getsops/sops:v3.9.2-alpine` ##### Verify container image signature The container images are signed using [Cosign](https://docs.sigstore.dev/cosign/overview/) with GitHub OIDC. To validate the signature of an image, run the following command: ```shell cosign verify ghcr.io/getsops/sops:v3.9.2 \ --certificate-identity-regexp=https://github.com/getsops \ --certificate-oidc-issuer=https://token.actions.githubusercontent.com \ -o text ``` ##### Verify container image provenance The container images include [SLSA provenance](https://slsa.dev/provenance/v0.2) attestations. For more information around the verification of this, please refer to the [`slsa-verifier` documentation](https://github.com/slsa-framework/slsa-verifier#containers). #### Software Bill of Materials The Software Bill of Materials (SBOM) for each binary is accessible within the artifacts enclosed with this release. It is presented as an [SPDX](https://spdx.dev/) JSON file, formatted as `<binary>.spdx.sbom.json`. #### What's Changed - build(deps): Bump the go group with 11 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1645 - build(deps): Bump the ci group with 4 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1644 - build(deps): Bump the go group with 12 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1649 - build(deps): Bump the ci group with 5 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1648 - build(deps): Bump the go group with 6 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1653 - build(deps): Bump the ci group with 2 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1654 - build(deps): Bump serde_json from 1.0.128 to 1.0.132 in /functional-tests in the rust group by [@​dependabot](https://github.com/dependabot) in getsops/sops#1655 - fix(azkv): handle whitespace in Azure Key Vault URLs by [@​sEpt0r](https://github.com/sEpt0r) in getsops/sops#1652 - build(deps): Bump the go group with 7 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1662 - build(deps): Bump the ci group with 5 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1664 - build(deps): Bump the rust group in /functional-tests with 2 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1663 - build(deps): Bump the ci group across 1 directory with 3 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1673 - build(deps): Bump the rust group in /functional-tests with 2 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1670 - build(deps): Bump github/codeql-action from 3.27.1 to 3.27.4 in the ci group by [@​dependabot](https://github.com/dependabot) in getsops/sops#1677 - build(deps): Bump the rust group in /functional-tests with 3 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1676 - build(deps): Bump the ci group with 2 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1685 - build(deps): Bump the go group across 1 directory with 18 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1686 - Correctly handle comments during JSON serialization by [@​felixfontein](https://github.com/felixfontein) in getsops/sops#1647 - Update Rust dependencies by [@​felixfontein](https://github.com/felixfontein) in getsops/sops#1689 - fix(config): remove unused variables and align error casing by [@​nicklasfrahm](https://github.com/nicklasfrahm) in getsops/sops#1687 - keyservice: update protobuf to a recent release, and make go code generation reproducible by [@​felixfontein](https://github.com/felixfontein) in getsops/sops#1688 - build(deps): Bump the go group with 8 updates by [@​dependabot](https://github.com/dependabot) in getsops/sops#1693 - Release 3.9.2 by [@​felixfontein](https://github.com/felixfontein) in getsops/sops#1691 #### New Contributors - [@​sEpt0r](https://github.com/sEpt0r) made their first contribution in getsops/sops#1652 - [@​nicklasfrahm](https://github.com/nicklasfrahm) made their first contribution in getsops/sops#1687 **Full Changelog**: getsops/sops@v3.9.1...v3.9.2 </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever MR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this MR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this MR, check this box --- This MR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy40NDAuNyIsInVwZGF0ZWRJblZlciI6IjM3LjQ0MC43IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJSZW5vdmF0ZSBCb3QiXX0=-->
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bumps the ci group with 4 updates: actions/cache, github/codeql-action, sigstore/cosign-installer and docker/setup-buildx-action.
Updates
actions/cache
from 4.0.2 to 4.1.0Release notes
Sourced from actions/cache's releases.
Changelog
Sourced from actions/cache's changelog.
... (truncated)
Commits
2cdf405
Prepare4.1.0
release (#1464)a11fb02
restore action's README now references v4 instead of v3 (#1445)cf7a75e
Fix typo: depening -> depending (#1462)c74ca40
Deprecatesave-always
input (#1452)f8a7ab4
Merge pull request #1463 from actions/Jcambass-patch-145b7be0
Add workflow file for publishing releases to immutable action package81382a7
Merge pull request #1311 from todgru/todgru/v4-documentation-updatec4ee99a
Merge branch 'main' into todgru/v4-documentation-update57b8e40
Clarify that therestore-keys
input is a string in the docs (#1434)40c3b67
Fix cache-hit output when cache missed (#1404)Updates
github/codeql-action
from 3.26.9 to 3.26.11Changelog
Sourced from github/codeql-action's changelog.
... (truncated)
Commits
6db8d63
Merge pull request #2522 from github/update-v3.26.11-8aba5f2c4389647f
Update changelog for v3.26.118aba5f2
Merge pull request #2516 from github/aeisenberg/dependabot-excludeecac2c6
Exclupdeeslint-plugin-import
updates from dependabote85017e
Merge pull request #2514 from github/henrymercer/zstd-better-failure-logginga60db1d
Add notice for dependency upgrade timeline (#2513)28db28f
Improve clean up if extraction fails3da852e
Capture stderr from extracting.tar.zst
c4d433c
Merge pull request #2510 from github/dependabot/npm_and_yarn/npm-13baf58ce82f6cf48
Undoeslint-plugin-import
bumpUpdates
sigstore/cosign-installer
from 3.6.0 to 3.7.0Release notes
Sourced from sigstore/cosign-installer's releases.
Commits
dc72c7d
bump for latest cosign v2.4.1 release (#173)08bb361
Bump actions/checkout from 4.1.7 to 4.2.0 (#172)Updates
docker/setup-buildx-action
from 3.6.1 to 3.7.1Release notes
Sourced from docker/setup-buildx-action's releases.
Commits
c47758b
Merge pull request #369 from crazy-max/revert-crypto8fea382
chore: update generated content2874e98
switch back to uuid package8026d2b
Merge pull request #362 from docker/dependabot/npm_and_yarn/docker/actions-to...e51aab5
chore: update generated contentfd7390e
build(deps): bump@docker/actions-toolkit
from 0.35.0 to 0.39.0910a304
Merge pull request #366 from crazy-max/remove-uuid3623ee4
chore: update generated contente0e5ecf
remove uuid package and switch to crypto5334dd0
Merge pull request #363 from crazy-max/set-buildkitd-flags-optinDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions