From 02150a26a8c4e69abf10b5d70df798a07530f40d Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 7 Oct 2024 19:35:00 +0000 Subject: [PATCH] chore(deps): update digest dependencies --- .github/workflows/build_data_tools.yml | 2 +- .github/workflows/ci.yml | 4 ++-- .github/workflows/deploy_reusable.yml | 2 +- .github/workflows/e2e_test_reusable.yml | 6 +++--- .github/workflows/nightly_scans.yml | 4 ++-- .github/workflows/security_codeql.yml | 6 +++--- .github/workflows/security_semgrep.yml | 4 ++-- .github/workflows/unit_test_reusable.yml | 6 +++--- 8 files changed, 17 insertions(+), 17 deletions(-) diff --git a/.github/workflows/build_data_tools.yml b/.github/workflows/build_data_tools.yml index 66159de4be..c09c3854c3 100644 --- a/.github/workflows/build_data_tools.yml +++ b/.github/workflows/build_data_tools.yml @@ -24,7 +24,7 @@ jobs: steps: - name: Checkout repository - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 # https://github.com/docker/login-action - name: Log in to the Container registry diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index c9854d3a0c..7c24bc6f3e 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -18,7 +18,7 @@ jobs: name: Trufflehog Secret Scanning runs-on: ubuntu-latest steps: - - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + - uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 with: fetch-depth: 0 - name: TruffleHog OSS @@ -65,7 +65,7 @@ jobs: name: Linting runs-on: ubuntu-latest steps: - - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + - uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 - uses: ./.github/actions/setup-python - name: Lint backend diff --git a/.github/workflows/deploy_reusable.yml b/.github/workflows/deploy_reusable.yml index d471a54983..0444a2d893 100644 --- a/.github/workflows/deploy_reusable.yml +++ b/.github/workflows/deploy_reusable.yml @@ -20,7 +20,7 @@ jobs: concurrency: ${{ inputs.environment }} steps: - - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + - uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 - uses: ./.github/actions/setup-python - uses: ./.github/actions/setup-javascript - uses: ./.github/actions/setup-cloudfoundry diff --git a/.github/workflows/e2e_test_reusable.yml b/.github/workflows/e2e_test_reusable.yml index 616e8cf503..02bdf77112 100644 --- a/.github/workflows/e2e_test_reusable.yml +++ b/.github/workflows/e2e_test_reusable.yml @@ -38,7 +38,7 @@ jobs: steps: # Checkout the code - name: Checkout - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 # Install and cache NPM dependencies - uses: ./.github/actions/setup-javascript @@ -70,7 +70,7 @@ jobs: # Upload Cypress screenshots as artifact if a test fails - name: Upload screenshots if failure if: failure() # This step will run only if the previous step fails - uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4 + uses: actions/upload-artifact@604373da6381bf24206979c74d06a550515601b9 # v4 with: path: frontend/cypress/${{ steps.get-filename.outputs.TEST_FILE }}/screenshots # Update this path based on your project structure name: cypress-screenshots @@ -85,7 +85,7 @@ jobs: # Upload logs as artifact - name: Upload logs as artifact if: always() # Ensure this runs, even if E2E fails - uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4 + uses: actions/upload-artifact@604373da6381bf24206979c74d06a550515601b9 # v4 with: # Set the path to the log file path: full-stack-logs-${{ steps.get-filename.outputs.TEST_FILE }}.log diff --git a/.github/workflows/nightly_scans.yml b/.github/workflows/nightly_scans.yml index ae4e98145a..1d605e967e 100644 --- a/.github/workflows/nightly_scans.yml +++ b/.github/workflows/nightly_scans.yml @@ -16,7 +16,7 @@ jobs: security-events: write steps: - - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + - uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 - name: Run OWASP Zap Scan on staging uses: zaproxy/action-full-scan@d2a07475d467566c9a3e3c700f31f47724aa1060 # v0.10.0 @@ -34,6 +34,6 @@ jobs: uses: SvanBoxel/zaproxy-to-ghas@cfc77481d74a17a4c3d6b753aa9d7abef453d501 # v1.0.2 - name: Upload SARIF file - uses: github/codeql-action/upload-sarif@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3 + uses: github/codeql-action/upload-sarif@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3 with: sarif_file: results.sarif diff --git a/.github/workflows/security_codeql.yml b/.github/workflows/security_codeql.yml index 6fc14283ce..dc14d437c0 100644 --- a/.github/workflows/security_codeql.yml +++ b/.github/workflows/security_codeql.yml @@ -18,11 +18,11 @@ jobs: steps: - name: Checkout repository - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3 + uses: github/codeql-action/init@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3 with: languages: javascript, python # If you wish to specify custom queries, you can do so here or in a config file. @@ -33,4 +33,4 @@ jobs: queries: +security-extended - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3 + uses: github/codeql-action/analyze@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3 diff --git a/.github/workflows/security_semgrep.yml b/.github/workflows/security_semgrep.yml index 19ef4f7c40..c68eb78195 100644 --- a/.github/workflows/security_semgrep.yml +++ b/.github/workflows/security_semgrep.yml @@ -12,7 +12,7 @@ jobs: image: returntocorp/semgrep@sha256:4cc2a2d7482901c6cdec930d46ab54c4de189ce48348e0fce80bd9f639c94a7e # 1.47.0 steps: - name: Checkout - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 # We've changed the behavior a little, instead of forcing a fail on `semgrep scan` step # we force the upload, and manage any results in the sencondary CodeQL Analysis of the @@ -25,7 +25,7 @@ jobs: SEMGREP_RULES: "p/default" - name: Upload SARIF file for GitHub Advanced Security Dashboard - uses: github/codeql-action/upload-sarif@6db8d6351fd0be61f9ed8ebd12ccd35dcec51fea # v3 + uses: github/codeql-action/upload-sarif@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3 with: sarif_file: ${{ env.SEMGREP_TO_UPLOAD }} if: always() diff --git a/.github/workflows/unit_test_reusable.yml b/.github/workflows/unit_test_reusable.yml index 73d050a34c..b08b2447ef 100644 --- a/.github/workflows/unit_test_reusable.yml +++ b/.github/workflows/unit_test_reusable.yml @@ -9,7 +9,7 @@ jobs: JWT_PRIVATE_KEY: ${{ secrets.JWT_PRIVATE_KEY }} JWT_PUBLIC_KEY: ${{ secrets.JWT_PUBLIC_KEY }} steps: - - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + - uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 - uses: ./.github/actions/setup-python # Stand up the system stack, to have something to poke - name: Run backend unit tests @@ -22,7 +22,7 @@ jobs: env: JWT_PRIVATE_KEY: "__blank__" steps: - - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + - uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 - uses: ./.github/actions/setup-python - name: Run backend unit tests working-directory: ./backend/data_tools/ @@ -32,7 +32,7 @@ jobs: name: Frontend Unit Tests runs-on: ubuntu-latest steps: - - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + - uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4 - uses: ./.github/actions/setup-javascript # Stand up the system stack, to have something to poke - name: Run frontend unit tests