intelops / genval

Simplifies configuration management for a wide range of tools, including Dockerfile, Kubernetes manifests, and other infrastructure files.
Apache License 2.0
6 stars 5 forks source link

Upgrade: Bump actions/checkout from 4.1.7 to 4.2.2 #193

Closed dependabot[bot] closed 4 days ago

dependabot[bot] commented 1 week ago

Bumps actions/checkout from 4.1.7 to 4.2.2.

Release notes

Sourced from actions/checkout's releases.

v4.2.2

What's Changed

Full Changelog: https://github.com/actions/checkout/compare/v4.2.1...v4.2.2

v4.2.1

What's Changed

New Contributors

Full Changelog: https://github.com/actions/checkout/compare/v4.2.0...v4.2.1

v4.2.0

What's Changed

New Contributors

Full Changelog: https://github.com/actions/checkout/compare/v4.1.7...v4.2.0

Changelog

Sourced from actions/checkout's changelog.

Changelog

v4.2.2

v4.2.1

v4.2.0

v4.1.7

v4.1.6

v4.1.5

v4.1.4

v4.1.3

v4.1.2

v4.1.1

v4.1.0

... (truncated)

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 1 week ago

DryRun Security Summary

The provided code changes focus on improving the security and integrity of the project's codebase and release artifacts through the implementation of CI workflows that update dependencies, run linting and static code analysis, integrate automated vulnerability scanning, and release workflows that ensure the trustworthiness of the released artifacts using Cosign for signing and generating a Software Bill of Materials (SBOM).

Expand for full summary
**Summary:** The provided code changes are related to the GitHub Actions workflows for the project's Continuous Integration (CI) and release processes. From an application security perspective, these changes are focused on improving the overall security and integrity of the project's codebase and release artifacts. The CI workflow updates dependencies, runs linting and static code analysis tools, and integrates automated vulnerability scanning using the Trivy tool. These practices help identify and address potential security issues early in the development process. The release workflow, on the other hand, focuses on ensuring the integrity and authenticity of the released artifacts by using Cosign for signing and generating a Software Bill of Materials (SBOM). Overall, these code changes demonstrate a strong commitment to security best practices, including keeping dependencies up-to-date, automating security checks, and implementing measures to ensure the trustworthiness of the project's releases. As an application security engineer, I would consider these changes to be a positive step towards improving the overall security posture of the project. **Files Changed:** 1. `.github/workflows/ci.yaml`: - Updates the versions of the `actions/checkout` and `actions/setup-go` actions used in the workflow. - Includes steps for running the `golangci-lint` and `staticcheck` tools for linting and static code analysis. - Integrates the Trivy vulnerability scanner to scan the codebase for known vulnerabilities. - Defines the necessary permissions for the GitHub Actions to perform various tasks, including writing to the repository's contents, security events, and (optionally) reading pull requests. 2. `.github/workflows/release.yaml`: - Updates the version of the `actions/checkout` GitHub Action. - Ensures the full Git history is checked out by setting the `fetch-depth: 0` parameter. - Sets the Go version to `1.22`. - Includes a step to run the project's tests and generate a code coverage report. - Installs the Cosign and Syft tools for signing the released artifacts and generating a Software Bill of Materials (SBOM). - Uses the `goreleaser/goreleaser-action` step to automate the release process, including building the project, creating release notes, and publishing the artifacts.

Code Analysis

We ran 9 analyzers against 2 files and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.