Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update sigstore/cosign-installer action to v3.1.2 #13

Merged
merged 1 commit into from
Sep 12, 2023

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Sep 1, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
sigstore/cosign-installer action patch v3.1.1 -> v3.1.2

Release Notes

sigstore/cosign-installer (sigstore/cosign-installer)

v3.1.2

Compare Source

What's Changed
New Contributors

Full Changelog: sigstore/cosign-installer@v3...v3.1.2


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

- uses: anchore/sbom-action/download-syft@78fc58e266e87a38d4194b2137a3d4e9bcaf7ca1 # v0.14.3

- name: Set Up Docker Buildx
uses: docker/setup-buildx-action@v2

- name: Set up Cosign
uses: sigstore/[email protected].1
uses: sigstore/[email protected].2

Check warning

Code scanning / Semgrep

Semgrep Finding: yaml.github-actions.security.third-party-action-not-pinned-to-commit-sha.third-party-action-not-pinned-to-commit-sha Warning

An action sourced from a third-party repository on GitHub is not pinned to a full length commit SHA. Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload.
@PatrickKoss PatrickKoss merged commit 4dc7f7d into main Sep 12, 2023
2 of 3 checks passed
@renovate renovate bot deleted the renovate/sigstore-cosign-installer-3.x branch September 12, 2023 07:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant