Skip to content

Commit 3d5f715

Browse files
chore(deps): update all non-major github action dependencies
1 parent 431a8db commit 3d5f715

5 files changed

Lines changed: 6 additions & 6 deletions

File tree

.github/workflows/code-scanning.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ jobs:
1616
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
1717

1818
- name: Initialize CodeQL
19-
uses: github/codeql-action/init@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
19+
uses: github/codeql-action/init@76621b61decf072c1cee8dd1ce2d2a82d33c17ed # v3.29.8
2020
with:
2121
languages: python
2222
config-file: .github/codeql/codeql-config.yml
2323

2424
- name: Perform CodeQL Analysis
25-
uses: github/codeql-action/analyze@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
25+
uses: github/codeql-action/analyze@76621b61decf072c1cee8dd1ce2d2a82d33c17ed # v3.29.8

.github/workflows/docker-build-push-production.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ jobs:
4949
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
5050

5151
- name: Configure AWS credentials using OIDC
52-
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
52+
uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
5353
with:
5454
role-to-assume: arn:aws:iam::283582579564:role/github-secret-scanning-apply
5555
role-session-name: ECRPush

.github/workflows/docker-vulnerability-scan.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2828

2929
- name: Configure AWS credentials using OIDC
30-
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
30+
uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
3131
with:
3232
role-to-assume: arn:aws:iam::283582579564:role/github-secret-scanning-plan
3333
role-session-name: ECRPull

.github/workflows/tf_apply_production.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ jobs:
3737
uses: cds-snc/terraform-tools-setup@v1
3838

3939
- name: Configure aws credentials using OIDC
40-
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
40+
uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
4141
with:
4242
role-to-assume: arn:aws:iam::283582579564:role/github-secret-scanning-apply
4343
role-session-name: TFApply

.github/workflows/tf_plan_production.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ jobs:
4848
uses: cds-snc/terraform-tools-setup@v1
4949

5050
- name: Configure aws credentials using OIDC
51-
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
51+
uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
5252
with:
5353
role-to-assume: arn:aws:iam::283582579564:role/github-secret-scanning-plan
5454
role-session-name: TFPlan

0 commit comments

Comments
 (0)