Skip to content

Commit 2234c29

Browse files
appleboyclaude
andcommitted
ci(workflows): upgrade all GitHub Actions to latest versions
- Upgrade goreleaser-action from v6 to v7 - Upgrade docker actions (setup-qemu v4, setup-buildx v4, login v4, metadata v6, build-push v7) - Upgrade codeql-action from v3 to v4 - Upgrade trivy-action from 0.33.1 to 0.35.0 - Upgrade hadolint-action from v3.1.0 to v3.3.0 Co-Authored-By: Claude Opus 4.6 <[email protected]>
1 parent d3ed833 commit 2234c29

5 files changed

Lines changed: 17 additions & 17 deletions

File tree

.github/workflows/codeql.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ jobs:
4141

4242
# Initializes the CodeQL tools for scanning.
4343
- name: Initialize CodeQL
44-
uses: github/codeql-action/init@v3
44+
uses: github/codeql-action/init@v4
4545
with:
4646
languages: ${{ matrix.language }}
4747
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -50,4 +50,4 @@ jobs:
5050
# queries: ./path/to/local/query, your-org/your-repo/queries@main
5151

5252
- name: Perform CodeQL Analysis
53-
uses: github/codeql-action/analyze@v3
53+
uses: github/codeql-action/analyze@v4

.github/workflows/docker.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,29 +31,29 @@ jobs:
3131
make build_linux_arm
3232
make build_linux_arm64
3333
- name: Set up QEMU
34-
uses: docker/setup-qemu-action@v3
34+
uses: docker/setup-qemu-action@v4
3535

3636
- name: Set up Docker Buildx
37-
uses: docker/setup-buildx-action@v3
37+
uses: docker/setup-buildx-action@v4
3838

3939
- name: Login to Docker Hub
4040
if: github.event_name != 'pull_request'
41-
uses: docker/login-action@v3
41+
uses: docker/login-action@v4
4242
with:
4343
username: ${{ secrets.DOCKERHUB_USERNAME }}
4444
password: ${{ secrets.DOCKERHUB_TOKEN }}
4545

4646
- name: Login to GitHub Container Registry
4747
if: github.event_name != 'pull_request'
48-
uses: docker/login-action@v3
48+
uses: docker/login-action@v4
4949
with:
5050
registry: ghcr.io
5151
username: ${{ github.repository_owner }}
5252
password: ${{ secrets.GITHUB_TOKEN }}
5353

5454
- name: Docker meta
5555
id: docker-meta
56-
uses: docker/metadata-action@v5
56+
uses: docker/metadata-action@v6
5757
with:
5858
images: |
5959
${{ github.repository }}
@@ -65,7 +65,7 @@ jobs:
6565
type=semver,pattern={{major}}
6666
6767
- name: Build and push
68-
uses: docker/build-push-action@v5
68+
uses: docker/build-push-action@v7
6969
with:
7070
context: .
7171
platforms: linux/amd64,linux/arm,linux/arm64

.github/workflows/goreleaser.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ jobs:
2323
go-version-file: go.mod
2424
check-latest: true
2525
- name: Run GoReleaser
26-
uses: goreleaser/goreleaser-action@v6
26+
uses: goreleaser/goreleaser-action@v7
2727
with:
2828
# either 'goreleaser' (default) or 'goreleaser-pro'
2929
distribution: goreleaser

.github/workflows/testing.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ jobs:
2222
version: v2.7
2323
args: --verbose
2424

25-
- uses: hadolint/hadolint-action@v3.1.0
25+
- uses: hadolint/hadolint-action@v3.3.0
2626
name: hadolint for Dockerfile
2727
with:
2828
dockerfile: docker/Dockerfile

.github/workflows/trivy-scan.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ jobs:
2323
fetch-depth: 0
2424

2525
- name: Run Trivy vulnerability scanner in repo mode
26-
uses: aquasecurity/trivy-action@0.33.1
26+
uses: aquasecurity/trivy-action@0.35.0
2727
with:
2828
scan-type: 'fs'
2929
ignore-unfixed: true
@@ -41,20 +41,20 @@ jobs:
4141
uses: actions/checkout@v6
4242

4343
- name: Run Trivy vulnerability scanner (Docker Hub)
44-
uses: aquasecurity/trivy-action@0.33.1
44+
uses: aquasecurity/trivy-action@0.35.0
4545
with:
4646
image-ref: 'appleboy/gorush:latest'
4747
format: 'sarif'
4848
output: 'trivy-dockerhub-results.sarif'
4949

5050
- name: Upload Trivy scan results to GitHub Security tab (Docker Hub)
51-
uses: github/codeql-action/upload-sarif@v3
51+
uses: github/codeql-action/upload-sarif@v4
5252
if: always()
5353
with:
5454
sarif_file: 'trivy-dockerhub-results.sarif'
5555

5656
- name: Run Trivy vulnerability scanner (Docker Hub Table format)
57-
uses: aquasecurity/trivy-action@0.33.1
57+
uses: aquasecurity/trivy-action@0.35.0
5858
with:
5959
image-ref: 'appleboy/gorush:latest'
6060
format: 'table'
@@ -73,20 +73,20 @@ jobs:
7373
uses: actions/checkout@v6
7474

7575
- name: Run Trivy vulnerability scanner (GHCR)
76-
uses: aquasecurity/trivy-action@0.33.1
76+
uses: aquasecurity/trivy-action@0.35.0
7777
with:
7878
image-ref: 'ghcr.io/appleboy/gorush:latest'
7979
format: 'sarif'
8080
output: 'trivy-ghcr-results.sarif'
8181

8282
- name: Upload Trivy scan results to GitHub Security tab (GHCR)
83-
uses: github/codeql-action/upload-sarif@v3
83+
uses: github/codeql-action/upload-sarif@v4
8484
if: always()
8585
with:
8686
sarif_file: 'trivy-ghcr-results.sarif'
8787

8888
- name: Run Trivy vulnerability scanner (GHCR Table format)
89-
uses: aquasecurity/trivy-action@0.33.1
89+
uses: aquasecurity/trivy-action@0.35.0
9090
with:
9191
image-ref: 'ghcr.io/appleboy/gorush:latest'
9292
format: 'table'

0 commit comments

Comments
 (0)