Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update docker/build-push-action action from v6.13.0 to v6.14.0 (.github/workflows/release-x-manual-docker-containers.yml) #11855

Merged
merged 1 commit into from
Feb 19, 2025

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 19, 2025

This PR contains the following updates:

Package Type Update Change
docker/build-push-action action minor v6.13.0 -> v6.14.0

Release Notes

docker/build-push-action (docker/build-push-action)

v6.14.0

Compare Source

Full Changelog: docker/build-push-action@v6.13.0...v6.14.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

…6.14.0 (.github/workflows/release-x-manual-docker-containers.yml)
@renovate renovate bot added the dependencies Pull requests that update a dependency file label Feb 19, 2025
Copy link

DryRun Security Summary

The PR upgrades Docker build-push-action from v6.13.0 to v6.14.0 in GitHub Actions workflows while identifying several security concerns including use of 'latest' tag, lack of input validation, disabled build checks, exposed debug information, and pinned action versions.

Expand for full summary

The PR updates two GitHub Actions workflow files, upgrading Docker build-push-action from v6.13.0 to v6.14.0 for DefectDojo Docker container builds. Security findings include:

  1. Potential security risk with 'latest' Docker tag in release workflow
  2. No explicit input validation for release version input
  3. DOCKER_BUILD_CHECKS_ANNOTATIONS set to false, potentially disabling build-time checks
  4. Debug flags in buildkitd might expose additional information
  5. Workflow uses pinned GitHub Actions versions, which is a security consideration

Code Analysis

We ran 9 analyzers against 2 files and 0 analyzers had findings. 9 analyzers had no findings.

View PR in the DryRun Dashboard.

Copy link
Contributor

@mtesauro mtesauro left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved

@mtesauro mtesauro merged commit 7d7b21b into dev Feb 19, 2025
73 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants