File tree Expand file tree Collapse file tree 4 files changed +10
-10
lines changed Expand file tree Collapse file tree 4 files changed +10
-10
lines changed Original file line number Diff line number Diff line change @@ -20,12 +20,12 @@ jobs:
20
20
runs-on : ubuntu-latest
21
21
steps :
22
22
- name : Checkout repository
23
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # 4.2.2
23
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # 5.0.0
24
24
- name : Set up Docker Buildx
25
25
id : buildx
26
26
uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # 3.11.1
27
27
- name : Login to ghcr.io
28
- uses : docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # 3.4 .0
28
+ uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # 3.5 .0
29
29
with :
30
30
registry : ghcr.io
31
31
username : ${{ github.actor }}
44
44
- name : Push images
45
45
run : ./build --push
46
46
- name : Run Trivy vulnerability scanner
47
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # v0.32.0
47
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1
48
48
with :
49
49
image-ref : ' ${{ steps.build.outputs.LATEST_IMAGE_TAG }}'
50
50
format : ' sarif'
55
55
TRIVY_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
56
56
TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
57
57
- name : Upload Trivy scan results to GitHub Security tab
58
- uses : github/codeql-action/upload-sarif@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
58
+ uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3.30.1
59
59
with :
60
60
sarif_file : ' trivy-results.sarif'
Original file line number Diff line number Diff line change 14
14
packages : write
15
15
steps :
16
16
- name : Checkout repository
17
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # 4.2.2
17
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # 5.0.0
18
18
- name : Login to ghcr.io
19
- uses : docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # 3.4 .0
19
+ uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # 3.5 .0
20
20
with :
21
21
registry : ghcr.io
22
22
username : ${{ github.actor }}
Original file line number Diff line number Diff line change 17
17
contents : write # Required to push changes to the repository
18
18
steps :
19
19
- name : Checkout repository
20
- uses : actions/checkout@v4
20
+ uses : actions/checkout@v5
21
21
22
22
- name : Set up Git
23
23
run : |
Original file line number Diff line number Diff line change @@ -22,15 +22,15 @@ jobs:
22
22
runs-on : ubuntu-latest
23
23
steps :
24
24
- name : Checkout code
25
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
25
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
26
26
27
27
- name : Free Disk Space (Ubuntu) # Reclaim disk space for scan
28
28
uses : jlumbroso/free-disk-space@54081f138730dfa15788a46383842cd2f914a1be # v1.3.1
29
29
with :
30
30
docker-images : false # Do not remove locally built images (including trivy scanner)
31
31
32
32
- name : Run Trivy vulnerability scanner
33
- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # v0.32.0
33
+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1
34
34
with :
35
35
image-ref : ' ghcr.io/datadog/dd-trace-java-docker-build:latest'
36
36
format : ' sarif'
42
42
TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
43
43
44
44
- name : Upload Trivy scan results to GitHub Security tab
45
- uses : github/codeql-action/upload-sarif@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
45
+ uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3.30.1
46
46
if : always()
47
47
with :
48
48
sarif_file : ' trivy-results.sarif'
You can’t perform that action at this time.
0 commit comments