File tree Expand file tree Collapse file tree 4 files changed +10
-10
lines changed
Expand file tree Collapse file tree 4 files changed +10
-10
lines changed Original file line number Diff line number Diff line change @@ -20,12 +20,12 @@ jobs:
2020 runs-on : ubuntu-latest
2121 steps :
2222 - name : Checkout repository
23- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # 4.2.2
23+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # 5.0.0
2424 - name : Set up Docker Buildx
2525 id : buildx
2626 uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # 3.11.1
2727 - name : Login to ghcr.io
28- uses : docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # 3.4 .0
28+ uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # 3.5 .0
2929 with :
3030 registry : ghcr.io
3131 username : ${{ github.actor }}
4444 - name : Push images
4545 run : ./build --push
4646 - name : Run Trivy vulnerability scanner
47- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # v0.32.0
47+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1
4848 with :
4949 image-ref : ' ${{ steps.build.outputs.LATEST_IMAGE_TAG }}'
5050 format : ' sarif'
5555 TRIVY_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
5656 TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
5757 - name : Upload Trivy scan results to GitHub Security tab
58- uses : github/codeql-action/upload-sarif@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
58+ uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3.30.1
5959 with :
6060 sarif_file : ' trivy-results.sarif'
Original file line number Diff line number Diff line change 1414 packages : write
1515 steps :
1616 - name : Checkout repository
17- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # 4.2.2
17+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # 5.0.0
1818 - name : Login to ghcr.io
19- uses : docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # 3.4 .0
19+ uses : docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # 3.5 .0
2020 with :
2121 registry : ghcr.io
2222 username : ${{ github.actor }}
Original file line number Diff line number Diff line change 1717 contents : write # Required to push changes to the repository
1818 steps :
1919 - name : Checkout repository
20- uses : actions/checkout@v4
20+ uses : actions/checkout@v5
2121
2222 - name : Set up Git
2323 run : |
Original file line number Diff line number Diff line change @@ -22,15 +22,15 @@ jobs:
2222 runs-on : ubuntu-latest
2323 steps :
2424 - name : Checkout code
25- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
25+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
2626
2727 - name : Free Disk Space (Ubuntu) # Reclaim disk space for scan
2828 uses : jlumbroso/free-disk-space@54081f138730dfa15788a46383842cd2f914a1be # v1.3.1
2929 with :
3030 docker-images : false # Do not remove locally built images (including trivy scanner)
3131
3232 - name : Run Trivy vulnerability scanner
33- uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # v0.32.0
33+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1
3434 with :
3535 image-ref : ' ghcr.io/datadog/dd-trace-java-docker-build:latest'
3636 format : ' sarif'
4242 TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
4343
4444 - name : Upload Trivy scan results to GitHub Security tab
45- uses : github/codeql-action/upload-sarif@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
45+ uses : github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3.30.1
4646 if : always()
4747 with :
4848 sarif_file : ' trivy-results.sarif'
You can’t perform that action at this time.
0 commit comments