File tree Expand file tree Collapse file tree 3 files changed +7
-7
lines changed
Expand file tree Collapse file tree 3 files changed +7
-7
lines changed Original file line number Diff line number Diff line change 2525 uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # 6.0.2
2626 - name : Set up Docker Buildx
2727 id : buildx
28- uses : docker/setup-buildx-action@8d2750c68a42422c14e847fe6c8ac0403b4cbd6f # 3.12 .0
28+ uses : docker/setup-buildx-action@4d04d5d9486b7bd6fa91e7baf45bbb4f8b9deedd # 4.0 .0
2929 - name : Login to ghcr.io
30- uses : docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 # 3.7 .0
30+ uses : docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # 4.0 .0
3131 with :
3232 registry : ghcr.io
3333 username : ${{ github.actor }}
4848 - name : Push images
4949 run : ./build --push
5050 - name : Run Trivy vulnerability scanner
51- uses : aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
51+ uses : aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
5252 with :
5353 image-ref : ' ${{ steps.build.outputs.LATEST_IMAGE_TAG }}'
5454 format : ' sarif'
5959 TRIVY_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
6060 TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
6161 - name : Upload Trivy scan results to GitHub Security tab
62- uses : github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
62+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
6363 with :
6464 sarif_file : ' trivy-results.sarif'
Original file line number Diff line number Diff line change 1616 - name : Checkout repository
1717 uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # 6.0.2
1818 - name : Login to ghcr.io
19- uses : docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 # 3.7 .0
19+ uses : docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # 4.0 .0
2020 with :
2121 registry : ghcr.io
2222 username : ${{ github.actor }}
Original file line number Diff line number Diff line change 3030 docker-images : false # Do not remove locally built images (including trivy scanner)
3131
3232 - name : Run Trivy vulnerability scanner
33- uses : aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
33+ uses : aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
3434 with :
3535 image-ref : ' ghcr.io/datadog/dd-trace-java-docker-build:latest'
3636 format : ' sarif'
4242 TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
4343
4444 - name : Upload Trivy scan results to GitHub Security tab
45- uses : github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
45+ uses : github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
4646 if : always()
4747 with :
4848 sarif_file : ' trivy-results.sarif'
You can’t perform that action at this time.
0 commit comments