Skip to content

Commit 0a4d0a3

Browse files
authored
Merge pull request #141 from DataDog/dependabot/github_actions/gh-actions-packages-af76ad6d86
chore(deps): bump the gh-actions-packages group across 1 directory with 4 updates
2 parents ed5926e + 9f9918f commit 0a4d0a3

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

.github/workflows/ci.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ jobs:
2525
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # 6.0.2
2626
- name: Set up Docker Buildx
2727
id: buildx
28-
uses: docker/setup-buildx-action@8d2750c68a42422c14e847fe6c8ac0403b4cbd6f # 3.12.0
28+
uses: docker/setup-buildx-action@4d04d5d9486b7bd6fa91e7baf45bbb4f8b9deedd # 4.0.0
2929
- name: Login to ghcr.io
30-
uses: docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 # 3.7.0
30+
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # 4.0.0
3131
with:
3232
registry: ghcr.io
3333
username: ${{ github.actor }}
@@ -48,7 +48,7 @@ jobs:
4848
- name: Push images
4949
run: ./build --push
5050
- name: Run Trivy vulnerability scanner
51-
uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
51+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
5252
with:
5353
image-ref: '${{ steps.build.outputs.LATEST_IMAGE_TAG }}'
5454
format: 'sarif'
@@ -59,6 +59,6 @@ jobs:
5959
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
6060
TRIVY_JAVA_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
6161
- name: Upload Trivy scan results to GitHub Security tab
62-
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
62+
uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
6363
with:
6464
sarif_file: 'trivy-results.sarif'

.github/workflows/docker-tag.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ jobs:
1616
- name: Checkout repository
1717
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # 6.0.2
1818
- name: Login to ghcr.io
19-
uses: docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 # 3.7.0
19+
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # 4.0.0
2020
with:
2121
registry: ghcr.io
2222
username: ${{ github.actor }}

.github/workflows/vuln-check.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ jobs:
3030
docker-images: false # Do not remove locally built images (including trivy scanner)
3131

3232
- name: Run Trivy vulnerability scanner
33-
uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
33+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
3434
with:
3535
image-ref: 'ghcr.io/datadog/dd-trace-java-docker-build:latest'
3636
format: 'sarif'
@@ -42,7 +42,7 @@ jobs:
4242
TRIVY_JAVA_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
4343

4444
- name: Upload Trivy scan results to GitHub Security tab
45-
uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
45+
uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v4.32.6
4646
if: always()
4747
with:
4848
sarif_file: 'trivy-results.sarif'

0 commit comments

Comments
 (0)