3030 ${{ runner.os }}-gradle-
3131
3232 - name : Initialize CodeQL
33- uses : github/codeql-action/init@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
33+ uses : github/codeql-action/init@c793b717bc78562f491db7b0e93a3a178b099162 # v4.32.5
3434 with :
3535 languages : ' java'
3636 build-mode : ' manual'
@@ -39,17 +39,11 @@ jobs:
3939 env :
4040 ORG_GRADLE_PROJECT_akkaRepositoryToken : ${{ secrets.AKKA_REPO_TOKEN }}
4141 run : |
42- GRADLE_OPTS="-Dorg.gradle.jvmargs='-Xmx3G -Xms2G'" \
43- JAVA_HOME=$JAVA_HOME_8_X64 \
44- JAVA_8_HOME=$JAVA_HOME_8_X64 \
45- JAVA_11_HOME=$JAVA_HOME_11_X64 \
46- JAVA_17_HOME=$JAVA_HOME_17_X64 \
47- JAVA_21_HOME=$JAVA_HOME_21_X64 \
48- ./gradlew clean :dd-java-agent:shadowJar \
49- --build-cache --parallel --stacktrace --no-daemon --max-workers=4
42+ GRADLE_OPTS="-Dorg.gradle.jvmargs='-Xms2G -Xmx3G'" \
43+ ./gradlew clean :dd-java-agent:shadowJar --build-cache --parallel --stacktrace --no-daemon --max-workers=4
5044
5145 - name : Perform CodeQL Analysis and upload results to GitHub Security tab
52- uses : github/codeql-action/analyze@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
46+ uses : github/codeql-action/analyze@c793b717bc78562f491db7b0e93a3a178b099162 # v4.32.5
5347
5448 trivy :
5549 name : Analyze changes with Trivy
8579 env :
8680 ORG_GRADLE_PROJECT_akkaRepositoryToken : ${{ secrets.AKKA_REPO_TOKEN }}
8781 run : |
88- GRADLE_OPTS="-Dorg.gradle.jvmargs='-Xmx3G -Xms2G'" \
89- JAVA_HOME=$JAVA_HOME_8_X64 \
90- JAVA_8_HOME=$JAVA_HOME_8_X64 \
91- JAVA_11_HOME=$JAVA_HOME_11_X64 \
92- JAVA_17_HOME=$JAVA_HOME_17_X64 \
93- JAVA_21_HOME=$JAVA_HOME_21_X64 \
94- ./gradlew clean publishToMavenLocal \
95- --build-cache --parallel --stacktrace --no-daemon --max-workers=4
82+ GRADLE_OPTS="-Dorg.gradle.jvmargs='-Xms2G -Xmx3G'" \
83+ ./gradlew clean publishToMavenLocal --build-cache --parallel --stacktrace --no-daemon --max-workers=4
9684
9785 - name : Copy published artifacts
9886 run : |
10189 ls -laR "./workspace/.trivy"
10290
10391 - name : Run Trivy security scanner
104- uses : aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
92+ uses : aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # v0.34.2
10593 with :
10694 scan-type : rootfs
10795 scan-ref : ' ./workspace/.trivy/'
@@ -114,7 +102,7 @@ jobs:
114102 TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
115103
116104 - name : Upload Trivy scan results to GitHub Security tab
117- uses : github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v4.32.4
105+ uses : github/codeql-action/upload-sarif@c793b717bc78562f491db7b0e93a3a178b099162 # v4.32.5
118106 if : always()
119107 with :
120108 sarif_file : ' trivy-results.sarif'
0 commit comments