@@ -49,21 +49,21 @@ jobs:
49
49
50
50
steps :
51
51
- name : Checkout repository
52
- uses : actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
52
+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
53
53
54
54
- name : Set up QEMU
55
- uses : docker/setup-qemu-action@2b82ce82d56a2a04d2637cd93a637ae1b359c0a7 # v2.2 .0
55
+ uses : docker/setup-qemu-action@53851d14592bedcffcf25ea515637cff71ef929a # v3.3 .0
56
56
57
57
- name : Set up Docker Buildx
58
- uses : docker/setup-buildx-action@4c0219f9ac95b02789c1075625400b2acbff50b1 # v2.9.1
58
+ uses : docker/setup-buildx-action@6524bf65af31da8d45b59e8c27de4bd072b392f5 # v3.8.0
59
59
60
60
- name : Set image name
61
61
id : image-name
62
62
run : echo "value=ghcr.io/${{ github.repository }}" >> "$GITHUB_OUTPUT"
63
63
64
64
- name : Gather build metadata
65
65
id : meta
66
- uses : docker/metadata-action@818d4b7b91585d195f67373fd9cb0332e31a7175 # v4 .6.0
66
+ uses : docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5 .6.1
67
67
with :
68
68
images : ${{ steps.image-name.outputs.value }}
69
69
flavor : |
@@ -75,15 +75,15 @@ jobs:
75
75
# Multiple exporters are not supported yet
76
76
# See https://github.com/moby/buildkit/pull/2760
77
77
- name : Determine build output
78
- uses : haya14busa/action-cond@1d6e8a12b20cdb4f1954feef9aa475b9c390cab5 # v1.1 .1
78
+ uses : haya14busa/action-cond@94f77f7a80cd666cb3155084e428254fea4281fd # v1.2 .1
79
79
id : build-output
80
80
with :
81
81
cond : ${{ inputs.publish }}
82
82
if_true : type=image,push=true
83
83
if_false : type=oci,dest=image.tar
84
84
85
85
- name : Login to GitHub Container Registry
86
- uses : docker/login-action@465a07811f14bebb1938fbed4728c6a1ff8901fc # v2.2 .0
86
+ uses : docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3 .0
87
87
with :
88
88
registry : ghcr.io
89
89
username : ${{ github.actor }}
92
92
93
93
- name : Build and push image
94
94
id : build
95
- uses : docker/build-push-action@2eb1c1961a95fc15694676618e422e8ba1d63825 # v4.1.1
95
+ uses : docker/build-push-action@ca877d9245402d1537745e0e356eab47c3520991 # v6.13.0
96
96
with :
97
97
context : .
98
98
platforms : linux/amd64,linux/arm64
@@ -116,21 +116,23 @@ jobs:
116
116
tar -xf image.tar -C image
117
117
118
118
- name : Run Trivy vulnerability scanner
119
- uses : aquasecurity/trivy-action@41f05d9ecffa2ed3f1580af306000f734b733e54 # 0.11.2
119
+ uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
120
+ env :
121
+ TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
122
+ TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
120
123
with :
121
124
input : image
122
125
format : sarif
123
126
output : trivy-results.sarif
124
127
125
128
- name : Upload Trivy scan results as artifact
126
- uses : actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # v3.1.2
129
+ uses : actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
127
130
with :
128
131
name : " [${{ github.job }}] Trivy scan results"
129
132
path : trivy-results.sarif
130
133
retention-days : 5
131
134
132
135
- name : Upload Trivy scan results to GitHub Security tab
133
- uses : github/codeql-action/upload-sarif@1813ca74c3faaa3a2da2070b9b8a0b3e7373a0d8 # v2.21.0
136
+ uses : github/codeql-action/upload-sarif@dd746615b3b9d728a6a37ca2045b68ca76d4841a # v3.28.8
134
137
with :
135
138
sarif_file : trivy-results.sarif
136
-
0 commit comments