@@ -49,13 +49,15 @@ jobs:
4949
5050 steps :
5151 - name : Checkout repository
52- uses : actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
52+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
5353
5454 - name : Set up QEMU
55- uses : docker/setup-qemu-action@2b82ce82d56a2a04d2637cd93a637ae1b359c0a7 # v2.2.0
55+ uses : docker/setup-qemu-action@4574d27a4764455b42196d70a065bc6853246a25 # v3.4.0
56+
5657
5758 - name : Set up Docker Buildx
58- uses : docker/setup-buildx-action@4c0219f9ac95b02789c1075625400b2acbff50b1 # v2.9.1
59+ uses : docker/setup-buildx-action@f7ce87c1d6bead3e36075b2ce75da1f6cc28aaca # v3.9.0
60+
5961
6062 - name : Set image name
6163 id : image-name
@@ -77,15 +79,16 @@ jobs:
7779 # Multiple exporters are not supported yet
7880 # See https://github.com/moby/buildkit/pull/2760
7981 - name : Determine build output
80- uses : haya14busa/action-cond@1d6e8a12b20cdb4f1954feef9aa475b9c390cab5 # v1.1 .1
82+ uses : haya14busa/action-cond@94f77f7a80cd666cb3155084e428254fea4281fd # v1.2 .1
8183 id : build-output
8284 with :
8385 cond : ${{ inputs.publish }}
8486 if_true : type=image,push=true
8587 if_false : type=oci,dest=image.tar
8688
8789 - name : Login to GitHub Container Registry
88- uses : docker/login-action@465a07811f14bebb1938fbed4728c6a1ff8901fc # v2.2.0
90+ uses : docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
91+
8992 with :
9093 registry : ghcr.io
9194 username : ${{ github.actor }}
9497
9598 - name : Build and push image
9699 id : build
97- uses : docker/build-push-action@2eb1c1961a95fc15694676618e422e8ba1d63825 # v4.1.1
100+ uses : docker/build-push-action@ca877d9245402d1537745e0e356eab47c3520991 # v6.13.0
98101 with :
99102 context : .
100103 platforms : linux/amd64,linux/arm64,linux/arm/v7
@@ -119,20 +122,20 @@ jobs:
119122 tar -xf image.tar -C image
120123
121124 - name : Run Trivy vulnerability scanner
122- uses : aquasecurity/trivy-action@41f05d9ecffa2ed3f1580af306000f734b733e54 # 0.11.2
125+ uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
123126 with :
124127 input : image
125128 format : sarif
126129 output : trivy-results.sarif
127130
128131 - name : Upload Trivy scan results as artifact
129- uses : actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # v3.1.2
132+ uses : actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
130133 with :
131134 name : " [${{ github.job }}] Trivy scan results"
132135 path : trivy-results.sarif
133136 retention-days : 5
134137
135138 - name : Upload Trivy scan results to GitHub Security tab
136- uses : github/codeql-action/upload-sarif@1813ca74c3faaa3a2da2070b9b8a0b3e7373a0d8 # v2.21.0
139+ uses : github/codeql-action/upload-sarif@9e8d0789d4a0fa9ceb6b1738f7e269594bdd67f0 # v3.28.9
137140 with :
138141 sarif_file : trivy-results.sarif
0 commit comments