-
Notifications
You must be signed in to change notification settings - Fork 79
fix: enable Docker Buildx to eliminate legacy builder deprecation warnings #461
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -36,7 +36,10 @@ | |
| - name: Setup Docker on macOS | ||
| if: matrix.os == 'macos-15-intel' | ||
| uses: douglascamata/[email protected] | ||
|
|
||
|
|
||
| - name: Set up Docker Buildx | ||
| uses: docker/setup-buildx-action@v3 | ||
|
Comment on lines
+40
to
+41
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. ❓ Verification inconclusiveAddress unpinned tag in docker/setup-buildx-action to meet supply chain security best practices. The CodeQL static analysis tool has flagged that Confirm whether this unpinned-tag pattern is accepted as part of your organization's GitHub Actions security policy. If stricter pinning is required, you can find the commit SHA for I'll verify the security claims in this review by searching for GitHub Actions best practices. Let me verify if there are any organizational security policies in the codebase that would clarify the context of this review. I've verified the review comment against current GitHub Actions security best practices and real-world data. Here are my findings: Key verification results: Although pinning to a commit SHA is the most secure option, version tags can be moved or deleted if a bad actor gains access to the repository storing the action. The review comment's claim about mutability is correct. The popular GitHub Action tj-actions/changed-files was compromised in March 2025, with all tags tampered to point to a revision with malicious code. This demonstrates the real-world risk is not theoretical. GitHub recommends that workflows pin dependency versions to a specific commit SHA to prevent malicious code added to a new or updated branch or tag from being automatically used. Docker's Address unpinned tag in docker/setup-buildx-action to meet supply chain security best practices. Pinning an action to a full-length commit SHA is currently the only way to use an action as an immutable release. Update line 41 from 🏁 Script executed: #!/bin/bash
# Search for security policy files or documentation
fd -i 'security\|policy\|codeql' --type f -e md -e yml -e yaml -e txtLength of output: 0 Pin docker/setup-buildx-action to a commit SHA instead of the v3 version tag. Version tags like 🧰 Tools🪛 GitHub Check: CodeQL[warning] 41-41: Unpinned tag for a non-immutable Action in workflow 🤖 Prompt for AI Agents |
||
|
|
||
| - name: Build an image from ${{ matrix.dockerfile }} | ||
| run: | | ||
| docker build -f ${{ matrix.dockerfile }} -t liquibase/liquibase:${{ github.sha }} . | ||
|
|
||
Check warning
Code scanning / CodeQL
Unpinned tag for a non-immutable Action in workflow Medium test