Skip to content
This repository was archived by the owner on Mar 10, 2025. It is now read-only.

Commit 9b23629

Browse files
authored
Merge pull request #42 from kube-logging/chore/bump-deps
chore: bump deps
2 parents 1d577ad + 172785e commit 9b23629

File tree

2 files changed

+12
-9
lines changed

2 files changed

+12
-9
lines changed

.github/workflows/artifacts.yaml

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ jobs:
1818

1919
steps:
2020
- name: Checkout
21-
uses: actions/checkout@v4
21+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2222

2323
- name: Gather metadata
2424
id: meta
25-
uses: docker/metadata-action@v5
25+
uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
2626
with:
2727
images: ghcr.io/${{ github.repository_owner }}/syslogng-reload
2828
flavor: |
@@ -34,23 +34,23 @@ jobs:
3434
type=raw,value=latest,enable=${{ github.ref == format('refs/heads/{0}', github.event.repository.default_branch) }}
3535
3636
- name: Set up QEMU
37-
uses: docker/setup-qemu-action@v3
37+
uses: docker/setup-qemu-action@53851d14592bedcffcf25ea515637cff71ef929a # v3.3.0
3838
with:
3939
platforms: all
4040

4141
- name: Set up Docker Buildx
42-
uses: docker/setup-buildx-action@v3
42+
uses: docker/setup-buildx-action@6524bf65af31da8d45b59e8c27de4bd072b392f5 # v3.8.0
4343

4444
- name: Login to GitHub Container Registry
45-
uses: docker/login-action@v3
45+
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
4646
with:
4747
registry: ghcr.io
4848
username: ${{ github.actor }}
4949
password: ${{ github.token }}
5050
if: github.event_name == 'push'
5151

5252
- name: Build and push
53-
uses: docker/build-push-action@v6
53+
uses: docker/build-push-action@ca877d9245402d1537745e0e356eab47c3520991 # v6.13.0
5454
with:
5555
context: .
5656
platforms: linux/amd64,linux/arm64,linux/arm/v7
@@ -61,15 +61,18 @@ jobs:
6161
labels: ${{ steps.meta.outputs.labels }}
6262

6363
- name: Run Trivy vulnerability scanner
64-
uses: aquasecurity/[email protected]
64+
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
65+
env:
66+
TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2
67+
TRIVY_JAVA_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-java-db:1
6568
with:
6669
image-ref: "ghcr.io/${{ github.repository_owner }}/syslogng-reload:${{ fromJSON(steps.meta.outputs.json).labels['org.opencontainers.image.version'] }}"
6770
format: "sarif"
6871
output: "trivy-results.sarif"
6972
if: github.event_name == 'push'
7073

7174
- name: Upload Trivy scan results to GitHub Security tab
72-
uses: github/codeql-action/upload-sarif@v3
75+
uses: github/codeql-action/upload-sarif@dd746615b3b9d728a6a37ca2045b68ca76d4841a # v3.28.8
7376
with:
7477
sarif_file: "trivy-results.sarif"
7578
if: github.event_name == 'push'

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
FROM ghcr.io/kube-logging/custom-runner:v0.10.0 as custom-runner
1+
FROM ghcr.io/kube-logging/custom-runner:v0.12.0 AS custom-runner
22

33
FROM alpine:3.21.2@sha256:56fa17d2a7e7f168a043a2712e63aed1f8543aeafdcee47c58dcffe38ed51099
44

0 commit comments

Comments
 (0)