@@ -51,31 +51,31 @@ jobs:
5151
5252 steps :
5353 - name : Checkout repository
54- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2 .2
54+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0 .2
5555
5656 - name : Set up QEMU
57- uses : docker/setup-qemu-action@4574d27a4764455b42196d70a065bc6853246a25 # v3.4 .0
57+ uses : docker/setup-qemu-action@c7c53464625b32c7a7e944ae62b3e17d2b600130 # v3.7 .0
5858
5959 - name : Set up Docker Buildx
60- uses : docker/setup-buildx-action@f7ce87c1d6bead3e36075b2ce75da1f6cc28aaca # v3.9 .0
60+ uses : docker/setup-buildx-action@8d2750c68a42422c14e847fe6c8ac0403b4cbd6f # v3.12 .0
6161
6262 - name : Set up Syft
63- uses : anchore/sbom-action/download-syft@f325610c9f50a54015d37c8d16cb3b0e2c8f4de0 # v0.18 .0
63+ uses : anchore/sbom-action/download-syft@62ad5284b8ced813296287a0b63906cb364b73ee # v0.22 .0
6464
6565 - name : Install cosign
66- uses : sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1
66+ uses : sigstore/cosign-installer@faadad0cce49287aee09b3a48701e75088a2c6ad # v4.0.0
6767
6868 - name : Set image name
6969 id : image-name
7070 run : echo "value=ghcr.io/${{ github.repository }}" >> "$GITHUB_OUTPUT"
7171
7272 - name : Gather build metadata
7373 id : meta
74- uses : docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
74+ uses : docker/metadata-action@c299e40c65443455700f0fdfc63efafe5b349051 # v5.10.0
7575 with :
7676 images : |
7777 ${{ steps.image-name.outputs.value }}
78- dexidp/dex
78+ ${{ github.repository == ' dexidp/dex' && 'dexidp/dex' || '' }}
7979 flavor : |
8080 latest = false
8181 tags : |
@@ -101,23 +101,23 @@ jobs:
101101 if_false : type=oci,dest=image.tar
102102
103103 - name : Login to GitHub Container Registry
104- uses : docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3 .0
104+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
105105 with :
106106 registry : ghcr.io
107107 username : ${{ github.actor }}
108108 password : ${{ github.token }}
109109 if : inputs.publish
110110
111111 - name : Login to Docker Hub
112- uses : docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3 .0
112+ uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6 .0
113113 with :
114114 username : ${{ secrets.DOCKER_USERNAME }}
115115 password : ${{ secrets.DOCKER_PASSWORD }}
116116 if : inputs.publish
117117
118118 - name : Build and push image
119119 id : build
120- uses : docker/build-push-action@0adf9959216b96bec444f325f1e493d4aa344497 # v6.14 .0
120+ uses : docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18 .0
121121 with :
122122 context : .
123123 platforms : linux/amd64,linux/arm/v7,linux/arm64,linux/ppc64le,linux/s390x
@@ -177,16 +177,16 @@ jobs:
177177
178178 # TODO: uncomment when the action is working for non ghcr.io pushes. GH Issue: https://github.com/actions/attest-build-provenance/issues/80
179179 # - name: Generate build provenance attestation
180- # uses: actions/attest-build-provenance@520d128f165991a6c774bcb264f323e3d70747f4 # v2.2 .0
180+ # uses: actions/attest-build-provenance@00014ed6ed5efc5b1ab7f7f34a39eb55d41aa4f8 # v3.1 .0
181181 # with:
182182 # subject-name: dexidp/dex
183183 # subject-digest: ${{ steps.build.outputs.digest }}
184184 # push-to-registry: true
185185
186186 - name : Generate build provenance attestation
187- uses : actions/attest-build-provenance@520d128f165991a6c774bcb264f323e3d70747f4 # v2.2 .0
187+ uses : actions/attest-build-provenance@00014ed6ed5efc5b1ab7f7f34a39eb55d41aa4f8 # v3.1 .0
188188 with :
189- subject-name : ghcr.io/dexidp/dex
189+ subject-name : ghcr.io/${{ github.repository }}
190190 subject-digest : ${{ steps.build.outputs.digest }}
191191 push-to-registry : true
192192 if : inputs.publish
@@ -198,14 +198,14 @@ jobs:
198198 run : echo "date=$(date +%Y-%m-%d)" >> $GITHUB_OUTPUT
199199
200200 - name : Restore trivy cache
201- uses : actions/cache@0c907a75c2c80ebcb7f088228285e798b750cf8f # v4.2.1
201+ uses : actions/cache@8b402f58fbc84540c8b491a91e594a4576fec3d7 # v5.0.2
202202 with :
203203 path : cache/db
204204 key : trivy-cache-${{ steps.date.outputs.date }}
205205 restore-keys : trivy-cache-
206206
207207 - name : Run Trivy vulnerability scanner
208- uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
208+ uses : aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
209209 with :
210210 input : image
211211 format : sarif
@@ -225,14 +225,14 @@ jobs:
225225 run : sudo chmod 0644 ./cache/db/trivy.db
226226
227227 - name : Upload Trivy scan results as artifact
228- uses : actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6 .0
228+ uses : actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0 .0
229229 with :
230230 name : " [${{ github.job }}] Trivy scan results"
231231 path : trivy-results.sarif
232232 retention-days : 5
233233 overwrite : true
234234
235235 - name : Upload Trivy scan results to GitHub Security tab
236- uses : github/codeql-action/upload-sarif@6bb031afdd8eb862ea3fc1848194185e076637e5 # v3.28.11
236+ uses : github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v3.29.5
237237 with :
238238 sarif_file : trivy-results.sarif
0 commit comments