24
24
# Run the static analysis on the staging environment to benefit from the new features not yet released
25
25
- name : Check code meets quality standards (staging)
26
26
id : datadog-static-analysis-staging
27
- uses : DataDog/datadog-static-analyzer-github-action@1297a546e6bb268e2ac5bc98a1477d22be335822 # v1
27
+ uses : DataDog/datadog-static-analyzer-github-action@2707598b1182dce1d1792186477b5b4132338e1c # v1
28
28
with :
29
29
dd_app_key : ${{ secrets.DATADOG_APP_KEY_STAGING }}
30
30
dd_api_key : ${{ secrets.DATADOG_API_KEY_STAGING }}
49
49
submodules : ' recursive'
50
50
51
51
- name : Cache Gradle dependencies
52
- uses : actions/cache@d4323d4df104b026a6aa633fdb11d772146be0bf # v4.2.2
52
+ uses : actions/cache@5a3ec84eff668545956fd18022155c47e93e2684 # v4.2.3
53
53
with :
54
54
path : |
55
55
~/.gradle/caches
59
59
${{ runner.os }}-gradle-
60
60
61
61
- name : Initialize CodeQL
62
- uses : github/codeql-action/init@b56ba49b26e50535fa1e7f7db0f4f7b4bf65d80d # v3.28.10
62
+ uses : github/codeql-action/init@1b549b9259bda1cb5ddde3b41741a82a2d15a841 # v3.28.13
63
63
with :
64
64
languages : ' java'
65
65
build-mode : ' manual'
76
76
--build-cache --parallel --stacktrace --no-daemon --max-workers=4
77
77
78
78
- name : Perform CodeQL Analysis and upload results to GitHub Security tab
79
- uses : github/codeql-action/analyze@b56ba49b26e50535fa1e7f7db0f4f7b4bf65d80d # v3.28.10
79
+ uses : github/codeql-action/analyze@1b549b9259bda1cb5ddde3b41741a82a2d15a841 # v3.28.13
80
80
81
81
# For now, CodeQL SARIF results are not supported by Datadog CI
82
82
# - name: Upload results to Datadog CI Static Analysis
@@ -111,7 +111,7 @@ jobs:
111
111
submodules : ' recursive'
112
112
113
113
- name : Cache Gradle dependencies
114
- uses : actions/cache@d4323d4df104b026a6aa633fdb11d772146be0bf # v4.2.2
114
+ uses : actions/cache@5a3ec84eff668545956fd18022155c47e93e2684 # v4.2.3
115
115
with :
116
116
path : |
117
117
~/.gradle/caches
@@ -144,7 +144,7 @@ jobs:
144
144
ls -laR "./workspace/.trivy"
145
145
146
146
- name : Run Trivy security scanner
147
- uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # v0.29 .0
147
+ uses : aquasecurity/trivy-action@6c175e9c4083a92bbca2f9724c8a5e33bc2d97a5 # v0.30 .0
148
148
with :
149
149
scan-type : rootfs
150
150
scan-ref : ' ./workspace/.trivy/'
@@ -157,7 +157,7 @@ jobs:
157
157
TRIVY_JAVA_DB_REPOSITORY : ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db
158
158
159
159
- name : Upload Trivy scan results to GitHub Security tab
160
- uses : github/codeql-action/upload-sarif@b56ba49b26e50535fa1e7f7db0f4f7b4bf65d80d # v3.28.10
160
+ uses : github/codeql-action/upload-sarif@1b549b9259bda1cb5ddde3b41741a82a2d15a841 # v3.28.13
161
161
if : always()
162
162
with :
163
163
sarif_file : ' trivy-results.sarif'
0 commit comments