@@ -28,50 +28,50 @@ jobs:
28
28
image_digest : ${{ steps.build-push.outputs.digest }}
29
29
steps :
30
30
- name : Checkout Repository
31
- uses : actions/checkout@v3
31
+ uses : actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3.1.0
32
32
with :
33
33
ref : ${{ inputs.tag != '' && format('refs/tags/v{0}', inputs.tag) || github.ref }}
34
34
fetch-depth : 0
35
35
36
36
- name : Fetch Cached Artifacts
37
- uses : actions/cache@v3
37
+ uses : actions/cache@9b0c1fce7a93df8e3bb8926b0d6e9d89e92f20a7 # v3.0.11
38
38
with :
39
39
path : ${{ github.workspace }}/dist
40
40
key : nginx-ingress-${{ github.run_id }}-${{ github.run_number }}-multi
41
41
42
42
- name : Setup QEMU
43
- uses : docker/setup-qemu-action@v2
43
+ uses : docker/setup-qemu-action@e81a89b1732b9c48d79cd809d8d81d79c4647a18 # v2.1.0
44
44
with :
45
45
platforms : arm,arm64,ppc64le,s390x
46
46
if : github.event_name != 'pull_request'
47
47
48
48
- name : Docker Buildx
49
- uses : docker/setup-buildx-action@v2
49
+ uses : docker/setup-buildx-action@8c0edbc76e98fa90f69d9a2c020dcb50019dc325 # v2.2.1
50
50
- name : DockerHub Login
51
- uses : docker/login-action@v2
51
+ uses : docker/login-action@f4ef78c080cd8ba55a85445d5b36e214a81df20a # v2.1.0
52
52
with :
53
53
username : ${{ secrets.DOCKER_USERNAME }}
54
54
password : ${{ secrets.DOCKER_PASSWORD }}
55
55
if : github.event_name != 'pull_request'
56
56
57
57
- name : Login to GitHub Container Registry
58
- uses : docker/login-action@v2
58
+ uses : docker/login-action@f4ef78c080cd8ba55a85445d5b36e214a81df20a # v2.1.0
59
59
with :
60
60
registry : ghcr.io
61
61
username : ${{ github.repository_owner }}
62
62
password : ${{ secrets.GITHUB_TOKEN }}
63
63
if : github.event_name != 'pull_request'
64
64
65
65
- name : Login to Public ECR
66
- uses : docker/login-action@v2
66
+ uses : docker/login-action@f4ef78c080cd8ba55a85445d5b36e214a81df20a # v2.1.0
67
67
with :
68
68
registry : public.ecr.aws
69
69
username : ${{ secrets.AWS_ACCESS_KEY_ID }}
70
70
password : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
71
71
if : github.event_name != 'pull_request'
72
72
73
73
- name : Login to Quay.io
74
- uses : docker/login-action@v2
74
+ uses : docker/login-action@f4ef78c080cd8ba55a85445d5b36e214a81df20a # v2.1.0
75
75
with :
76
76
registry : quay.io
77
77
username : ${{ secrets.QUAY_USERNAME }}
88
88
89
89
- name : Docker meta
90
90
id : meta
91
- uses : docker/metadata-action@v4
91
+ uses : docker/metadata-action@57396166ad8aefe6098280995947635806a0e6ea # v4.1.1
92
92
with :
93
93
images : |
94
94
name=nginx/nginx-ingress
@@ -118,7 +118,7 @@ jobs:
118
118
io.artifacthub.package.keywords=kubernetes,ingress,nginx,controller
119
119
120
120
- name : Build Docker image
121
- uses : docker/build-push-action@v3
121
+ uses : docker/build-push-action@c56af957549030174b10d6867f20e78cfd7debc5 # v3.2.0
122
122
id : build-push
123
123
with :
124
124
file : build/Dockerfile
@@ -138,7 +138,7 @@ jobs:
138
138
IC_VERSION=${{ github.event_name == 'pull_request' && 'CI' || steps.meta.outputs.version }}
139
139
140
140
- name : Run Trivy vulnerability scanner
141
- uses : aquasecurity/trivy-action@0.8.0
141
+ uses : aquasecurity/trivy-action@9ab158e8597f3b310480b9a69402b419bc03dbd5 # 0.8.0
142
142
continue-on-error : true
143
143
with :
144
144
image-ref : nginx/nginx-ingress:${{ steps.meta.outputs.version }}
@@ -147,13 +147,13 @@ jobs:
147
147
ignore-unfixed : ' true'
148
148
149
149
- name : Upload Trivy scan results to GitHub Security tab
150
- uses : github/codeql-action/upload-sarif@v2
150
+ uses : github/codeql-action/upload-sarif@678fc3afe258fb2e0cdc165ccf77b85719de7b3c # v2.1.33
151
151
continue-on-error : true
152
152
with :
153
153
sarif_file : ' trivy-results-${{ inputs.image }}.sarif'
154
154
155
155
- name : Upload Scan Results
156
- uses : actions/upload-artifact@v3
156
+ uses : actions/upload-artifact@83fd05a356d7e2593de66fc9913b3002723633cb # v3.1.1
157
157
continue-on-error : true
158
158
with :
159
159
name : ' trivy-results-${{ inputs.image }}.sarif'
0 commit comments