From 6b7001518d4f47f05849c097dea3903d64ac52ab Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 22 Feb 2025 18:49:01 +0000 Subject: [PATCH] Update github-actions --- .github/workflows/ci.yml | 10 +++++----- .github/workflows/codeql.yml | 8 ++++---- .github/workflows/scorecards.yml | 8 ++++---- 3 files changed, 13 insertions(+), 13 deletions(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 8d3f752..3fe6372 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -12,7 +12,7 @@ jobs: name: Lint runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e + - uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d with: disable-sudo: true egress-policy: block @@ -34,7 +34,7 @@ jobs: # Linting - name: Linting - uses: golangci/golangci-lint-action@051d91933864810ecd5e2ea2cfd98f6a5bca5347 + uses: golangci/golangci-lint-action@456fc0f7358ebf6cdd48ca0d2d56e88a6c7aa077 with: version: latest args: --config=./.github/.golangci.yml ./... @@ -48,7 +48,7 @@ jobs: matrix: go: [ '1.22', '1.21' ] steps: - - uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e + - uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d with: disable-sudo: true egress-policy: block @@ -75,7 +75,7 @@ jobs: name: Analyze runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e + - uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d with: disable-sudo: true egress-policy: block @@ -106,7 +106,7 @@ jobs: # Codecov - name: Codecov - uses: codecov/codecov-action@4898080f15c09ae860fcec6796854d10a2e23de8 + uses: codecov/codecov-action@1fecca8ce3a22284e70b371077fb5219f54095b8 env: CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }} with: diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index b6db6c8..80bc0cc 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -23,7 +23,7 @@ jobs: fail-fast: false steps: - - uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e + - uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d with: disable-sudo: true egress-policy: block @@ -35,12 +35,12 @@ jobs: # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@606392577144219644443c010bc0e17ad563e559 + uses: github/codeql-action/init@ff79de67cc25c7617163ae1e4b8aa23b902fdf15 with: languages: go - name: Autobuild - uses: github/codeql-action/autobuild@606392577144219644443c010bc0e17ad563e559 + uses: github/codeql-action/autobuild@ff79de67cc25c7617163ae1e4b8aa23b902fdf15 - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@606392577144219644443c010bc0e17ad563e559 + uses: github/codeql-action/analyze@ff79de67cc25c7617163ae1e4b8aa23b902fdf15 diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml index 6381ac6..3cd1738 100644 --- a/.github/workflows/scorecards.yml +++ b/.github/workflows/scorecards.yml @@ -22,7 +22,7 @@ jobs: id-token: write steps: - - uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e + - uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d with: disable-sudo: true egress-policy: block @@ -43,7 +43,7 @@ jobs: persist-credentials: false - name: "Run analysis" - uses: ossf/scorecard-action@620fd28d6b2ba01c1d70cf63dfb4bdf868e19d6f + uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 with: results_file: results.sarif results_format: sarif @@ -61,7 +61,7 @@ jobs: # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF # format to the repository Actions tab. - name: "Upload artifact" - uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 + uses: actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1 with: name: SARIF file path: results.sarif @@ -69,6 +69,6 @@ jobs: # required for Code scanning alerts - name: "Upload SARIF results to code scanning" - uses: github/codeql-action/upload-sarif@606392577144219644443c010bc0e17ad563e559 + uses: github/codeql-action/upload-sarif@ff79de67cc25c7617163ae1e4b8aa23b902fdf15 with: sarif_file: results.sarif