Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update github-actions #81

Merged
merged 1 commit into from
Feb 23, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ jobs:
name: Lint
runs-on: ubuntu-latest
steps:
- uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e
- uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d
with:
disable-sudo: true
egress-policy: block
Expand All @@ -34,7 +34,7 @@ jobs:

# Linting
- name: Linting
uses: golangci/golangci-lint-action@051d91933864810ecd5e2ea2cfd98f6a5bca5347
uses: golangci/golangci-lint-action@456fc0f7358ebf6cdd48ca0d2d56e88a6c7aa077
with:
version: latest
args: --config=./.github/.golangci.yml ./...
Expand All @@ -48,7 +48,7 @@ jobs:
matrix:
go: [ '1.22', '1.21' ]
steps:
- uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e
- uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d
with:
disable-sudo: true
egress-policy: block
Expand All @@ -75,7 +75,7 @@ jobs:
name: Analyze
runs-on: ubuntu-latest
steps:
- uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e
- uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d
with:
disable-sudo: true
egress-policy: block
Expand Down Expand Up @@ -106,7 +106,7 @@ jobs:

# Codecov
- name: Codecov
uses: codecov/codecov-action@4898080f15c09ae860fcec6796854d10a2e23de8
uses: codecov/codecov-action@1fecca8ce3a22284e70b371077fb5219f54095b8
env:
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}
with:
Expand Down
8 changes: 4 additions & 4 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ jobs:
fail-fast: false

steps:
- uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e
- uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d
with:
disable-sudo: true
egress-policy: block
Expand All @@ -35,12 +35,12 @@ jobs:

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@606392577144219644443c010bc0e17ad563e559
uses: github/codeql-action/init@ff79de67cc25c7617163ae1e4b8aa23b902fdf15
with:
languages: go

- name: Autobuild
uses: github/codeql-action/autobuild@606392577144219644443c010bc0e17ad563e559
uses: github/codeql-action/autobuild@ff79de67cc25c7617163ae1e4b8aa23b902fdf15

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@606392577144219644443c010bc0e17ad563e559
uses: github/codeql-action/analyze@ff79de67cc25c7617163ae1e4b8aa23b902fdf15
8 changes: 4 additions & 4 deletions .github/workflows/scorecards.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ jobs:
id-token: write

steps:
- uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e
- uses: step-security/harden-runner@a22641e386edd6104ead99416bac876f4d9b806d
with:
disable-sudo: true
egress-policy: block
Expand All @@ -43,7 +43,7 @@ jobs:
persist-credentials: false

- name: "Run analysis"
uses: ossf/scorecard-action@620fd28d6b2ba01c1d70cf63dfb4bdf868e19d6f
uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186
with:
results_file: results.sarif
results_format: sarif
Expand All @@ -61,14 +61,14 @@ jobs:
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08
uses: actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1
with:
name: SARIF file
path: results.sarif
retention-days: 5

# required for Code scanning alerts
- name: "Upload SARIF results to code scanning"
uses: github/codeql-action/upload-sarif@606392577144219644443c010bc0e17ad563e559
uses: github/codeql-action/upload-sarif@ff79de67cc25c7617163ae1e4b8aa23b902fdf15
with:
sarif_file: results.sarif
Loading