File tree Expand file tree Collapse file tree 9 files changed +20
-20
lines changed Expand file tree Collapse file tree 9 files changed +20
-20
lines changed Original file line number Diff line number Diff line change 41
41
42
42
steps :
43
43
- name : Harden Runner
44
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
44
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
45
45
with :
46
46
egress-policy : audit
47
47
50
50
51
51
# Initializes the CodeQL tools for scanning.
52
52
- name : Initialize CodeQL
53
- uses : github/codeql-action/init@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
53
+ uses : github/codeql-action/init@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
54
54
with :
55
55
languages : ${{ matrix.language }}
56
56
# If you wish to specify custom queries, you can do so here or in a config file.
60
60
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
61
61
# If this step fails, then you should remove it and run the build manually (see below)
62
62
- name : Autobuild
63
- uses : github/codeql-action/autobuild@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
63
+ uses : github/codeql-action/autobuild@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
64
64
65
65
# ℹ️ Command-line programs to run using the OS shell.
66
66
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
73
73
# ./location_of_script_within_repo/buildscript.sh
74
74
75
75
- name : Perform CodeQL Analysis
76
- uses : github/codeql-action/analyze@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
76
+ uses : github/codeql-action/analyze@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
77
77
with :
78
78
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change @@ -14,16 +14,16 @@ jobs:
14
14
runs-on : ubuntu-latest
15
15
steps :
16
16
- name : Harden Runner
17
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
17
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
18
18
with :
19
19
egress-policy : audit
20
20
21
21
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
22
- - uses : actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a # v5.2 .0
22
+ - uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3 .0
23
23
with :
24
24
go-version : ' 1.22'
25
25
- run : " PATH=/usr/local/go/bin:$PATH make test-cover"
26
- - uses : codecov/codecov-action@1e68e06f1dbfde0e4cefc87efeba9e4643565303 # v5.1.2
26
+ - uses : codecov/codecov-action@13ce06bfc6bbe3ecf90edbbf1bc32fe5978ca1d3 # v5.3.1
27
27
env :
28
28
CODECOV_TOKEN : ${{ secrets.CODECOV_TOKEN }}
29
29
with :
Original file line number Diff line number Diff line change @@ -20,11 +20,11 @@ jobs:
20
20
runs-on : ubuntu-latest
21
21
steps :
22
22
- name : Harden Runner
23
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
23
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
24
24
with :
25
25
egress-policy : audit
26
26
- name : Set up Go 1.x
27
- uses : actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a # v5.2 .0
27
+ uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3 .0
28
28
with :
29
29
go-version : ' 1.22'
30
30
id : go
Original file line number Diff line number Diff line change 17
17
runs-on : ubuntu-latest
18
18
steps :
19
19
- name : Harden Runner
20
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
20
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
21
21
with :
22
22
egress-policy : audit
23
23
Original file line number Diff line number Diff line change 16
16
runs-on : ubuntu-latest
17
17
steps :
18
18
- name : Harden Runner
19
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
19
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
20
20
with :
21
21
egress-policy : audit
22
22
Original file line number Diff line number Diff line change @@ -25,12 +25,12 @@ jobs:
25
25
run : echo "go_version=$(make go-version)" >> $GITHUB_OUTPUT
26
26
27
27
- name : Set up Go
28
- uses : actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a # tag=v5.2 .0
28
+ uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # tag=v5.3 .0
29
29
with :
30
30
go-version : ${{ steps.vars.outputs.go_version }}
31
31
32
32
- name : golangci-lint
33
- uses : golangci/golangci-lint-action@971e284b6050e8a5849b72094c50ab08da042db8 # tag=v6.1.1
33
+ uses : golangci/golangci-lint-action@ec5d18412c0aeab7936cb16880d708ba2a64e1ae # tag=v6.2.0
34
34
with :
35
35
# update the version when updating golangci-lint
36
36
version : v1.60.2
Original file line number Diff line number Diff line change 20
20
release_tag : ${{ steps.release-version.outputs.release_version }}
21
21
steps :
22
22
- name : Harden Runner
23
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
23
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
24
24
with :
25
25
egress-policy : audit
26
26
- name : Checkout code
92
92
needs : push_release_tag
93
93
steps :
94
94
- name : Harden Runner
95
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
95
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
96
96
with :
97
97
egress-policy : audit
98
98
- name : Set env
@@ -107,7 +107,7 @@ jobs:
107
107
- name : Calculate go version
108
108
run : echo "go_version=$(make go-version)" >> $GITHUB_ENV
109
109
- name : Set up Go
110
- uses : actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a # tag=v5.2 .0
110
+ uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # tag=v5.3 .0
111
111
with :
112
112
go-version : ${{ env.go_version }}
113
113
- name : generate release artifacts
Original file line number Diff line number Diff line change @@ -13,14 +13,14 @@ jobs:
13
13
runs-on : ubuntu-latest
14
14
steps :
15
15
- name : Harden Runner
16
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
16
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
17
17
with :
18
18
egress-policy : audit
19
19
20
20
- name : Check out code
21
21
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # tag=v4.2.2
22
22
- name : Setup go
23
- uses : actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a # v5.2 .0
23
+ uses : actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3 .0
24
24
with :
25
25
go-version : 1.22
26
26
- name : Run verify container script
Original file line number Diff line number Diff line change 31
31
32
32
steps :
33
33
- name : Harden Runner
34
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
34
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
35
35
with :
36
36
egress-policy : audit
37
37
71
71
72
72
# Upload the results to GitHub's code scanning dashboard.
73
73
- name : " Upload to code-scanning"
74
- uses : github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
74
+ uses : github/codeql-action/upload-sarif@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
75
75
with :
76
76
sarif_file : results.sarif
You can’t perform that action at this time.
0 commit comments