File tree Expand file tree Collapse file tree 8 files changed +17
-17
lines changed Expand file tree Collapse file tree 8 files changed +17
-17
lines changed Original file line number Diff line number Diff line change 41
41
42
42
steps :
43
43
- name : Harden Runner
44
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
44
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
45
45
with :
46
46
egress-policy : audit
47
47
50
50
51
51
# Initializes the CodeQL tools for scanning.
52
52
- name : Initialize CodeQL
53
- uses : github/codeql-action/init@4fa2a7953630fd2f3fb380f21be14ede0169dd4f # v3.25.12
53
+ uses : github/codeql-action/init@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
54
54
with :
55
55
languages : ${{ matrix.language }}
56
56
# If you wish to specify custom queries, you can do so here or in a config file.
60
60
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
61
61
# If this step fails, then you should remove it and run the build manually (see below)
62
62
- name : Autobuild
63
- uses : github/codeql-action/autobuild@4fa2a7953630fd2f3fb380f21be14ede0169dd4f # v3.25.12
63
+ uses : github/codeql-action/autobuild@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
64
64
65
65
# ℹ️ Command-line programs to run using the OS shell.
66
66
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
73
73
# ./location_of_script_within_repo/buildscript.sh
74
74
75
75
- name : Perform CodeQL Analysis
76
- uses : github/codeql-action/analyze@4fa2a7953630fd2f3fb380f21be14ede0169dd4f # v3.25.12
76
+ uses : github/codeql-action/analyze@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
77
77
with :
78
78
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change 14
14
runs-on : ubuntu-latest
15
15
steps :
16
16
- name : Harden Runner
17
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
17
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
18
18
with :
19
19
egress-policy : audit
20
20
Original file line number Diff line number Diff line change 20
20
runs-on : ubuntu-latest
21
21
steps :
22
22
- name : Harden Runner
23
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
23
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
24
24
with :
25
25
egress-policy : audit
26
26
- name : Set up Go 1.x
Original file line number Diff line number Diff line change 17
17
runs-on : ubuntu-latest
18
18
steps :
19
19
- name : Harden Runner
20
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
20
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
21
21
with :
22
22
egress-policy : audit
23
23
Original file line number Diff line number Diff line change 16
16
runs-on : ubuntu-latest
17
17
steps :
18
18
- name : Harden Runner
19
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
19
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
20
20
with :
21
21
egress-policy : audit
22
22
Original file line number Diff line number Diff line change 20
20
release_tag : ${{ steps.release-version.outputs.release_version }}
21
21
steps :
22
22
- name : Harden Runner
23
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
23
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
24
24
with :
25
25
egress-policy : audit
26
26
- name : Checkout code
29
29
fetch-depth : 0
30
30
- name : Get changed files
31
31
id : changed-markdown-files
32
- uses : tj-actions/changed-files@cc733854b1f224978ef800d29e4709d5ee2883e4 # tag=v44.5.5
32
+ uses : tj-actions/changed-files@c65cd883420fd2eb864698a825fc4162dd94482c # tag=v44.5.7
33
33
with :
34
34
files : CHANGELOG/**.md
35
35
- name : Get release version
92
92
needs : push_release_tag
93
93
steps :
94
94
- name : Harden Runner
95
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
95
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
96
96
with :
97
97
egress-policy : audit
98
98
- name : Set env
@@ -118,7 +118,7 @@ jobs:
118
118
curl -L "https://raw.githubusercontent.com/${{ github.repository }}/main/CHANGELOG/${{ env.RELEASE_TAG }}.md" \
119
119
-o "${{ env.RELEASE_TAG }}.md"
120
120
- name : Release
121
- uses : softprops/action-gh-release@a74c6b72af54cfa997e81df42d94703d6313a2d0 # tag=v2.0.6
121
+ uses : softprops/action-gh-release@c062e08bd532815e2082a85e87e3ef29c3e6d191 # tag=v2.0.8
122
122
with :
123
123
draft : true
124
124
files : out/*
Original file line number Diff line number Diff line change 13
13
runs-on : ubuntu-latest
14
14
steps :
15
15
- name : Harden Runner
16
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
16
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
17
17
with :
18
18
egress-policy : audit
19
19
Original file line number Diff line number Diff line change 31
31
32
32
steps :
33
33
- name : Harden Runner
34
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
34
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
35
35
with :
36
36
egress-policy : audit
37
37
41
41
persist-credentials : false
42
42
43
43
- name : " Run analysis"
44
- uses : ossf/scorecard-action@dc50aa9510b46c811795eb24b2f1ba02a914e534 # v2.3.3
44
+ uses : ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
45
45
with :
46
46
results_file : results.sarif
47
47
results_format : sarif
@@ -63,14 +63,14 @@ jobs:
63
63
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
64
64
# format to the repository Actions tab.
65
65
- name : " Upload artifact"
66
- uses : actions/upload-artifact@0b2256b8c012f0828dc542b3febcab082c67f72b # v4.3.4
66
+ uses : actions/upload-artifact@89ef406dd8d7e03cfd12d9e0a4a378f454709029 # v4.3.5
67
67
with :
68
68
name : SARIF file
69
69
path : results.sarif
70
70
retention-days : 5
71
71
72
72
# Upload the results to GitHub's code scanning dashboard.
73
73
- name : " Upload to code-scanning"
74
- uses : github/codeql-action/upload-sarif@4fa2a7953630fd2f3fb380f21be14ede0169dd4f # v3.25.12
74
+ uses : github/codeql-action/upload-sarif@afb54ba388a7dca6ecae48f608c4ff05ff4cc77a # v3.25.15
75
75
with :
76
76
sarif_file : results.sarif
You can’t perform that action at this time.
0 commit comments