Skip to content

Commit 6d7182d

Browse files
authored
Merge branch 'step-security:main' into issue1376
2 parents 43dca7b + 3a108a1 commit 6d7182d

File tree

13 files changed

+18
-18
lines changed

13 files changed

+18
-18
lines changed

.github/workflows/kbanalysis.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
repository: step-security/secure-workflows
3232

3333
- name: KBAnalysis
34-
uses: step-security/secure-workflows/kbanalysis@03a07b65449688ebe9e517e4446b9f323bb194a0
34+
uses: step-security/secure-workflows/kbanalysis@c2c236dfe29d884c1a27585dcab07ffab8c9a5a0
3535
with:
3636
github-token: ${{secrets.PAT }}
3737
issue-id: ${{ github.event.issue.number}}

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ jobs:
193193
194194
steps:
195195
- name: Harden Runner
196-
uses: step-security/harden-runner@v1
196+
uses: step-security/harden-runner@v2
197197
with:
198198
egress-policy: audit
199199

addaction_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ func TestAddAction(t *testing.T) {
2020
wantErr bool
2121
wantUpdated bool
2222
}{
23-
{name: "one job", args: args{inputYaml: "action-issues.yml", action: "step-security/harden-runner@v1"}, want: "action-issues.yml", wantErr: false, wantUpdated: true},
24-
{name: "two jobs", args: args{inputYaml: "2jobs.yml", action: "step-security/harden-runner@v1"}, want: "2jobs.yml", wantErr: false, wantUpdated: true},
25-
{name: "already present", args: args{inputYaml: "alreadypresent.yml", action: "step-security/harden-runner@v1"}, want: "alreadypresent.yml", wantErr: false, wantUpdated: true},
26-
{name: "already present 2", args: args{inputYaml: "alreadypresent_2.yml", action: "step-security/harden-runner@v1"}, want: "alreadypresent_2.yml", wantErr: false, wantUpdated: false},
27-
{name: "reusable job", args: args{inputYaml: "reusablejob.yml", action: "step-security/harden-runner@v1"}, want: "reusablejob.yml", wantErr: false, wantUpdated: false},
23+
{name: "one job", args: args{inputYaml: "action-issues.yml", action: "step-security/harden-runner@v2"}, want: "action-issues.yml", wantErr: false, wantUpdated: true},
24+
{name: "two jobs", args: args{inputYaml: "2jobs.yml", action: "step-security/harden-runner@v2"}, want: "2jobs.yml", wantErr: false, wantUpdated: true},
25+
{name: "already present", args: args{inputYaml: "alreadypresent.yml", action: "step-security/harden-runner@v2"}, want: "alreadypresent.yml", wantErr: false, wantUpdated: true},
26+
{name: "already present 2", args: args{inputYaml: "alreadypresent_2.yml", action: "step-security/harden-runner@v2"}, want: "alreadypresent_2.yml", wantErr: false, wantUpdated: false},
27+
{name: "reusable job", args: args{inputYaml: "reusablejob.yml", action: "step-security/harden-runner@v2"}, want: "reusablejob.yml", wantErr: false, wantUpdated: false},
2828
}
2929
for _, tt := range tests {
3030
t.Run(tt.name, func(t *testing.T) {

secureworkflow.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ import (
55
)
66

77
const (
8-
HardenRunnerActionPathWithTag = "step-security/harden-runner@v1"
8+
HardenRunnerActionPathWithTag = "step-security/harden-runner@v2"
99
HardenRunnerActionPath = "step-security/harden-runner"
1010
HardenRunnerActionName = "Harden Runner"
1111
)

secureworkflow_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ func TestSecureWorkflow(t *testing.T) {
1919
httpmock.RegisterResponder("GET", "https://api.github.com/repos/actions/checkout/commits/v1",
2020
httpmock.NewStringResponder(200, `544eadc6bf3d226fd7a7a9f0dc5b5bf7ca0675b9`))
2121

22-
httpmock.RegisterResponder("GET", "https://api.github.com/repos/step-security/harden-runner/commits/v1",
22+
httpmock.RegisterResponder("GET", "https://api.github.com/repos/step-security/harden-runner/commits/v2",
2323
httpmock.NewStringResponder(200, `7206db2ec98c5538323a6d70e51f965d55c11c87`))
2424

2525
httpmock.RegisterResponder("GET", "https://api.github.com/repos/github/super-linter/commits/v3",

testfiles/addaction/input/alreadypresent_2.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ jobs:
1111
runs-on: ubuntu-latest
1212
steps:
1313
- name: Harden Runner
14-
uses: step-security/harden-runner@v1
14+
uses: step-security/harden-runner@v2
1515
with:
1616
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
1717

testfiles/addaction/output/2jobs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ jobs:
66
runs-on: ubuntu-latest
77
steps:
88
- name: Harden Runner
9-
uses: step-security/harden-runner@v1
9+
uses: step-security/harden-runner@v2
1010
with:
1111
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
1212

@@ -15,7 +15,7 @@ jobs:
1515
runs-on: ubuntu-latest
1616
steps:
1717
- name: Harden Runner
18-
uses: step-security/harden-runner@v1
18+
uses: step-security/harden-runner@v2
1919
with:
2020
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
2121

testfiles/addaction/output/action-issues.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ jobs:
1010

1111
steps:
1212
- name: Harden Runner
13-
uses: step-security/harden-runner@v1
13+
uses: step-security/harden-runner@v2
1414
with:
1515
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
1616

testfiles/addaction/output/alreadypresent.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ jobs:
1111
runs-on: ubuntu-latest
1212
steps:
1313
- name: Harden Runner
14-
uses: step-security/harden-runner@v1
14+
uses: step-security/harden-runner@v2
1515
with:
1616
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
1717

testfiles/addaction/output/alreadypresent_2.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ jobs:
1111
runs-on: ubuntu-latest
1212
steps:
1313
- name: Harden Runner
14-
uses: step-security/harden-runner@v1
14+
uses: step-security/harden-runner@v2
1515
with:
1616
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
1717

0 commit comments

Comments
 (0)