diff --git a/.github/workflows/audit.yml b/.github/workflows/audit.yml deleted file mode 100644 index 90debacbd..000000000 --- a/.github/workflows/audit.yml +++ /dev/null @@ -1,35 +0,0 @@ -# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of. - -name: audit -on: - workflow_dispatch: - schedule: - - cron: "0 0 * * 1" -jobs: - audit: - timeout-minutes: 18 - runs-on: ubuntu-latest - steps: - - name: Checkout repository - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7 - - - name: Set up Rust toolchain - uses: dtolnay/rust-toolchain@21dc36fb71dd22e3317045c0c31a3f4249868b17 - with: - toolchain: stable - - - name: Enable Rust cache - uses: Swatinem/rust-cache@9bdad043e88c75890e36ad3bbc8d27f0090dd609 # 2.7.3 - with: - cache-targets: false - cache-all-crates: true - cache-on-failure: true - - - name: Install cargo-audit - run: | - cargo install cargo-audit --locked - rm -rf ~/.cargo/registry || echo "no registry to delete" - - - uses: rustsec/audit-check@dd51754d4e59da7395a4cd9b593f0ff2d61a9b95 # v1.4.1 - with: - token: ${{ secrets.GITHUB_TOKEN }}