Skip to content
This repository has been archived by the owner on Oct 3, 2024. It is now read-only.

Commit

Permalink
Update github-actions
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate[bot] authored Jun 10, 2024
1 parent cd6020a commit c967118
Show file tree
Hide file tree
Showing 4 changed files with 24 additions and 24 deletions.
24 changes: 12 additions & 12 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ jobs:
name: Lint
runs-on: ubuntu-latest
steps:
- uses: step-security/harden-runner@6c3b1c91e8873ae0c705b0709f957c7a6a5eaf10
- uses: step-security/harden-runner@547a5cc003898d3f8fb1265b4a1f09b15be2f990
with:
disable-sudo: true
egress-policy: block
Expand All @@ -24,17 +24,17 @@ jobs:
raw.githubusercontent.com:443
- name: Checkout repo
uses: actions/checkout@8459bc0c7e3759cdf591f513d9f141a95fef0a8f
uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62
with:
fetch-depth: 0
- name: Setup Go
uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7
uses: actions/setup-go@4ab57d7ea2fd0c9948210b2e0784e280674e7144
with:
go-version-file: ./go.mod

# Linting
- name: Linting
uses: golangci/golangci-lint-action@692c9c9dba385536b59da68da5aef1775a6f94ea
uses: golangci/golangci-lint-action@031a2fcd4afedd71ec636137da88172250868de4
with:
version: latest
args: --config=./.github/.golangci.yml ./...
Expand All @@ -48,7 +48,7 @@ jobs:
matrix:
go: [ '1.22', '1.21' ]
steps:
- uses: step-security/harden-runner@6c3b1c91e8873ae0c705b0709f957c7a6a5eaf10
- uses: step-security/harden-runner@547a5cc003898d3f8fb1265b4a1f09b15be2f990
with:
disable-sudo: true
egress-policy: block
Expand All @@ -59,11 +59,11 @@ jobs:
sum.golang.org:443
- name: Checkout repo
uses: actions/checkout@8459bc0c7e3759cdf591f513d9f141a95fef0a8f
uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62
with:
fetch-depth: 0
- name: Setup Go
uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7
uses: actions/setup-go@4ab57d7ea2fd0c9948210b2e0784e280674e7144
with:
go-version: ${{ matrix.go }}

Expand All @@ -75,7 +75,7 @@ jobs:
name: Analyze
runs-on: ubuntu-latest
steps:
- uses: step-security/harden-runner@6c3b1c91e8873ae0c705b0709f957c7a6a5eaf10
- uses: step-security/harden-runner@547a5cc003898d3f8fb1265b4a1f09b15be2f990
with:
disable-sudo: true
egress-policy: block
Expand All @@ -92,11 +92,11 @@ jobs:
storage.googleapis.com:443
- name: Checkout repo
uses: actions/checkout@8459bc0c7e3759cdf591f513d9f141a95fef0a8f
uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62
with:
fetch-depth: 0
- name: Setup Go
uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7
uses: actions/setup-go@4ab57d7ea2fd0c9948210b2e0784e280674e7144
with:
go-version-file: ./go.mod

Expand All @@ -106,15 +106,15 @@ jobs:

# Codecov
- name: Codecov
uses: codecov/codecov-action@1290bddc8851afa46a03b9a73dd9979a415d4c4f
uses: codecov/codecov-action@7b6a727a4ae8e34ed4b8c8cc2c0710bb57de27d2
env:
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}
with:
file: .github/coverage.out

# Sonar
- name: SonarCloud Scan
uses: SonarSource/sonarcloud-github-action@6bbd64e0cb2194e04addb429d669a9ee873eeeef
uses: SonarSource/sonarcloud-github-action@13d84ab51ea6fc29e22a1288ec28cc71fd2eb19e
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
Expand Down
10 changes: 5 additions & 5 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,22 +26,22 @@ jobs:
fail-fast: false

steps:
- uses: step-security/harden-runner@6c3b1c91e8873ae0c705b0709f957c7a6a5eaf10
- uses: step-security/harden-runner@547a5cc003898d3f8fb1265b4a1f09b15be2f990
with:
disable-sudo: true
egress-policy: audit

- name: Checkout repository
uses: actions/checkout@27135e314dd1818f797af1db9dae03a9f045786b
uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@231aa2c8a89117b126725a0e11897209b7118144
uses: github/codeql-action/init@8f1a6fed33af5212fab8a999d004627ae8901d1b
with:
languages: go

- name: Autobuild
uses: github/codeql-action/autobuild@231aa2c8a89117b126725a0e11897209b7118144
uses: github/codeql-action/autobuild@8f1a6fed33af5212fab8a999d004627ae8901d1b

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@231aa2c8a89117b126725a0e11897209b7118144
uses: github/codeql-action/analyze@8f1a6fed33af5212fab8a999d004627ae8901d1b
8 changes: 4 additions & 4 deletions .github/workflows/scorecards.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ jobs:
id-token: write

steps:
- uses: step-security/harden-runner@6c3b1c91e8873ae0c705b0709f957c7a6a5eaf10
- uses: step-security/harden-runner@547a5cc003898d3f8fb1265b4a1f09b15be2f990
with:
disable-sudo: true
egress-policy: block
Expand All @@ -38,12 +38,12 @@ jobs:
www.bestpractices.dev:443
- name: "Checkout code"
uses: actions/checkout@8459bc0c7e3759cdf591f513d9f141a95fef0a8f
uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62
with:
persist-credentials: false

- name: "Run analysis"
uses: ossf/scorecard-action@fad9a3cc533bb069b1f01f272f1f630895cd690a
uses: ossf/scorecard-action@641740c608f201e40c4b84e4009a0041be72fac9
with:
results_file: results.sarif
results_format: sarif
Expand All @@ -69,6 +69,6 @@ jobs:

# required for Code scanning alerts
- name: "Upload SARIF results to code scanning"
uses: github/codeql-action/upload-sarif@4ebadbc7468649cf79b138f45e20d999351f6ed0
uses: github/codeql-action/upload-sarif@8f1a6fed33af5212fab8a999d004627ae8901d1b
with:
sarif_file: results.sarif
6 changes: 3 additions & 3 deletions .github/workflows/snyk.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ jobs:
name: Snyk
runs-on: ubuntu-latest
steps:
- uses: step-security/harden-runner@6c3b1c91e8873ae0c705b0709f957c7a6a5eaf10
- uses: step-security/harden-runner@547a5cc003898d3f8fb1265b4a1f09b15be2f990
with:
disable-sudo: true
egress-policy: block
Expand All @@ -26,9 +26,9 @@ jobs:
github.com:443
proxy.golang.org:443
- uses: actions/checkout@8459bc0c7e3759cdf591f513d9f141a95fef0a8f
- uses: actions/checkout@b80ff79f1755d06ba70441c368a6fe801f5f3a62
- name: Run Snyk to check for vulnerabilities
uses: snyk/actions/golang@8349f9043a8b7f0f3ee8885bf28f0b388d2446e8
uses: snyk/actions/golang@d406fd286b663eb8c6f8adcced4f7bcd199c0a3f
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
Expand Down

0 comments on commit c967118

Please sign in to comment.