|
14 | 14 | env: |
15 | 15 | # Golang version to use across CI steps |
16 | 16 | # renovate: datasource=golang-version packageName=golang |
17 | | - GOLANG_VERSION: '1.26.2' |
| 17 | + GOLANG_VERSION: '1.26.3' |
18 | 18 | # a workaround to disable harden runner |
19 | 19 | STEP_SECURITY_HARDEN_RUNNER: ${{ vars.disable_harden_runner }} |
20 | 20 |
|
|
35 | 35 | steps: |
36 | 36 | - name: Harden the runner (Audit all outbound calls) |
37 | 37 | if: ${{ vars.disable_harden_runner != 'true' }} |
38 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 38 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
39 | 39 | with: |
40 | 40 | egress-policy: audit |
41 | 41 | - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 |
|
63 | 63 | steps: |
64 | 64 | - name: Harden the runner (Audit all outbound calls) |
65 | 65 | if: ${{ vars.disable_harden_runner != 'true' }} |
66 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 66 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
67 | 67 | with: |
68 | 68 | egress-policy: audit |
69 | 69 | - name: Checkout code |
|
88 | 88 | steps: |
89 | 89 | - name: Harden the runner (Audit all outbound calls) |
90 | 90 | if: ${{ vars.disable_harden_runner != 'true' }} |
91 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 91 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
92 | 92 | with: |
93 | 93 | egress-policy: audit |
94 | 94 | - name: Checkout code |
@@ -124,7 +124,7 @@ jobs: |
124 | 124 | steps: |
125 | 125 | - name: Harden the runner (Audit all outbound calls) |
126 | 126 | if: ${{ vars.disable_harden_runner != 'true' }} |
127 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 127 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
128 | 128 | with: |
129 | 129 | egress-policy: audit |
130 | 130 | - name: Checkout code |
@@ -153,7 +153,7 @@ jobs: |
153 | 153 | steps: |
154 | 154 | - name: Harden the runner (Audit all outbound calls) |
155 | 155 | if: ${{ vars.disable_harden_runner != 'true' }} |
156 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 156 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
157 | 157 | with: |
158 | 158 | egress-policy: audit |
159 | 159 | - name: Create checkout directory |
@@ -226,7 +226,7 @@ jobs: |
226 | 226 | steps: |
227 | 227 | - name: Harden the runner (Audit all outbound calls) |
228 | 228 | if: ${{ vars.disable_harden_runner != 'true' }} |
229 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 229 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
230 | 230 | with: |
231 | 231 | egress-policy: audit |
232 | 232 | - name: Create checkout directory |
@@ -295,7 +295,7 @@ jobs: |
295 | 295 | steps: |
296 | 296 | - name: Harden the runner (Audit all outbound calls) |
297 | 297 | if: ${{ vars.disable_harden_runner != 'true' }} |
298 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 298 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
299 | 299 | with: |
300 | 300 | egress-policy: audit |
301 | 301 | - name: Checkout code |
@@ -357,7 +357,7 @@ jobs: |
357 | 357 | steps: |
358 | 358 | - name: Harden the runner (Audit all outbound calls) |
359 | 359 | if: ${{ vars.disable_harden_runner != 'true' }} |
360 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 360 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
361 | 361 | with: |
362 | 362 | egress-policy: audit |
363 | 363 | - name: Checkout code |
@@ -415,7 +415,7 @@ jobs: |
415 | 415 | steps: |
416 | 416 | - name: Harden the runner (Audit all outbound calls) |
417 | 417 | if: ${{ vars.disable_harden_runner != 'true' }} |
418 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 418 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
419 | 419 | with: |
420 | 420 | egress-policy: audit |
421 | 421 | - name: Checkout code |
@@ -496,7 +496,7 @@ jobs: |
496 | 496 | steps: |
497 | 497 | - name: Harden the runner (Audit all outbound calls) |
498 | 498 | if: ${{ vars.disable_harden_runner != 'true' }} |
499 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 499 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
500 | 500 | with: |
501 | 501 | egress-policy: audit |
502 | 502 | - name: Free Disk Space (Ubuntu) |
@@ -632,7 +632,7 @@ jobs: |
632 | 632 | steps: |
633 | 633 | - name: Harden the runner (Audit all outbound calls) |
634 | 634 | if: ${{ vars.disable_harden_runner != 'true' }} |
635 | | - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 |
| 635 | + uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1 |
636 | 636 | with: |
637 | 637 | egress-policy: audit |
638 | 638 | - run: | |
|
0 commit comments