File tree 3 files changed +15
-15
lines changed
3 files changed +15
-15
lines changed Original file line number Diff line number Diff line change 12
12
name : Lint
13
13
runs-on : ubuntu-latest
14
14
steps :
15
- - uses : step-security/harden-runner@8a09271fed8277ab7fb02dbb5917c8d0e78323b4
15
+ - uses : step-security/harden-runner@f054d811b5b89fde2f954d54dc8622ec3aaab9ab
16
16
with :
17
17
disable-sudo : true
18
18
egress-policy : block
@@ -28,13 +28,13 @@ jobs:
28
28
with :
29
29
fetch-depth : 0
30
30
- name : Setup Go
31
- uses : actions/setup-go@c4c114188661c0fa735e5b938764519fc6e8efa9
31
+ uses : actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b
32
32
with :
33
33
go-version-file : ./go.mod
34
34
35
35
# Linting
36
36
- name : Linting
37
- uses : golangci/golangci-lint-action@4696ba8babb6127d732c3c6dde519db15edab9ea
37
+ uses : golangci/golangci-lint-action@9938e103f8065deff3f289d9e975270d5541b866
38
38
with :
39
39
version : latest
40
40
args : --config=./.github/.golangci.yml ./...
48
48
matrix :
49
49
go : [ '1.22', '1.21' ]
50
50
steps :
51
- - uses : step-security/harden-runner@8a09271fed8277ab7fb02dbb5917c8d0e78323b4
51
+ - uses : step-security/harden-runner@f054d811b5b89fde2f954d54dc8622ec3aaab9ab
52
52
with :
53
53
disable-sudo : true
54
54
egress-policy : block
63
63
with :
64
64
fetch-depth : 0
65
65
- name : Setup Go
66
- uses : actions/setup-go@c4c114188661c0fa735e5b938764519fc6e8efa9
66
+ uses : actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b
67
67
with :
68
68
go-version : ${{ matrix.go }}
69
69
75
75
name : Analyze
76
76
runs-on : ubuntu-latest
77
77
steps :
78
- - uses : step-security/harden-runner@8a09271fed8277ab7fb02dbb5917c8d0e78323b4
78
+ - uses : step-security/harden-runner@f054d811b5b89fde2f954d54dc8622ec3aaab9ab
79
79
with :
80
80
disable-sudo : true
81
81
egress-policy : block
96
96
with :
97
97
fetch-depth : 0
98
98
- name : Setup Go
99
- uses : actions/setup-go@c4c114188661c0fa735e5b938764519fc6e8efa9
99
+ uses : actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b
100
100
with :
101
101
go-version-file : ./go.mod
102
102
Original file line number Diff line number Diff line change 23
23
fail-fast : false
24
24
25
25
steps :
26
- - uses : step-security/harden-runner@8a09271fed8277ab7fb02dbb5917c8d0e78323b4
26
+ - uses : step-security/harden-runner@f054d811b5b89fde2f954d54dc8622ec3aaab9ab
27
27
with :
28
28
disable-sudo : true
29
29
egress-policy : block
@@ -35,12 +35,12 @@ jobs:
35
35
36
36
# Initializes the CodeQL tools for scanning.
37
37
- name : Initialize CodeQL
38
- uses : github/codeql-action/init@70df9def86d22bf0ea4e7f8b956e7b92e7c1ea22
38
+ uses : github/codeql-action/init@c50c157cc388ea631f085f4e95e948f51cdc742a
39
39
with :
40
40
languages : go
41
41
42
42
- name : Autobuild
43
- uses : github/codeql-action/autobuild@70df9def86d22bf0ea4e7f8b956e7b92e7c1ea22
43
+ uses : github/codeql-action/autobuild@c50c157cc388ea631f085f4e95e948f51cdc742a
44
44
45
45
- name : Perform CodeQL Analysis
46
- uses : github/codeql-action/analyze@70df9def86d22bf0ea4e7f8b956e7b92e7c1ea22
46
+ uses : github/codeql-action/analyze@c50c157cc388ea631f085f4e95e948f51cdc742a
Original file line number Diff line number Diff line change 22
22
id-token : write
23
23
24
24
steps :
25
- - uses : step-security/harden-runner@8a09271fed8277ab7fb02dbb5917c8d0e78323b4
25
+ - uses : step-security/harden-runner@f054d811b5b89fde2f954d54dc8622ec3aaab9ab
26
26
with :
27
27
disable-sudo : true
28
28
egress-policy : block
43
43
persist-credentials : false
44
44
45
45
- name : " Run analysis"
46
- uses : ossf/scorecard-action@3d5dd5daeb8a67e5461eee8aa7c5e2ab5132dc36
46
+ uses : ossf/scorecard-action@0996de34f094a4ac9ff679ec4993bdd4feff3a1f
47
47
with :
48
48
results_file : results.sarif
49
49
results_format : sarif
@@ -61,14 +61,14 @@ jobs:
61
61
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
62
62
# format to the repository Actions tab.
63
63
- name : " Upload artifact"
64
- uses : actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1
64
+ uses : actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02
65
65
with :
66
66
name : SARIF file
67
67
path : results.sarif
68
68
retention-days : 5
69
69
70
70
# required for Code scanning alerts
71
71
- name : " Upload SARIF results to code scanning"
72
- uses : github/codeql-action/upload-sarif@70df9def86d22bf0ea4e7f8b956e7b92e7c1ea22
72
+ uses : github/codeql-action/upload-sarif@c50c157cc388ea631f085f4e95e948f51cdc742a
73
73
with :
74
74
sarif_file : results.sarif
You can’t perform that action at this time.
0 commit comments