Skip to content

Commit 5c2e14d

Browse files
Update github-actions (#40)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
1 parent 9cd8251 commit 5c2e14d

File tree

3 files changed

+13
-13
lines changed

3 files changed

+13
-13
lines changed

.github/workflows/ci.yml

+6-6
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ jobs:
1212
name: Lint
1313
runs-on: ubuntu-latest
1414
steps:
15-
- uses: step-security/harden-runner@29e9ae12297382bde04e940b27e0638029f9f3cd
15+
- uses: step-security/harden-runner@f0db2aa8a570959027d6be2a227028ad19fd9e8f
1616
with:
1717
disable-sudo: true
1818
egress-policy: block
@@ -34,7 +34,7 @@ jobs:
3434

3535
# Linting
3636
- name: Linting
37-
uses: golangci/golangci-lint-action@d09fb0808ae08b4310fe3140992ba2475deac1c0
37+
uses: golangci/golangci-lint-action@9ec89731c3231147ae014c73448ce9a7240d661b
3838
with:
3939
version: latest
4040
args: --config=./.github/.golangci.yml ./...
@@ -48,7 +48,7 @@ jobs:
4848
matrix:
4949
go: [ '1.22', '1.21' ]
5050
steps:
51-
- uses: step-security/harden-runner@29e9ae12297382bde04e940b27e0638029f9f3cd
51+
- uses: step-security/harden-runner@f0db2aa8a570959027d6be2a227028ad19fd9e8f
5252
with:
5353
disable-sudo: true
5454
egress-policy: block
@@ -75,7 +75,7 @@ jobs:
7575
name: Analyze
7676
runs-on: ubuntu-latest
7777
steps:
78-
- uses: step-security/harden-runner@29e9ae12297382bde04e940b27e0638029f9f3cd
78+
- uses: step-security/harden-runner@f0db2aa8a570959027d6be2a227028ad19fd9e8f
7979
with:
8080
disable-sudo: true
8181
egress-policy: block
@@ -106,15 +106,15 @@ jobs:
106106

107107
# Codecov
108108
- name: Codecov
109-
uses: codecov/codecov-action@e1b169f2838f7e502ad9f222fbc6ed3e2594e003
109+
uses: codecov/codecov-action@6f75c27045d2e068673192a87c7e9c3eebf59b2a
110110
env:
111111
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}
112112
with:
113113
file: .github/coverage.out
114114

115115
# Sonar
116116
- name: SonarCloud Scan
117-
uses: SonarSource/sonarcloud-github-action@b7cc8bf2004f4a9ef190137d8831630e9ae5d2e7
117+
uses: SonarSource/sonarcloud-github-action@f5003fc9688ade81ce47b57a3fa97a8d3f12de4c
118118
env:
119119
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
120120
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}

.github/workflows/codeql.yml

+4-4
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ jobs:
2323
fail-fast: false
2424

2525
steps:
26-
- uses: step-security/harden-runner@29e9ae12297382bde04e940b27e0638029f9f3cd
26+
- uses: step-security/harden-runner@f0db2aa8a570959027d6be2a227028ad19fd9e8f
2727
with:
2828
disable-sudo: true
2929
egress-policy: block
@@ -35,12 +35,12 @@ jobs:
3535

3636
# Initializes the CodeQL tools for scanning.
3737
- name: Initialize CodeQL
38-
uses: github/codeql-action/init@c2585eca08d6e40bf455acae5248e197cdd25de1
38+
uses: github/codeql-action/init@aa96d09e166ab0ac8dc304d5ca5e5a7296ed6dd6
3939
with:
4040
languages: go
4141

4242
- name: Autobuild
43-
uses: github/codeql-action/autobuild@c2585eca08d6e40bf455acae5248e197cdd25de1
43+
uses: github/codeql-action/autobuild@aa96d09e166ab0ac8dc304d5ca5e5a7296ed6dd6
4444

4545
- name: Perform CodeQL Analysis
46-
uses: github/codeql-action/analyze@c2585eca08d6e40bf455acae5248e197cdd25de1
46+
uses: github/codeql-action/analyze@aa96d09e166ab0ac8dc304d5ca5e5a7296ed6dd6

.github/workflows/scorecards.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ jobs:
2222
id-token: write
2323

2424
steps:
25-
- uses: step-security/harden-runner@29e9ae12297382bde04e940b27e0638029f9f3cd
25+
- uses: step-security/harden-runner@f0db2aa8a570959027d6be2a227028ad19fd9e8f
2626
with:
2727
disable-sudo: true
2828
egress-policy: block
@@ -43,7 +43,7 @@ jobs:
4343
persist-credentials: false
4444

4545
- name: "Run analysis"
46-
uses: ossf/scorecard-action@873d5fdf63bc863d140f57ed481e6a297324030b
46+
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46
4747
with:
4848
results_file: results.sarif
4949
results_format: sarif
@@ -69,6 +69,6 @@ jobs:
6969

7070
# required for Code scanning alerts
7171
- name: "Upload SARIF results to code scanning"
72-
uses: github/codeql-action/upload-sarif@c2585eca08d6e40bf455acae5248e197cdd25de1
72+
uses: github/codeql-action/upload-sarif@aa96d09e166ab0ac8dc304d5ca5e5a7296ed6dd6
7373
with:
7474
sarif_file: results.sarif

0 commit comments

Comments
 (0)