File tree 10 files changed +16
-16
lines changed
10 files changed +16
-16
lines changed Original file line number Diff line number Diff line change 28
28
runs-on : ${{ matrix.os }}
29
29
steps :
30
30
- name : Harden Runner
31
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
31
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
32
32
with :
33
33
egress-policy : audit
34
34
Original file line number Diff line number Diff line change 33
33
runs-on : ${{ matrix.os }}
34
34
steps :
35
35
- name : Harden Runner
36
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
36
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
37
37
with :
38
38
egress-policy : audit
39
39
Original file line number Diff line number Diff line change 41
41
42
42
steps :
43
43
- name : Harden Runner
44
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
44
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
45
45
with :
46
46
egress-policy : audit # TODO: change to 'egress-policy: block' after couple of runs
47
47
50
50
51
51
# Initializes the CodeQL tools for scanning.
52
52
- name : Initialize CodeQL
53
- uses : github/codeql-action/init@9e8d0789d4a0fa9ceb6b1738f7e269594bdd67f0 # v3.28.9
53
+ uses : github/codeql-action/init@b56ba49b26e50535fa1e7f7db0f4f7b4bf65d80d # v3.28.10
54
54
with :
55
55
languages : ${{ matrix.language }}
56
56
# If you wish to specify custom queries, you can do so here or in a config file.
80
80
npx node-gyp rebuild -C test
81
81
82
82
- name : Perform CodeQL Analysis
83
- uses : github/codeql-action/analyze@9e8d0789d4a0fa9ceb6b1738f7e269594bdd67f0 # v3.28.9
83
+ uses : github/codeql-action/analyze@b56ba49b26e50535fa1e7f7db0f4f7b4bf65d80d # v3.28.10
84
84
with :
85
85
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change 35
35
runs-on : ubuntu-latest
36
36
steps :
37
37
- name : Harden Runner
38
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
38
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
39
39
with :
40
40
egress-policy : audit
41
41
Original file line number Diff line number Diff line change 17
17
runs-on : ubuntu-latest
18
18
steps :
19
19
- name : Harden Runner
20
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
20
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
21
21
with :
22
22
egress-policy : audit # TODO: change to 'egress-policy: block' after couple of runs
23
23
Original file line number Diff line number Diff line change 16
16
runs-on : ${{ matrix.os }}
17
17
steps :
18
18
- name : Harden Runner
19
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
19
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
20
20
with :
21
21
egress-policy : audit
22
22
Original file line number Diff line number Diff line change 30
30
runs-on : ${{ matrix.os }}
31
31
steps :
32
32
- name : Harden Runner
33
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
33
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
34
34
with :
35
35
egress-policy : audit
36
36
Original file line number Diff line number Diff line change 16
16
pull-requests : write
17
17
steps :
18
18
- name : Harden Runner
19
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
19
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
20
20
with :
21
21
egress-policy : audit
22
22
35
35
id-token : write
36
36
steps :
37
37
- name : Harden Runner
38
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
38
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
39
39
with :
40
40
egress-policy : audit
41
41
Original file line number Diff line number Diff line change 31
31
32
32
steps :
33
33
- name : Harden Runner
34
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
34
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
35
35
with :
36
36
egress-policy : audit # TODO: change to 'egress-policy: block' after couple of runs
37
37
41
41
persist-credentials : false
42
42
43
43
- name : " Run analysis"
44
- uses : ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
44
+ uses : ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1
45
45
with :
46
46
results_file : results.sarif
47
47
results_format : sarif
@@ -63,14 +63,14 @@ jobs:
63
63
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
64
64
# format to the repository Actions tab.
65
65
- name : " Upload artifact"
66
- uses : actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
66
+ uses : actions/upload-artifact@4cec3d8aa04e39d1a68397de0c4cd6fb9dce8ec1 # v4.6.1
67
67
with :
68
68
name : SARIF file
69
69
path : results.sarif
70
70
retention-days : 5
71
71
72
72
# Upload the results to GitHub's code scanning dashboard.
73
73
- name : " Upload to code-scanning"
74
- uses : github/codeql-action/upload-sarif@9e8d0789d4a0fa9ceb6b1738f7e269594bdd67f0 # v3.28.9
74
+ uses : github/codeql-action/upload-sarif@b56ba49b26e50535fa1e7f7db0f4f7b4bf65d80d # v3.28.10
75
75
with :
76
76
sarif_file : results.sarif
Original file line number Diff line number Diff line change 14
14
runs-on : ubuntu-latest
15
15
steps :
16
16
- name : Harden Runner
17
- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
17
+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
18
18
with :
19
19
egress-policy : audit
20
20
You can’t perform that action at this time.
0 commit comments