From 6117ffa37dc70fb77a605b7b7aa38ee4d25ac3f5 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 11 Sep 2024 09:23:51 +0000 Subject: [PATCH] Update github-actions --- .github/workflows/ci.yml | 16 ++++++++-------- .github/workflows/codeql.yml | 8 ++++---- .github/workflows/scorecards.yml | 4 ++-- 3 files changed, 14 insertions(+), 14 deletions(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 061274f..31e6d5e 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -12,7 +12,7 @@ jobs: name: Lint runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@951b48540b429070694bc8abd82fd6901eb123ca + - uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 with: disable-sudo: true egress-policy: block @@ -28,13 +28,13 @@ jobs: with: fetch-depth: 0 - name: Setup Go - uses: actions/setup-go@b26d40294f8ad76fcc90b915dac85892322fe62d + uses: actions/setup-go@df1a11710ed378b187f40c71eb3d6c08d82e7108 with: go-version-file: ./go.mod # Linting - name: Linting - uses: golangci/golangci-lint-action@68de804037d6beb4bec814041c98865cb188f3db + uses: golangci/golangci-lint-action@33f56cc1efa04e8bdc166cd6ee9f060dad4e65af with: version: latest args: --config=./.github/.golangci.yml ./... @@ -48,7 +48,7 @@ jobs: matrix: go: [ '1.22', '1.21' ] steps: - - uses: step-security/harden-runner@951b48540b429070694bc8abd82fd6901eb123ca + - uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 with: disable-sudo: true egress-policy: block @@ -63,7 +63,7 @@ jobs: with: fetch-depth: 0 - name: Setup Go - uses: actions/setup-go@b26d40294f8ad76fcc90b915dac85892322fe62d + uses: actions/setup-go@df1a11710ed378b187f40c71eb3d6c08d82e7108 with: go-version: ${{ matrix.go }} @@ -75,7 +75,7 @@ jobs: name: Analyze runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@951b48540b429070694bc8abd82fd6901eb123ca + - uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 with: disable-sudo: true egress-policy: block @@ -96,7 +96,7 @@ jobs: with: fetch-depth: 0 - name: Setup Go - uses: actions/setup-go@b26d40294f8ad76fcc90b915dac85892322fe62d + uses: actions/setup-go@df1a11710ed378b187f40c71eb3d6c08d82e7108 with: go-version-file: ./go.mod @@ -106,7 +106,7 @@ jobs: # Codecov - name: Codecov - uses: codecov/codecov-action@8bacbcdafc25d23d7ccbf06e9aaf78c95a290f21 + uses: codecov/codecov-action@4beef3e59f78b5d086257b65d6e2ce7c33f8d646 env: CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }} with: diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index ce1ad29..4badb1b 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -23,7 +23,7 @@ jobs: fail-fast: false steps: - - uses: step-security/harden-runner@951b48540b429070694bc8abd82fd6901eb123ca + - uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 with: disable-sudo: true egress-policy: block @@ -35,12 +35,12 @@ jobs: # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@d8b1697e9a833a1f8cd88c642a6bd8685d3ee856 + uses: github/codeql-action/init@e817992b3db357f199b6e99216d3bf853dafd0fc with: languages: go - name: Autobuild - uses: github/codeql-action/autobuild@d8b1697e9a833a1f8cd88c642a6bd8685d3ee856 + uses: github/codeql-action/autobuild@e817992b3db357f199b6e99216d3bf853dafd0fc - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@d8b1697e9a833a1f8cd88c642a6bd8685d3ee856 + uses: github/codeql-action/analyze@e817992b3db357f199b6e99216d3bf853dafd0fc diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml index 0d81819..d302387 100644 --- a/.github/workflows/scorecards.yml +++ b/.github/workflows/scorecards.yml @@ -22,7 +22,7 @@ jobs: id-token: write steps: - - uses: step-security/harden-runner@951b48540b429070694bc8abd82fd6901eb123ca + - uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 with: disable-sudo: true egress-policy: block @@ -69,6 +69,6 @@ jobs: # required for Code scanning alerts - name: "Upload SARIF results to code scanning" - uses: github/codeql-action/upload-sarif@d8b1697e9a833a1f8cd88c642a6bd8685d3ee856 + uses: github/codeql-action/upload-sarif@e817992b3db357f199b6e99216d3bf853dafd0fc with: sarif_file: results.sarif