From 3ef8a890316fc53e0c07a9a1129eeb8a9e27e31d Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 30 Dec 2024 15:57:10 +0000 Subject: [PATCH] Update github-actions --- .github/workflows/ci.yml | 24 ++++++++++++------------ .github/workflows/codeql.yml | 10 +++++----- .github/workflows/scorecards.yml | 10 +++++----- .github/workflows/snyk.yml | 6 +++--- 4 files changed, 25 insertions(+), 25 deletions(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index b14eadd..cb441ad 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -12,7 +12,7 @@ jobs: name: Lint runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@9ff9d14760a73102d9fa2f47131624137f50ead8 + - uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f with: disable-sudo: true egress-policy: block @@ -24,17 +24,17 @@ jobs: raw.githubusercontent.com:443 - name: Checkout repo - uses: actions/checkout@44c2b7a8a4ea60a981eaca3cf939b5f4305c123b + uses: actions/checkout@cbb722410c2e876e24abbe8de2cc27693e501dcb with: fetch-depth: 0 - name: Setup Go - uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 + uses: actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a with: go-version-file: ./go.mod # Linting - name: Linting - uses: golangci/golangci-lint-action@9d1e0624a798bb64f6c3cea93db47765312263dc + uses: golangci/golangci-lint-action@2f13b8027d5e60ac6e32b086a0dc4d2ae4cb3f77 with: version: latest args: --config=./.github/.golangci.yml ./... @@ -48,7 +48,7 @@ jobs: matrix: go: [ '1.22', '1.21' ] steps: - - uses: step-security/harden-runner@9ff9d14760a73102d9fa2f47131624137f50ead8 + - uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f with: disable-sudo: true egress-policy: block @@ -59,11 +59,11 @@ jobs: sum.golang.org:443 - name: Checkout repo - uses: actions/checkout@44c2b7a8a4ea60a981eaca3cf939b5f4305c123b + uses: actions/checkout@cbb722410c2e876e24abbe8de2cc27693e501dcb with: fetch-depth: 0 - name: Setup Go - uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 + uses: actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a with: go-version: ${{ matrix.go }} @@ -75,7 +75,7 @@ jobs: name: Analyze runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@9ff9d14760a73102d9fa2f47131624137f50ead8 + - uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f with: disable-sudo: true egress-policy: block @@ -92,11 +92,11 @@ jobs: storage.googleapis.com:443 - name: Checkout repo - uses: actions/checkout@44c2b7a8a4ea60a981eaca3cf939b5f4305c123b + uses: actions/checkout@cbb722410c2e876e24abbe8de2cc27693e501dcb with: fetch-depth: 0 - name: Setup Go - uses: actions/setup-go@cdcb36043654635271a94b9a6d1392de5bb323a7 + uses: actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a with: go-version-file: ./go.mod @@ -106,7 +106,7 @@ jobs: # Codecov - name: Codecov - uses: codecov/codecov-action@dad251dcaf4fdaa10dfaa1c32aab58f9cb23a448 + uses: codecov/codecov-action@1e68e06f1dbfde0e4cefc87efeba9e4643565303 env: CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }} with: @@ -114,7 +114,7 @@ jobs: # Sonar - name: SonarCloud Scan - uses: SonarSource/sonarcloud-github-action@6bbd64e0cb2194e04addb429d669a9ee873eeeef + uses: SonarSource/sonarcloud-github-action@02ef91109b2d589e757aefcfb2854c2783fd7b19 env: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 0ed2137..6bd7647 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -26,7 +26,7 @@ jobs: fail-fast: false steps: - - uses: step-security/harden-runner@9ff9d14760a73102d9fa2f47131624137f50ead8 + - uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f with: disable-sudo: true egress-policy: block @@ -34,16 +34,16 @@ jobs: api.github.com:443 github.com:443 objects.githubusercontent.com:443 proxy.golang.org:443 storage.googleapis.com:443 sum.golang.org:443 uploads.github.com:443 - name: Checkout repository - uses: actions/checkout@44c2b7a8a4ea60a981eaca3cf939b5f4305c123b + uses: actions/checkout@cbb722410c2e876e24abbe8de2cc27693e501dcb # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@8fcfedf57053e09257688fce7a0beeb18b1b9ae3 + uses: github/codeql-action/init@5b6e617dc0241b2d60c2bccea90c56b67eceb797 with: languages: go - name: Autobuild - uses: github/codeql-action/autobuild@8fcfedf57053e09257688fce7a0beeb18b1b9ae3 + uses: github/codeql-action/autobuild@5b6e617dc0241b2d60c2bccea90c56b67eceb797 - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@8fcfedf57053e09257688fce7a0beeb18b1b9ae3 + uses: github/codeql-action/analyze@5b6e617dc0241b2d60c2bccea90c56b67eceb797 diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml index c00ad11..3572590 100644 --- a/.github/workflows/scorecards.yml +++ b/.github/workflows/scorecards.yml @@ -22,7 +22,7 @@ jobs: id-token: write steps: - - uses: step-security/harden-runner@9ff9d14760a73102d9fa2f47131624137f50ead8 + - uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f with: disable-sudo: true egress-policy: block @@ -38,12 +38,12 @@ jobs: www.bestpractices.dev:443 - name: "Checkout code" - uses: actions/checkout@44c2b7a8a4ea60a981eaca3cf939b5f4305c123b + uses: actions/checkout@cbb722410c2e876e24abbe8de2cc27693e501dcb with: persist-credentials: false - name: "Run analysis" - uses: ossf/scorecard-action@fad9a3cc533bb069b1f01f272f1f630895cd690a + uses: ossf/scorecard-action@dde01de2fdfb29acf692f25ffb46c10a6655057e with: results_file: results.sarif results_format: sarif @@ -61,7 +61,7 @@ jobs: # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF # format to the repository Actions tab. - name: "Upload artifact" - uses: actions/upload-artifact@552bf3722c16e81001aea7db72d8cedf64eb5f68 + uses: actions/upload-artifact@6f51ac03b9356f520e9adb1b1b7802705f340c2b with: name: SARIF file path: results.sarif @@ -69,6 +69,6 @@ jobs: # required for Code scanning alerts - name: "Upload SARIF results to code scanning" - uses: github/codeql-action/upload-sarif@8fcfedf57053e09257688fce7a0beeb18b1b9ae3 + uses: github/codeql-action/upload-sarif@5b6e617dc0241b2d60c2bccea90c56b67eceb797 with: sarif_file: results.sarif diff --git a/.github/workflows/snyk.yml b/.github/workflows/snyk.yml index 65b748e..82c6ee4 100644 --- a/.github/workflows/snyk.yml +++ b/.github/workflows/snyk.yml @@ -17,7 +17,7 @@ jobs: name: Snyk runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@9ff9d14760a73102d9fa2f47131624137f50ead8 + - uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f with: disable-sudo: true egress-policy: block @@ -26,9 +26,9 @@ jobs: github.com:443 proxy.golang.org:443 - - uses: actions/checkout@44c2b7a8a4ea60a981eaca3cf939b5f4305c123b + - uses: actions/checkout@cbb722410c2e876e24abbe8de2cc27693e501dcb - name: Run Snyk to check for vulnerabilities - uses: snyk/actions/golang@8349f9043a8b7f0f3ee8885bf28f0b388d2446e8 + uses: snyk/actions/golang@cdb760004ba9ea4d525f2e043745dfe85bb9077e env: SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} with: