File tree Expand file tree Collapse file tree 6 files changed +14
-14
lines changed Expand file tree Collapse file tree 6 files changed +14
-14
lines changed Original file line number Diff line number Diff line change 33
33
runs-on : ubuntu-22.04
34
34
steps :
35
35
- name : Harden Runner
36
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
36
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
37
37
with :
38
38
egress-policy : audit
39
39
67
67
# Right now this is handled by the e2e suite, but we can migrate that here.
68
68
steps :
69
69
- name : Harden Runner
70
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
70
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
71
71
with :
72
72
egress-policy : audit
73
73
98
98
runs-on : ubuntu-22.04
99
99
steps :
100
100
- name : Harden Runner
101
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
101
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
102
102
with :
103
103
egress-policy : audit
104
104
@@ -125,7 +125,7 @@ jobs:
125
125
FRONTEND_REF : localhost:5000/dalec/frontend
126
126
steps :
127
127
- name : Harden Runner
128
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
128
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
129
129
with :
130
130
egress-policy : audit
131
131
Original file line number Diff line number Diff line change 41
41
42
42
steps :
43
43
- name : Harden Runner
44
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
44
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
45
45
with :
46
46
egress-policy : audit
47
47
50
50
51
51
# Initializes the CodeQL tools for scanning.
52
52
- name : Initialize CodeQL
53
- uses : github/codeql-action/init@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
53
+ uses : github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
54
54
with :
55
55
languages : ${{ matrix.language }}
56
56
# If you wish to specify custom queries, you can do so here or in a config file.
60
60
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
61
61
# If this step fails, then you should remove it and run the build manually (see below)
62
62
- name : Autobuild
63
- uses : github/codeql-action/autobuild@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
63
+ uses : github/codeql-action/autobuild@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
64
64
65
65
# ℹ️ Command-line programs to run using the OS shell.
66
66
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
73
73
# ./location_of_script_within_repo/buildscript.sh
74
74
75
75
- name : Perform CodeQL Analysis
76
- uses : github/codeql-action/analyze@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
76
+ uses : github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
77
77
with :
78
78
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change @@ -17,11 +17,11 @@ jobs:
17
17
runs-on : ubuntu-latest
18
18
steps :
19
19
- name : Harden Runner
20
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
20
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
21
21
with :
22
22
egress-policy : audit
23
23
24
24
- name : ' Checkout Repository'
25
25
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26
26
- name : ' Dependency Review'
27
- uses : actions/dependency-review-action@4081bf99e2866ebe428fc0477b69eb4fcda7220a # v4.4 .0
27
+ uses : actions/dependency-review-action@3b139cfc5fae8b618d3eae3675e383bb1769c019 # v4.5 .0
Original file line number Diff line number Diff line change 29
29
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
30
30
31
31
- name : Harden Runner
32
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7
32
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f
33
33
with :
34
34
disable-sudo : true
35
35
egress-policy : block
Original file line number Diff line number Diff line change 28
28
packages : write
29
29
steps :
30
30
- name : Harden Runner
31
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
31
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
32
32
with :
33
33
egress-policy : audit
34
34
Original file line number Diff line number Diff line change 31
31
32
32
steps :
33
33
- name : Harden Runner
34
- uses : step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
34
+ uses : step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
35
35
with :
36
36
egress-policy : audit
37
37
71
71
72
72
# Upload the results to GitHub's code scanning dashboard.
73
73
- name : " Upload to code-scanning"
74
- uses : github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
74
+ uses : github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
75
75
with :
76
76
sarif_file : results.sarif
You can’t perform that action at this time.
0 commit comments