File tree 5 files changed +12
-12
lines changed
5 files changed +12
-12
lines changed Original file line number Diff line number Diff line change 39
39
40
40
steps :
41
41
- name : Harden Runner
42
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
42
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
43
43
with :
44
44
egress-policy : audit
45
45
@@ -155,7 +155,7 @@ jobs:
155
155
156
156
- name : Coveralls Parallel
157
157
if : inputs.enable_coverage == true
158
- uses : coverallsapp/github-action@cfd0633edbd2411b532b808ba7a8b5e04f76d2c8 # v2.3.4
158
+ uses : coverallsapp/github-action@648a8eb78e6d50909eff900e4ec85cab4524a45b # v2.3.6
159
159
with :
160
160
github-token : ${{ secrets.github_token }}
161
161
flag-name : run-${{inputs.build_type}}-${{inputs.platform}}-${{inputs.arch}}
@@ -178,7 +178,7 @@ jobs:
178
178
179
179
- name : Build and push Docker image
180
180
if : inputs.publish_docker == true && github.event_name == 'push'
181
- uses : docker/build-push-action@67a2d409c0a876cbe6b11854e3e25193efe4e62d
181
+ uses : docker/build-push-action@ca877d9245402d1537745e0e356eab47c3520991
182
182
with :
183
183
context : build
184
184
push : true
Original file line number Diff line number Diff line change @@ -126,12 +126,12 @@ jobs:
126
126
runs-on : ubuntu-latest
127
127
steps :
128
128
- name : Harden Runner
129
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
129
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
130
130
with :
131
131
egress-policy : audit
132
132
133
133
- name : Coveralls Finished
134
- uses : coverallsapp/github-action@cfd0633edbd2411b532b808ba7a8b5e04f76d2c8 # v2.3.4
134
+ uses : coverallsapp/github-action@648a8eb78e6d50909eff900e4ec85cab4524a45b # v2.3.6
135
135
with :
136
136
github-token : ${{ secrets.github_token }}
137
137
parallel-finished : true
Original file line number Diff line number Diff line change 50
50
51
51
steps :
52
52
- name : Harden Runner
53
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
53
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
54
54
with :
55
55
egress-policy : audit
56
56
61
61
62
62
# Initializes the CodeQL tools for scanning.
63
63
- name : Initialize CodeQL
64
- uses : github/codeql-action/init@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
64
+ uses : github/codeql-action/init@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
65
65
with :
66
66
languages : ${{ matrix.language }}
67
67
# If you wish to specify custom queries, you can do so here or in a config file.
82
82
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
83
83
# If this step fails, then you should remove it and run the build manually (see below)
84
84
- name : Autobuild
85
- uses : github/codeql-action/autobuild@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
85
+ uses : github/codeql-action/autobuild@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
86
86
87
87
# ℹ️ Command-line programs to run using the OS shell.
88
88
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
95
95
# ./location_of_script_within_repo/buildscript.sh
96
96
97
97
- name : Perform CodeQL Analysis
98
- uses : github/codeql-action/analyze@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
98
+ uses : github/codeql-action/analyze@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
99
99
with :
100
100
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change 17
17
runs-on : ubuntu-latest
18
18
steps :
19
19
- name : Harden Runner
20
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
20
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
21
21
with :
22
22
egress-policy : audit
23
23
Original file line number Diff line number Diff line change 31
31
32
32
steps :
33
33
- name : Harden Runner
34
- uses : step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
34
+ uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
35
35
with :
36
36
egress-policy : audit
37
37
71
71
72
72
# Upload the results to GitHub's code scanning dashboard.
73
73
- name : " Upload to code-scanning"
74
- uses : github/codeql-action/upload-sarif@b6a472f63d85b9c78a3ac5e89422239fc15e9b3c # v3.28.1
74
+ uses : github/codeql-action/upload-sarif@f6091c0113d1dcf9b98e269ee48e8a7e51b7bdd4 # v3.28.5
75
75
with :
76
76
sarif_file : results.sarif
You can’t perform that action at this time.
0 commit comments