32
32
continue-on-error : ${{ matrix.rust == 'beta' }}
33
33
steps :
34
34
- name : Harden the runner (Audit all outbound calls)
35
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
35
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
36
36
with :
37
37
egress-policy : audit
38
38
54
54
runs-on : ubuntu-latest
55
55
steps :
56
56
- name : Harden the runner (Audit all outbound calls)
57
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
57
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
58
58
with :
59
59
egress-policy : audit
60
60
65
65
with :
66
66
toolchain : stable
67
67
components : rustfmt, clippy
68
- - uses : taiki-e/install-action@d31232495ad76f47aad66e3501e47780b49f0f3e # v2.57.5
68
+ - uses : taiki-e/install-action@d6d752794628f1e1fffa3c4d3c8874e06f043d50 # v2.62.15
69
69
with :
70
70
tool : cargo-hack
71
71
- uses : arduino/setup-protoc@c65c819552d16ad3c9b72d9dfd5ba5237b9c906b # v3.0.0
82
82
runs-on : ubuntu-latest # TODO: Check if this could be covered for Windows. The step used currently fails on Windows.
83
83
steps :
84
84
- name : Harden the runner (Audit all outbound calls)
85
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
85
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
86
86
with :
87
87
egress-policy : audit
88
88
93
93
# https://github.com/awslabs/cargo-check-external-types/releases
94
94
toolchain : nightly-2025-05-04
95
95
components : rustfmt
96
- - uses : taiki-e/install-action@d31232495ad76f47aad66e3501e47780b49f0f3e # v2.57.5
96
+ - uses : taiki-e/install-action@d6d752794628f1e1fffa3c4d3c8874e06f043d50 # v2.62.15
97
97
with :
98
98
99
99
- name : external-type-check
@@ -107,7 +107,7 @@ jobs:
107
107
continue-on-error : true
108
108
steps :
109
109
- name : Harden the runner (Audit all outbound calls)
110
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
110
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
111
111
with :
112
112
egress-policy : audit
113
113
@@ -117,7 +117,7 @@ jobs:
117
117
- uses : dtolnay/rust-toolchain@e97e2d8cc328f1b50210efc529dca0028893a2d9
118
118
with :
119
119
toolchain : stable
120
- - uses : taiki-e/install-action@d31232495ad76f47aad66e3501e47780b49f0f3e # v2.57.5
120
+ - uses : taiki-e/install-action@d6d752794628f1e1fffa3c4d3c8874e06f043d50 # v2.62.15
121
121
with :
122
122
tool : cargo-msrv
123
123
- uses : arduino/setup-protoc@c65c819552d16ad3c9b72d9dfd5ba5237b9c906b # v3.0.0
@@ -130,7 +130,7 @@ jobs:
130
130
continue-on-error : true # Prevent sudden announcement of a new advisory from failing ci
131
131
steps :
132
132
- name : Harden the runner (Audit all outbound calls)
133
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
133
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
134
134
with :
135
135
egress-policy : audit
136
136
@@ -161,7 +161,7 @@ jobs:
161
161
runs-on : ubuntu-latest
162
162
steps :
163
163
- name : Harden the runner (Audit all outbound calls)
164
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
164
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
165
165
with :
166
166
egress-policy : audit
167
167
@@ -184,7 +184,7 @@ jobs:
184
184
if : ${{ ! contains(github.event.pull_request.labels.*.name, 'dependencies') }}
185
185
steps :
186
186
- name : Harden the runner (Audit all outbound calls)
187
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
187
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
188
188
with :
189
189
egress-policy : audit
190
190
@@ -199,7 +199,7 @@ jobs:
199
199
with :
200
200
repo-token : ${{ secrets.GITHUB_TOKEN }}
201
201
- name : Install cargo-llvm-cov
202
- uses : taiki-e/install-action@d31232495ad76f47aad66e3501e47780b49f0f3e # v2.57.5
202
+ uses : taiki-e/install-action@d6d752794628f1e1fffa3c4d3c8874e06f043d50 # v2.62.15
203
203
with :
204
204
tool : cargo-llvm-cov
205
205
- name : cargo generate-lockfile
@@ -208,7 +208,7 @@ jobs:
208
208
- name : cargo llvm-cov
209
209
run : cargo llvm-cov --locked --all-features --workspace --lcov --lib --output-path lcov.info
210
210
- name : Upload to codecov.io
211
- uses : codecov/codecov-action@fdcc8476540edceab3de004e990f80d881c6cc00 # v5.5.0
211
+ uses : codecov/codecov-action@5a1091511ad55cbe89839c7260b706298ca349f7 # v5.5.1
212
212
env :
213
213
CODECOV_TOKEN : ${{ secrets.CODECOV_TOKEN }}
214
214
with :
@@ -237,7 +237,7 @@ jobs:
237
237
runs-on : ubuntu-latest
238
238
steps :
239
239
- name : Harden the runner (Audit all outbound calls)
240
- uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
240
+ uses : step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
241
241
with :
242
242
egress-policy : audit
243
243
@@ -247,7 +247,7 @@ jobs:
247
247
- uses : dtolnay/rust-toolchain@e97e2d8cc328f1b50210efc529dca0028893a2d9
248
248
with :
249
249
toolchain : stable
250
- - uses : taiki-e/install-action@d31232495ad76f47aad66e3501e47780b49f0f3e # v2.57.5
250
+ - uses : taiki-e/install-action@d6d752794628f1e1fffa3c4d3c8874e06f043d50 # v2.62.15
251
251
with :
252
252
tool : cargo-machete
253
253
- name : cargo machete
0 commit comments