File tree Expand file tree Collapse file tree 9 files changed +14
-14
lines changed Expand file tree Collapse file tree 9 files changed +14
-14
lines changed Original file line number Diff line number Diff line change 41
41
42
42
steps :
43
43
- name : Harden Runner
44
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
44
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
45
45
with :
46
46
disable-sudo : true
47
47
egress-policy : block
57
57
58
58
# Initializes the CodeQL tools for scanning.
59
59
- name : Initialize CodeQL
60
- uses : github/codeql-action/init@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
60
+ uses : github/codeql-action/init@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
61
61
with :
62
62
languages : ${{ matrix.language }}
63
63
# If you wish to specify custom queries, you can do so here or in a config file.
67
67
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
68
68
# If this step fails, then you should remove it and run the build manually (see below)
69
69
- name : Autobuild
70
- uses : github/codeql-action/autobuild@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
70
+ uses : github/codeql-action/autobuild@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
71
71
72
72
# ℹ️ Command-line programs to run using the OS shell.
73
73
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
80
80
# ./location_of_script_within_repo/buildscript.sh
81
81
82
82
- name : Perform CodeQL Analysis
83
- uses : github/codeql-action/analyze@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
83
+ uses : github/codeql-action/analyze@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
84
84
with :
85
85
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change 17
17
runs-on : ${{ matrix.platform }}
18
18
steps :
19
19
- name : Harden Runner
20
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
20
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
21
21
with :
22
22
disable-sudo : true
23
23
egress-policy : block
Original file line number Diff line number Diff line change 22
22
runs-on : ${{ matrix.platform }}
23
23
steps :
24
24
- name : Harden Runner
25
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
25
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
26
26
with :
27
27
disable-sudo : true
28
28
egress-policy : block
Original file line number Diff line number Diff line change 17
17
runs-on : ubuntu-latest
18
18
steps :
19
19
- name : Harden Runner
20
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
20
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
21
21
with :
22
22
disable-sudo : true
23
23
egress-policy : block
Original file line number Diff line number Diff line change 12
12
runs-on : ubuntu-latest
13
13
steps :
14
14
- name : Harden Runner
15
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
15
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
16
16
with :
17
17
disable-sudo : true
18
18
egress-policy : block
Original file line number Diff line number Diff line change 13
13
runs-on : ubuntu-latest
14
14
steps :
15
15
- name : Harden Runner
16
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
16
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
17
17
with :
18
18
egress-policy : audit # TODO: change to 'egress-policy: block' after couple of runs
19
19
Original file line number Diff line number Diff line change 26
26
27
27
steps :
28
28
- name : Harden Runner
29
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
29
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
30
30
with :
31
31
disable-sudo : true
32
32
egress-policy : block
52
52
persist-credentials : false
53
53
54
54
- name : " Run analysis"
55
- uses : ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1
55
+ uses : ossf/scorecard-action@05b42c624433fc40578a4040d5cf5e36ddca8cde # v2.4.2
56
56
with :
57
57
results_file : results.sarif
58
58
results_format : sarif
64
64
65
65
# Upload the results to GitHub's code scanning dashboard.
66
66
- name : " Upload to code-scanning"
67
- uses : github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
67
+ uses : github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 # v3.29.0
68
68
with :
69
69
sarif_file : results.sarif
Original file line number Diff line number Diff line change 41
41
runs-on : ${{ matrix.platform }}
42
42
steps :
43
43
- name : Harden Runner
44
- uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
44
+ uses : step-security/harden-runner@002fdce3c6a235733a90a27c80493a3241e56863 # v2.12.1
45
45
with :
46
46
disable-sudo : true
47
47
egress-policy : block
Original file line number Diff line number Diff line change @@ -27,7 +27,7 @@ dependencies = [
27
27
" click>=7.0,<9.0" ,
28
28
" watchdog>=1.0.0" ,
29
29
" gunicorn>=22.0.0; platform_system!='Windows'" ,
30
- " cloudevents>=1.2 .0,<=1.11 .0" , # Must support python 3.7
30
+ " cloudevents>=1.12 .0,<=1.12 .0" , # Must support python 3.7
31
31
" Werkzeug>=0.14,<4.0.0" ,
32
32
" httpx>=0.24.1" ,
33
33
]
You can’t perform that action at this time.
0 commit comments