File tree Expand file tree Collapse file tree 9 files changed +22
-22
lines changed Expand file tree Collapse file tree 9 files changed +22
-22
lines changed Original file line number Diff line number Diff line change 39
39
- intel-npu-demo
40
40
builder : [buildah, docker]
41
41
steps :
42
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
42
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
43
43
- uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
44
44
with :
45
45
go-version-file : go.mod
Original file line number Diff line number Diff line change 18
18
19
19
steps :
20
20
- name : Checkout repository
21
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
21
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
22
22
- uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
23
23
with :
24
24
go-version-file : go.mod
@@ -29,11 +29,11 @@ jobs:
29
29
sudo apt-get update
30
30
sudo apt-get install -y libze1 libze-dev
31
31
- name : Initialize CodeQL
32
- uses : github/codeql-action/init@76621b61decf072c1cee8dd1ce2d2a82d33c17ed # v3
32
+ uses : github/codeql-action/init@df559355d593797519d70b90fc8edd5db049e7a2 # v3
33
33
with :
34
34
languages : ' go'
35
35
36
36
- name : Perform CodeQL Analysis
37
- uses : github/codeql-action/analyze@76621b61decf072c1cee8dd1ce2d2a82d33c17ed # v3
37
+ uses : github/codeql-action/analyze@df559355d593797519d70b90fc8edd5db049e7a2 # v3
38
38
with :
39
39
category : " /language:go"
Original file line number Diff line number Diff line change 39
39
IMAGES : ${{ join(matrix.images, ' ') }}
40
40
41
41
steps :
42
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
42
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
43
43
with :
44
44
fetch-depth : 0
45
45
- name : Describe test environment
Original file line number Diff line number Diff line change 57
57
- intel-iaa-plugin
58
58
- intel-idxd-config-initcontainer
59
59
steps :
60
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
60
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
61
61
- uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
62
62
with :
63
63
go-version-file : go.mod
Original file line number Diff line number Diff line change 16
16
id-token : write
17
17
18
18
steps :
19
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
19
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
20
20
with :
21
21
persist-credentials : false
22
22
- name : " Analyze project"
26
26
results_format : sarif
27
27
publish_results : true
28
28
- name : " Upload results to security"
29
- uses : github/codeql-action/upload-sarif@76621b61decf072c1cee8dd1ce2d2a82d33c17ed # v3
29
+ uses : github/codeql-action/upload-sarif@df559355d593797519d70b90fc8edd5db049e7a2 # v3
30
30
with :
31
31
sarif_file : results.sarif
Original file line number Diff line number Diff line change 30
30
runs-on : ubuntu-24.04
31
31
steps :
32
32
- name : Checkout
33
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
33
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
34
34
- name : Run Trivy in config mode for deployments
35
35
uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
36
36
with :
48
48
runs-on : ubuntu-24.04
49
49
steps :
50
50
- name : Checkout
51
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
51
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
52
52
- name : Run Trivy in config mode for dockerfiles
53
53
uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
54
54
with :
62
62
name : Scan licenses
63
63
steps :
64
64
- name : Checkout
65
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
65
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
66
66
- name : Run Trivy in fs mode
67
67
uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
68
68
with :
79
79
name : Scan vulnerabilities
80
80
steps :
81
81
- name : Checkout
82
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
82
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
83
83
- name : Run Trivy in fs mode
84
84
uses : aquasecurity/trivy-action@dc5a429b52fcf669ce959baa2c2dd26090d2a6c4 # 0.32.0
85
85
with :
Original file line number Diff line number Diff line change 14
14
run : |
15
15
sudo apt-get update
16
16
sudo apt-get install -y python3-venv
17
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
17
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
18
18
with :
19
19
fetch-depth : 0
20
20
- name : Set up doc directory
34
34
name : lint
35
35
runs-on : ubuntu-24.04
36
36
steps :
37
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
37
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
38
38
- uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
39
39
with :
40
40
go-version-file : go.mod
52
52
name : Build and check device plugins
53
53
runs-on : ubuntu-24.04
54
54
steps :
55
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
55
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
56
56
- uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
57
57
with :
58
58
go-version-file : go.mod
81
81
- 1.32.x
82
82
- 1.33.x
83
83
steps :
84
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
84
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
85
85
- uses : actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
86
86
with :
87
87
go-version-file : go.mod
Original file line number Diff line number Diff line change 23
23
run : |
24
24
sudo apt-get update
25
25
sudo apt-get install -y python3-venv git
26
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
26
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
27
27
with :
28
28
fetch-depth : 0
29
29
ref : main
44
44
rm -rf _work/venv
45
45
make vhtml
46
46
mv _build/html/* $HOME/output/
47
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
47
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
48
48
with :
49
49
fetch-depth : 0
50
50
ref : release-0.30
55
55
rm -rf _work/venv
56
56
make vhtml
57
57
mv _build/html $HOME/output/0.30
58
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
58
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
59
59
with :
60
60
fetch-depth : 0
61
61
ref : release-0.31
66
66
rm -rf _work/venv
67
67
make vhtml
68
68
mv _build/html $HOME/output/0.31
69
- - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
69
+ - uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
70
70
with :
71
71
fetch-depth : 0
72
72
ref : release-0.32
Original file line number Diff line number Diff line change 18
18
name : Scan vulnerabilities
19
19
steps :
20
20
- name : Checkout
21
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
21
+ uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4
22
22
- name : Run Trivy in fs mode
23
23
# Don't fail in case of vulnerabilities, report them in the next step
24
24
continue-on-error : true
31
31
format : sarif
32
32
output : trivy-report.sarif
33
33
- name : Upload sarif report to GitHub Security tab
34
- uses : github/codeql-action/upload-sarif@76621b61decf072c1cee8dd1ce2d2a82d33c17ed # v3
34
+ uses : github/codeql-action/upload-sarif@df559355d593797519d70b90fc8edd5db049e7a2 # v3
35
35
with :
36
36
sarif_file : trivy-report.sarif
You can’t perform that action at this time.
0 commit comments