Skip to content

Commit 8fd4b72

Browse files
Merge pull request #2528 from step-security/update-action-tags
Update GitHub Actions to latest commit SHAs and add wait-for-secrets …
2 parents 8458d27 + a9e7593 commit 8fd4b72

File tree

9 files changed

+59
-64
lines changed

9 files changed

+59
-64
lines changed

.github/workflows/automatePR.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ jobs:
1717

1818
steps:
1919
- name: Harden Runner
20-
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde # v2.9.1
20+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
2121
with:
2222
egress-policy: audit
2323

24-
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
24+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
2525
with:
2626
repository: step-security/secure-repo
2727

.github/workflows/code-review.yml

Lines changed: 0 additions & 23 deletions
This file was deleted.

.github/workflows/codeql.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,16 +41,16 @@ jobs:
4141

4242
steps:
4343
- name: Harden Runner
44-
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde
44+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
4545
with:
4646
egress-policy: audit
4747

4848
- name: Checkout repository
49-
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
49+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
5050

5151
# Initializes the CodeQL tools for scanning.
5252
- name: Initialize CodeQL
53-
uses: github/codeql-action/init@e0e5ded33cabb451ae0a9768fc7b0410bad9ad44
53+
uses: github/codeql-action/init@bc02a25f6449997c5e9d5a368879b28f56ae19a1
5454
with:
5555
languages: ${{ matrix.language }}
5656
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -63,7 +63,7 @@ jobs:
6363
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
6464
# If this step fails, then you should remove it and run the build manually (see below)
6565
- name: Autobuild
66-
uses: github/codeql-action/autobuild@e0e5ded33cabb451ae0a9768fc7b0410bad9ad44
66+
uses: github/codeql-action/autobuild@bc02a25f6449997c5e9d5a368879b28f56ae19a1
6767

6868
# ℹ️ Command-line programs to run using the OS shell.
6969
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
@@ -76,6 +76,6 @@ jobs:
7676
# ./location_of_script_within_repo/buildscript.sh
7777

7878
- name: Perform CodeQL Analysis
79-
uses: github/codeql-action/analyze@e0e5ded33cabb451ae0a9768fc7b0410bad9ad44
79+
uses: github/codeql-action/analyze@bc02a25f6449997c5e9d5a368879b28f56ae19a1
8080
with:
8181
category: "/language:${{matrix.language}}"

.github/workflows/int.yml

Lines changed: 30 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,33 +12,51 @@ jobs:
1212
publish-test:
1313
permissions:
1414
contents: read
15+
id-token: write
1516
runs-on: ubuntu-latest
1617
steps:
1718
- name: Harden Runner
18-
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde
19+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
1920
with:
2021
egress-policy: audit
2122
- name: Checkout
22-
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
23+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
2324
with:
2425
fetch-depth: 0
2526
- name: Set up Go
26-
uses: actions/setup-go@37335c7bb261b353407cff977110895fa0b4f7d8
27+
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5
2728
with:
2829
go-version: 1.17
29-
- name: Configure AWS Credentials
30-
uses: aws-actions/configure-aws-credentials@ea7b857d8a33dc2fb4ef5a724500044281b49a5e
31-
with:
32-
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID_INT }}
33-
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY_INT }}
34-
aws-region: us-west-2
3530

3631
- run: go test ./... -coverpkg=./...
3732
env:
3833
PAT: ${{ secrets.PAT }}
3934

35+
- uses: step-security/wait-for-secrets@084b3ae774c0e0003a9307ae4f487c10f1f998fe
36+
id: wait-for-secrets
37+
with:
38+
slack-webhook-url: ${{ secrets.SLACK_WEBHOOK_URL }}
39+
secrets: |
40+
AWS_ACCESS_KEY_ID_INT:
41+
name: 'AWS access key id'
42+
description: 'Access key id for secure-repo int'
43+
AWS_SECRET_ACCESS_KEY_INT:
44+
name: 'AWS secret access key'
45+
description: 'Secret access key for secure-repo int'
46+
AWS_SESSION_TOKEN_INT:
47+
name: 'AWS session token'
48+
description: 'Session token for secure-repo int'
49+
50+
- name: Configure AWS Credentials
51+
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df
52+
with:
53+
aws-access-key-id: ${{ steps.wait-for-secrets.outputs.AWS_ACCESS_KEY_ID_INT }}
54+
aws-secret-access-key: ${{ steps.wait-for-secrets.outputs.AWS_SECRET_ACCESS_KEY_INT }}
55+
aws-session-token: ${{ steps.wait-for-secrets.outputs.AWS_SESSION_TOKEN_INT }}
56+
aws-region: us-west-2
57+
4058
- name: Deploy to AWS CloudFormation
41-
uses: aws-actions/aws-cloudformation-github-deploy@72bea2c93ca6be253b71b5966ecde13f9e8af2d4
59+
uses: aws-actions/aws-cloudformation-github-deploy@33527b83bddcf6b3f0b135d9550bde8475325c73
4260
with:
4361
name: secure-workflow-api-ecr
4462
template: cloudformation/ecr.yml
@@ -47,7 +65,7 @@ jobs:
4765

4866
- name: Login to Amazon ECR
4967
id: login-ecr
50-
uses: aws-actions/amazon-ecr-login@aaf69d68aa3fb14c1d5a6be9ac61fe15b48453a2
68+
uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076
5169

5270
- name: Build, tag, and push image to Amazon ECR
5371
env:
@@ -59,7 +77,7 @@ jobs:
5977
docker push $ECR_REGISTRY/$ECR_REPOSITORY:$IMAGE_TAG
6078
6179
- name: Deploy to AWS CloudFormation
62-
uses: aws-actions/aws-cloudformation-github-deploy@72bea2c93ca6be253b71b5966ecde13f9e8af2d4
80+
uses: aws-actions/aws-cloudformation-github-deploy@33527b83bddcf6b3f0b135d9550bde8475325c73
6381
with:
6482
name: secure-workflow-api
6583
template: cloudformation/resources.yml

.github/workflows/kb-test.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ jobs:
1414
contents: read
1515
runs-on: ubuntu-latest
1616
steps:
17-
- uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde # v2.9.1
17+
- uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
1818
with:
1919
allowed-endpoints: >
2020
api.github.com:443
@@ -25,11 +25,11 @@ jobs:
2525
objects.githubusercontent.com:443
2626
golang.org:443
2727
- name: Checkout
28-
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v2
28+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
2929
with:
3030
ref: ${{ github.event.pull_request.head.sha }}
3131
- name: Set up Go
32-
uses: actions/setup-go@37335c7bb261b353407cff977110895fa0b4f7d8 # v2.1.3
32+
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5
3333
with:
3434
go-version: 1.17
3535
- name: Run coverage

.github/workflows/kbanalysis.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,11 @@ jobs:
2222

2323
steps:
2424
- name: Harden Runner
25-
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde
25+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
2626
with:
2727
egress-policy: audit
2828

29-
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
29+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
3030
with:
3131
repository: step-security/secure-repo
3232

.github/workflows/release.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -17,23 +17,23 @@ jobs:
1717
runs-on: ubuntu-latest
1818
steps:
1919
- name: Harden Runner
20-
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde
20+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
2121
with:
2222
egress-policy: audit
2323
- name: Checkout
24-
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
24+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
2525
with:
2626
fetch-depth: 0
2727
- name: Set up Go
28-
uses: actions/setup-go@37335c7bb261b353407cff977110895fa0b4f7d8
28+
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5
2929
with:
3030
go-version: 1.17
3131

3232
- run: go test ./... -coverpkg=./...
3333
env:
3434
PAT: ${{ secrets.PAT }}
3535

36-
- uses: step-security/wait-for-secrets@5809f7d044804a5a1d43217fa8f3e855939fc9ef
36+
- uses: step-security/wait-for-secrets@084b3ae774c0e0003a9307ae4f487c10f1f998fe
3737
id: wait-for-secrets
3838
with:
3939
slack-webhook-url: ${{ secrets.SLACK_WEBHOOK_URL }}
@@ -49,15 +49,15 @@ jobs:
4949
description: 'Session token for secure-repo prod'
5050
5151
- name: Configure AWS Credentials
52-
uses: aws-actions/configure-aws-credentials@ea7b857d8a33dc2fb4ef5a724500044281b49a5e
52+
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df
5353
with:
5454
aws-access-key-id: ${{ steps.wait-for-secrets.outputs.AWS_ACCESS_KEY_ID }}
5555
aws-secret-access-key: ${{ steps.wait-for-secrets.outputs.AWS_SECRET_ACCESS_KEY }}
5656
aws-session-token: ${{ steps.wait-for-secrets.outputs.AWS_SESSION_TOKEN }}
5757
aws-region: us-west-2
5858

5959
- name: Deploy to AWS CloudFormation
60-
uses: aws-actions/aws-cloudformation-github-deploy@72bea2c93ca6be253b71b5966ecde13f9e8af2d4
60+
uses: aws-actions/aws-cloudformation-github-deploy@33527b83bddcf6b3f0b135d9550bde8475325c73
6161
with:
6262
name: secure-workflow-api-ecr
6363
template: cloudformation/ecr.yml
@@ -66,7 +66,7 @@ jobs:
6666

6767
- name: Login to Amazon ECR
6868
id: login-ecr
69-
uses: aws-actions/amazon-ecr-login@aaf69d68aa3fb14c1d5a6be9ac61fe15b48453a2
69+
uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076
7070

7171
- name: Build, tag, and push image to Amazon ECR
7272
env:
@@ -78,7 +78,7 @@ jobs:
7878
docker push $ECR_REGISTRY/$ECR_REPOSITORY:$IMAGE_TAG
7979
8080
- name: Deploy to AWS CloudFormation
81-
uses: aws-actions/aws-cloudformation-github-deploy@72bea2c93ca6be253b71b5966ecde13f9e8af2d4
81+
uses: aws-actions/aws-cloudformation-github-deploy@33527b83bddcf6b3f0b135d9550bde8475325c73
8282
with:
8383
name: secure-workflow-api
8484
template: cloudformation/resources.yml

.github/workflows/scorecards.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,17 +32,17 @@ jobs:
3232

3333
steps:
3434
- name: Harden Runner
35-
uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde # v2.9.1
35+
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
3636
with:
3737
egress-policy: audit
3838

3939
- name: "Checkout code"
40-
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
40+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
4141
with:
4242
persist-credentials: false
4343

4444
- name: "Run analysis"
45-
uses: ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2
45+
uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1
4646
with:
4747
results_file: results.sarif
4848
results_format: sarif
@@ -64,14 +64,14 @@ jobs:
6464
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
6565
# format to the repository Actions tab.
6666
- name: "Upload artifact"
67-
uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0
67+
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
6868
with:
6969
name: SARIF file
7070
path: results.sarif
7171
retention-days: 5
7272

7373
# Upload the results to GitHub's code scanning dashboard.
7474
- name: "Upload to code-scanning"
75-
uses: github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4
75+
uses: github/codeql-action/upload-sarif@bc02a25f6449997c5e9d5a368879b28f56ae19a1
7676
with:
7777
sarif_file: results.sarif

.github/workflows/test.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ jobs:
1717
contents: read
1818
runs-on: ubuntu-latest
1919
steps:
20-
- uses: step-security/harden-runner@5c7944e73c4c2a096b17a9cb74d65b6c2bbafbde # v2.9.1
20+
- uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0
2121
with:
2222
allowed-endpoints: >
2323
api.github.com:443
@@ -30,15 +30,15 @@ jobs:
3030
objects.githubusercontent.com:443
3131
golang.org:443
3232
- name: Checkout
33-
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
33+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
3434
with:
3535
ref: ${{ github.event.pull_request.head.sha }}
3636
- name: Set up Go
37-
uses: actions/setup-go@37335c7bb261b353407cff977110895fa0b4f7d8 # v2.1.3
37+
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5
3838
with:
3939
go-version: 1.17
4040
- name: Run coverage
4141
run: go test ./... -coverpkg=./... -race -coverprofile=coverage.txt -covermode=atomic
4242
env:
4343
PAT: ${{ secrets.GITHUB_TOKEN }}
44-
- uses: codecov/codecov-action@f32b3a3741e1053eb607407145bc9619351dc93b # v2
44+
- uses: codecov/codecov-action@18283e04ce6e62d37312384ff67231eb8fd56d24

0 commit comments

Comments
 (0)