Files
bottom/.github/workflows/audit.yml
T
Clement Tsang 2c13683eb3 ci: pin and update some workflow actions (#1145)
* ci: pin and update some workflow actions

* also update setup-python

* and rust-toolchain
2023-05-11 00:42:39 -04:00

28 lines
778 B
YAML

# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of.
name: audit
on:
workflow_dispatch:
schedule:
- cron: "0 0 * * 1"
jobs:
audit:
timeout-minutes: 18
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
- name: Set up Rust toolchain
uses: dtolnay/rust-toolchain@b44cb146d03e8d870c57ab64b80f04586349ca5d
with:
toolchain: stable
- name: Install cargo-audit
run: |
cargo install cargo-audit --locked
- uses: rustsec/audit-check@dd51754d4e59da7395a4cd9b593f0ff2d61a9b95 # v1.4.1
with:
token: ${{ secrets.GITHUB_TOKEN }}