bottom/.github/workflows/audit.yml

31 lines
941 B
YAML
Raw Normal View History

# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of.
name: audit
2020-11-01 00:40:50 +00:00
on:
workflow_dispatch:
2020-11-01 00:40:50 +00:00
schedule:
- cron: "0 0 * * 1"
2020-11-01 00:40:50 +00:00
jobs:
audit:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
2022-05-01 19:47:30 +00:00
- uses: Swatinem/rust-cache@cb2cf0cc7c5198d3364b9630e2c3d457f160790c # 1.4.0
- name: Install toolchain
uses: actions-rs/toolchain@88dc2356392166efad76775c878094f4e83ff746 # https://github.com/actions-rs/toolchain/commit/88dc2356392166efad76775c878094f4e83ff746
2020-11-01 00:40:50 +00:00
with:
profile: minimal
toolchain: stable
override: true
target: ${{ matrix.triple.target }}
- name: Install cargo-audit
run: |
cargo install cargo-audit --locked
- uses: actions-rs/audit-check@35b7b53b1e25b55642157ac01b4adceb5b9ebef3 # 1.2.0
2020-11-01 00:40:50 +00:00
with:
token: ${{ secrets.GITHUB_TOKEN }}