bottom/.github/workflows/audit.yml

27 lines
879 B
YAML
Raw Normal View History

# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of.
name: audit
2020-11-01 00:40:50 +00:00
on:
workflow_dispatch:
2020-11-01 00:40:50 +00:00
schedule:
- cron: "0 0 * * 1"
2020-11-01 00:40:50 +00:00
jobs:
audit:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v3
- name: Set up Rust toolchain
uses: dtolnay/rust-toolchain@ba37adf8f94a7d9affce79bd3baff1b9e3189c33 # https://github.com/dtolnay/rust-toolchain/commit/ba37adf8f94a7d9affce79bd3baff1b9e3189c33
2020-11-01 00:40:50 +00:00
with:
toolchain: stable
- name: Install cargo-audit
run: |
cargo install cargo-audit --locked
- uses: rustsec/audit-check@bb800784d9c5b0afa352b75dae201bf2e438960a # https://github.com/rustsec/audit-check/commit/bb800784d9c5b0afa352b75dae201bf2e438960a
2020-11-01 00:40:50 +00:00
with:
token: ${{ secrets.GITHUB_TOKEN }}