Skip to content

Commit 0ac8e61

Browse files
authored
Merge branch 'main' into update-astro-for-yarn
2 parents 0f4d223 + 4620c76 commit 0ac8e61

File tree

8 files changed

+38
-36
lines changed

8 files changed

+38
-36
lines changed

‎code-scanning/codeql.yml‎

Lines changed: 23 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ on:
2121

2222
jobs:
2323
analyze:
24-
name: Analyze
24+
name: Analyze (${{ matrix.language }})
2525
# Runner size impacts CodeQL analysis time. To learn more, please see:
2626
# - https://gh.io/recommended-hardware-resources-for-running-codeql
2727
# - https://gh.io/supported-runners-and-hardware-resources
@@ -40,12 +40,15 @@ jobs:
4040
strategy:
4141
fail-fast: false
4242
matrix:
43-
language: [ $detected-codeql-languages ]
44-
# CodeQL supports [ $supported-codeql-languages ]
45-
# Use only 'java-kotlin' to analyze code written in Java, Kotlin or both
46-
# Use only 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
47-
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support
48-
43+
$codeql-languages-matrix
44+
# CodeQL supports the following values keywords for 'language': $supported-codeql-languages
45+
# Use `c-cpp` to analyze code written in C, C++ or both
46+
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
47+
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
48+
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
49+
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
50+
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
51+
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
4952
steps:
5053
- name: Checkout repository
5154
uses: actions/checkout@v4
@@ -55,28 +58,28 @@ jobs:
5558
uses: github/codeql-action/init@v3
5659
with:
5760
languages: ${{ matrix.language }}
61+
build-mode: ${{ matrix.build-mode }}
5862
# If you wish to specify custom queries, you can do so here or in a config file.
5963
# By default, queries listed here will override any specified in a config file.
6064
# Prefix the list here with "+" to use these queries and those in the config file.
6165

6266
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
6367
# queries: security-extended,security-and-quality
6468

65-
66-
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
67-
# If this step fails, then you should remove it and run the build manually (see below)
68-
- name: Autobuild
69-
uses: github/codeql-action/autobuild@v3
70-
69+
# If the analyze step fails for one of the languages you are analyzing with
70+
# "We were unable to automatically build your code", modify the matrix above
71+
# to set the build mode to "manual" for that language. Then modify this step
72+
# to build your code.
7173
# ℹ️ Command-line programs to run using the OS shell.
7274
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
73-
74-
# If the Autobuild fails above, remove it and uncomment the following three lines.
75-
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
76-
77-
# - run: |
78-
# echo "Run, Build Application using script"
79-
# ./location_of_script_within_repo/buildscript.sh
75+
- if: matrix.build-mode == 'manual'
76+
run: |
77+
echo 'If you are using a "manual" build mode for one or more of the' \
78+
'languages you are analyzing, replace this with the commands to build' \
79+
'your code, for example:'
80+
echo ' make bootstrap'
81+
echo ' make release'
82+
exit 1
8083
8184
- name: Perform CodeQL Analysis
8285
uses: github/codeql-action/analyze@v3

‎code-scanning/detekt.yml‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
# 4. Manually, on demand, via the "workflow_dispatch" event
1414
#
1515
# The workflow should work with no modifications, but you might like to use a
16-
# later version of the Detekt CLI by modifing the $DETEKT_RELEASE_TAG
16+
# later version of the Detekt CLI by modifying the $DETEKT_RELEASE_TAG
1717
# environment variable.
1818
name: Scan with Detekt
1919

‎code-scanning/endorlabs.yml‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ jobs:
2424
uses: actions/checkout@v3
2525
#### Package Build Instructions
2626
### Use this section to define the build steps used by your software package.
27-
### Endor Labs builds your software for you where possible but the required build tools must be made availible.
27+
### Endor Labs builds your software for you where possible but the required build tools must be made available.
2828
# - name: Setup Java
2929
# uses: actions/setup-java@v3
3030
# with:

‎code-scanning/rust-clippy.yml‎

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
2929
steps:
3030
- name: Checkout code
31-
uses: actions/checkout@v2
31+
uses: actions/checkout@v4
3232

3333
- name: Install Rust toolchain
3434
uses: actions-rs/toolchain@16499b5e05bf2e26879000db0c1d13f7e13fa3af #@v1
@@ -52,4 +52,4 @@ jobs:
5252
uses: github/codeql-action/upload-sarif@v1
5353
with:
5454
sarif_file: rust-clippy-results.sarif
55-
wait-for-processing: true
55+
wait-for-processing: true

‎code-scanning/scorecard.yml‎

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,19 +32,19 @@ jobs:
3232

3333
steps:
3434
- name: "Checkout code"
35-
uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3.1.0
35+
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
3636
with:
3737
persist-credentials: false
3838

3939
- name: "Run analysis"
40-
uses: ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2
40+
uses: ossf/scorecard-action@0864cf19026789058feabb7e87baa5f140aac736 # v2.3.1
4141
with:
4242
results_file: results.sarif
4343
results_format: sarif
4444
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
4545
# - you want to enable the Branch-Protection check on a *public* repository, or
4646
# - you are installing Scorecard on a *private* repository
47-
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
47+
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action?tab=readme-ov-file#authentication-with-fine-grained-pat-optional.
4848
# repo_token: ${{ secrets.SCORECARD_TOKEN }}
4949

5050
# Public repositories:
@@ -59,14 +59,15 @@ jobs:
5959
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
6060
# format to the repository Actions tab.
6161
- name: "Upload artifact"
62-
uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0
62+
uses: actions/upload-artifact@97a0fba1372883ab732affbe8f94b823f91727db # v3.pre.node20
6363
with:
6464
name: SARIF file
6565
path: results.sarif
6666
retention-days: 5
6767

68-
# Upload the results to GitHub's code scanning dashboard.
68+
# Upload the results to GitHub's code scanning dashboard (optional).
69+
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
6970
- name: "Upload to code-scanning"
70-
uses: github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4
71+
uses: github/codeql-action/upload-sarif@1b1aada464948af03b950897e5eb522f92603cc2 # v3.24.9
7172
with:
7273
sarif_file: results.sarif

‎deployments/alibabacloud.yml‎

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ jobs:
4949

5050
steps:
5151
- name: Checkout
52-
uses: actions/checkout@v3
52+
uses: actions/checkout@v4
5353

5454
# 1.1 Login to ACR
5555
- name: Login to ACR with the AccessKey pair
@@ -59,7 +59,7 @@ jobs:
5959
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
6060
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
6161

62-
# 1.2 Buid and push image to ACR
62+
# 1.2 Build and push image to ACR
6363
- name: Build and push image to ACR
6464
run: |
6565
docker build --tag "$REGISTRY/$NAMESPACE/$IMAGE:$TAG" .

‎pages/hugo.yml‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
build:
3232
runs-on: ubuntu-latest
3333
env:
34-
HUGO_VERSION: 0.120.4
34+
HUGO_VERSION: 0.124.1
3535
steps:
3636
- name: Install Hugo CLI
3737
run: |

‎pages/nextjs.yml‎

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,10 +73,8 @@ jobs:
7373
${{ runner.os }}-nextjs-${{ hashFiles('**/package-lock.json', '**/yarn.lock') }}-
7474
- name: Install dependencies
7575
run: ${{ steps.detect-package-manager.outputs.manager }} ${{ steps.detect-package-manager.outputs.command }}
76-
- name: Build with Next.js
76+
- name: Build and Static HTML export with Next.js
7777
run: ${{ steps.detect-package-manager.outputs.runner }} next build
78-
- name: Static HTML export with Next.js
79-
run: ${{ steps.detect-package-manager.outputs.runner }} next export
8078
- name: Upload artifact
8179
uses: actions/upload-pages-artifact@v3
8280
with:

0 commit comments

Comments
 (0)