bottom/.github/workflows/audit.yml

36 lines
1.0 KiB
YAML
Raw Normal View History

# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of.
name: audit
2020-11-01 01:40:50 +01:00
on:
workflow_dispatch:
2020-11-01 01:40:50 +01:00
schedule:
- cron: "0 0 * * 1"
2020-11-01 01:40:50 +01:00
jobs:
audit:
timeout-minutes: 18
2020-11-01 01:40:50 +01:00
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
- name: Set up Rust toolchain
uses: dtolnay/rust-toolchain@b44cb146d03e8d870c57ab64b80f04586349ca5d
2020-11-01 01:40:50 +01:00
with:
toolchain: stable
- name: Enable Rust cache
uses: Swatinem/rust-cache@988c164c3d0e93c4dbab36aaf5bbeb77425b2894 # 2.4.0
with:
cache-targets: false
cache-all-crates: true
cache-on-failure: true
- name: Install cargo-audit
run: |
cargo install cargo-audit --locked
rm -rf ~/.cargo/registry || echo "no registry to delete"
- uses: rustsec/audit-check@dd51754d4e59da7395a4cd9b593f0ff2d61a9b95 # v1.4.1
2020-11-01 01:40:50 +01:00
with:
token: ${{ secrets.GITHUB_TOKEN }}