36 lines
1.0 KiB
YAML
36 lines
1.0 KiB
YAML
# A routine check to see if there are any Rust-specific security vulnerabilities in the repo we should be aware of.
|
|
|
|
name: audit
|
|
on:
|
|
workflow_dispatch:
|
|
schedule:
|
|
- cron: "0 0 * * 1"
|
|
jobs:
|
|
audit:
|
|
timeout-minutes: 18
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Checkout repository
|
|
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
|
|
|
|
- name: Set up Rust toolchain
|
|
uses: dtolnay/rust-toolchain@b44cb146d03e8d870c57ab64b80f04586349ca5d
|
|
with:
|
|
toolchain: stable
|
|
|
|
- name: Enable Rust cache
|
|
uses: Swatinem/rust-cache@988c164c3d0e93c4dbab36aaf5bbeb77425b2894 # 2.4.0
|
|
with:
|
|
cache-targets: false
|
|
cache-all-crates: true
|
|
cache-on-failure: true
|
|
|
|
- name: Install cargo-audit
|
|
run: |
|
|
cargo install cargo-audit --locked
|
|
rm -rf ~/.cargo/registry || echo "no registry to delete"
|
|
|
|
- uses: rustsec/audit-check@dd51754d4e59da7395a4cd9b593f0ff2d61a9b95 # v1.4.1
|
|
with:
|
|
token: ${{ secrets.GITHUB_TOKEN }}
|