Skip to content

[StepSecurity] Apply security best practices #139

[StepSecurity] Apply security best practices

[StepSecurity] Apply security best practices #139

Workflow file for this run

name: Go
on:
push:
branches: [ master ]
pull_request:
branches: [ master ]
permissions:
contents: read
jobs:
build:
name: Build + Test Stable
runs-on: ubuntu-latest
env:
GO111MODULE: auto
steps:
- name: Harden Runner
uses: step-security/harden-runner@a4aa98b93cab29d9b1101a6143fb8bce00e2eac4 # v2.7.1
with:
egress-policy: audit
- name: Build
uses: actions/setup-go@bfdd3570ce990073878bf10f6b2d79082de49492 # v2.2.0
with:
go-version: '1.19.x'
- name: Check out code into the Go module directory
uses: actions/checkout@ee0669bd1cc54295c223e0bb666b733df41de1c5 # v2.7.0
- name: Build
run: go build -v ./...
- name: Test
run: go test ./... -race -coverprofile=coverage.txt -covermode=atomic
- name: Coverage
uses: codecov/codecov-action@f32b3a3741e1053eb607407145bc9619351dc93b # v2.1.0
build-legacy:
name: Build + Test Previous Stable
runs-on: ubuntu-latest
env:
GO111MODULE: auto
steps:
- name: Harden Runner
uses: step-security/harden-runner@a4aa98b93cab29d9b1101a6143fb8bce00e2eac4 # v2.7.1
with:
egress-policy: audit
- name: Build
uses: actions/setup-go@bfdd3570ce990073878bf10f6b2d79082de49492 # v2.2.0
with:
go-version: '1.18.x'
- name: Check out code into the Go module directory
uses: actions/checkout@ee0669bd1cc54295c223e0bb666b733df41de1c5 # v2.7.0
- name: Build
run: go build -v ./...
- name: Test
run: go test ./...