@@ -34,22 +34,22 @@ jobs:
34
34
GITHUB_TOKEN : ${{ secrets.SERVICE_USER_GITHUB_TOKEN }}
35
35
steps :
36
36
- name : Checkout
37
- uses : actions/checkout@v3
37
+ uses : actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
38
38
- name : Set up Go
39
- uses : actions/setup-go@v3
39
+ uses : actions/setup-go@d0a58c1c4d2b25278816e339b944508c875f3613 # v3.4.0
40
40
with :
41
41
go-version : ${{ inputs.go-version }}
42
42
- name : Install tools to get tparse
43
43
run : make tools
44
44
- name : Set up Terraform
45
- uses : hashicorp/setup-terraform@v2
45
+ uses : hashicorp/setup-terraform@633666f66e0061ca3b725c73b2ec20cd13a8fdd1 # TSCCR: could not find tsccr entry for hashicorp/setup-terraform
46
46
with :
47
47
# the terraform wrapper will break Terraform execution in enos because
48
48
# it changes the output to text when we expect it to be JSON.
49
49
terraform_wrapper : false
50
50
- name : Import GPG key for Boundary pass keystore
51
51
id : import_gpg
52
- uses : crazy-max/ghaction-import-gpg@v5
52
+ uses : crazy-max/ghaction-import-gpg@111c56156bcc6918c056dbef52164cfa583dc549 # TSCCR: could not find tsccr entry for crazy-max/ghaction-import-gpg
53
53
with :
54
54
gpg_private_key : ${{ secrets.ENOS_GPG_PRIVATE_KEY }}
55
55
passphrase : ${{ secrets.ENOS_GPG_PASSPHRASE }}
60
60
echo "trusted-key ${{ secrets.ENOS_GPG_UID }}" >> ~/.gnupg/gpg.conf
61
61
cat ~/.gnupg/gpg.conf
62
62
- name : Configure AWS credentials
63
- uses : aws-actions/configure-aws-credentials@v1-node16
63
+ uses : aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # TSCCR: could not find tsccr entry for aws-actions/configure-aws-credentials
64
64
with :
65
65
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID_CI }}
66
66
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY_CI }}
69
69
role-skip-session-tagging : true
70
70
role-duration-seconds : 3600
71
71
- name : Set up Enos
72
- uses : hashicorp/action-setup-enos@v1
72
+ uses : hashicorp/action-setup-enos@v1 # TSCCR: could not find tsccr entry for hashicorp/action-setup-enos
73
73
with :
74
74
github-token : ${{ secrets.SERVICE_USER_GITHUB_TOKEN }}
75
75
- name : Set up AWS SSH private key
79
79
chmod 600 ./enos/support/private_key.pem
80
80
- name : Set up dependency cache
81
81
id : dep-cache
82
- uses : actions/cache@v3
82
+ uses : actions/cache@627f0f41f6904a5b1efbaed9f96d9eb58e92e920 # v3.2.4
83
83
with :
84
84
path : /tmp/test-deps
85
85
key : enos-test-deps-password-store-1.7.4-vault-1.12.2
@@ -110,7 +110,7 @@ jobs:
110
110
unzip /tmp/test-deps/vault.zip -d /usr/local/bin
111
111
- name : Download Linux AMD64 Boundary bundle
112
112
id : download
113
- uses : actions/download-artifact@v3
113
+ uses : actions/download-artifact@9bc31d5ccc31df68ecc42ccf4149144866c47d8a # v3.0.2
114
114
with :
115
115
name : ${{ inputs.artifact-name }}
116
116
path : ./enos/support/downloads
@@ -150,7 +150,7 @@ jobs:
150
150
export ENOS_VAR_enos_user=$GITHUB_ACTOR && \
151
151
enos scenario run --timeout 60m0s --chdir ./enos ${{ matrix.filter }}
152
152
- name : Upload e2e tests output
153
- uses : actions/upload-artifact@v3
153
+ uses : actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # v3.1.2
154
154
with :
155
155
name : test-e2e-output.zip
156
156
path : enos/test*.out
0 commit comments