From 359d7efb2a4fda1fdd75f7cde676dec03b8d91b6 Mon Sep 17 00:00:00 2001 From: Sebastian Bogan Date: Fri, 26 Jul 2024 08:19:11 +0200 Subject: [PATCH] cleanup actions --- .github/workflows/release.yml | 30 ---------------- .github/workflows/scorecards.yml | 62 -------------------------------- .github/workflows/test.yml | 22 ++++++------ options_test.go | 2 +- 4 files changed, 12 insertions(+), 104 deletions(-) delete mode 100644 .github/workflows/release.yml delete mode 100644 .github/workflows/scorecards.yml diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml deleted file mode 100644 index 910059d..0000000 --- a/.github/workflows/release.yml +++ /dev/null @@ -1,30 +0,0 @@ -on: - push: - # Sequence of patterns matched against refs/tags - tags: - - 'v*' # Push events to matching v*, i.e. v1.0, v20.15.10 - -name: Create Release - -jobs: - build: - name: Create Release - runs-on: ubuntu-latest - steps: - - name: Checkout code - uses: actions/checkout@v2 - - name: Create Release - id: create_release - uses: actions/create-release@v1 - env: - GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # This token is provided by Actions, you do not need to create your own token - with: - tag_name: ${{ github.ref }} - release_name: ${{ github.ref }} - body: "" - draft: false - prerelease: false - - name: Update Index - run: | - curl -s "https://sum.golang.org/lookup/github.com/${GITHUB_REPOSITORY}@${GITHUB_REF##*/}" - curl -s "https://proxy.golang.org/github.com/${GITHUB_REPOSITORY}/@v/${GITHUB_REF##*/}.info" diff --git a/.github/workflows/scorecards.yml b/.github/workflows/scorecards.yml deleted file mode 100644 index 51829b7..0000000 --- a/.github/workflows/scorecards.yml +++ /dev/null @@ -1,62 +0,0 @@ -name: Scorecards supply-chain security -on: - # Only the default branch is supported. - branch_protection_rule: - schedule: - - cron: '45 22 * * 0' - push: - branches: [ "master" ] - -# Declare default permissions as read only. -permissions: read-all - -jobs: - analysis: - name: Scorecards analysis - runs-on: ubuntu-latest - permissions: - # Needed to upload the results to code-scanning dashboard. - security-events: write - # Used to receive a badge. (Upcoming feature) - id-token: write - # Needs for private repositories. - contents: read - actions: read - - steps: - - name: "Checkout code" - uses: actions/checkout@a12a3943b4bdde767164f792f33f40b04645d846 # v3.0.0 - with: - persist-credentials: false - - - name: "Run analysis" - uses: ossf/scorecard-action@3e15ea8318eee9b333819ec77a36aca8d39df13e # v1.1.1 - with: - results_file: results.sarif - results_format: sarif - # (Optional) Read-only PAT token. Uncomment the `repo_token` line below if: - # - you want to enable the Branch-Protection check on a *public* repository, or - # - you are installing Scorecards on a *private* repository - # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat. - # repo_token: ${{ secrets.SCORECARD_READ_TOKEN }} - - # Publish the results for public repositories to enable scorecard badges. For more details, see - # https://github.com/ossf/scorecard-action#publishing-results. - # For private repositories, `publish_results` will automatically be set to `false`, regardless - # of the value entered here. - publish_results: true - - # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF - # format to the repository Actions tab. - - name: "Upload artifact" - uses: actions/upload-artifact@6673cd052c4cd6fcf4b4e6e60ea986c889389535 # v3.0.0 - with: - name: SARIF file - path: results.sarif - retention-days: 5 - - # Upload the results to GitHub's code scanning dashboard. - - name: "Upload to code-scanning" - uses: github/codeql-action/upload-sarif@5f532563584d71fdef14ee64d17bafb34f751ce5 # v1.0.26 - with: - sarif_file: results.sarif diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index 2b092aa..1d0ef90 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -11,21 +11,21 @@ jobs: lint: runs-on: ubuntu-latest steps: - - name: Install Go - uses: actions/setup-go@v3 - with: - go-version: '1.17' - - name: Checkout Code - uses: actions/checkout@v3 - - name: Run Linters - uses: golangci/golangci-lint-action@v3 - with: - version: v1.43 + - name: Install Go + uses: actions/setup-go@v3 + with: + go-version: '1.20' + - name: Checkout Code + uses: actions/checkout@v3 + - name: Run Linters + uses: golangci/golangci-lint-action@v3 + with: + version: v1.52.2 test: strategy: matrix: - go-version: ['1.15', '1.16', '1.17'] + go-version: ['1.20', '1.21', '1.22'] platform: [ubuntu-latest, macos-latest, windows-latest] runs-on: ${{ matrix.platform }} steps: diff --git a/options_test.go b/options_test.go index c78d2fa..19eda46 100644 --- a/options_test.go +++ b/options_test.go @@ -182,7 +182,7 @@ func TestOverrideVertexHashFunOption(t *testing.T) { dag.ReduceTransitively() dag.FlushCaches() - dag.DescendantsWalker(vertexId1) + dag.DescendantsWalker(vertexId1) // nolint:errcheck mv := newMarshalVisitor(dag) dag.DFSWalk(mv)