GitHub: use vendored actions for steps with sensitive info

To avoid leaking any sensitive information like Docker Hub credentials
because of compromised actions repositories, we use our own, vendored
actions for all steps that potentially touch sensitive information.
This commit is contained in:
Oliver Gugger 2021-01-25 14:16:00 +01:00
parent 39f51b5568
commit 1abf3e7847
No known key found for this signature in database
GPG Key ID: 8E4256593F177720
2 changed files with 5 additions and 5 deletions

View File

@ -18,13 +18,13 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Set up QEMU
uses: docker/setup-qemu-action@v1
uses: lightninglabs/gh-actions/setup-qemu-action@2021.01.25.00
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
uses: lightninglabs/gh-actions/setup-buildx-action@2021.01.25.00
- name: Login to DockerHub
uses: docker/login-action@v1
uses: lightninglabs/gh-actions/login-action@2021.01.25.00
with:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_API_KEY }}
@ -34,7 +34,7 @@ jobs:
- name: Build and push
id: docker_build
uses: docker/build-push-action@v2
uses: lightninglabs/gh-actions/build-push-action@2021.01.25.00
with:
push: true
platforms: linux/amd64,linux/arm64

View File

@ -51,7 +51,7 @@ jobs:
run: SKIP_VERSION_CHECK=1 make release tag=${{ env.RELEASE_VERSION }}
- name: Create Release
uses: softprops/action-gh-release@v1
uses: lightninglabs/gh-actions/action-gh-release@2021.01.25.00
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
with: