Skip to content

Commit 0e89b60

Browse files
authored
Merge pull request #1883 from kleros/dev
Release v4.0.7
2 parents be6d5f9 + 3e1118d commit 0e89b60

File tree

115 files changed

+2377
-5852
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

115 files changed

+2377
-5852
lines changed

.github/CODEOWNERS

+7
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Default
2+
* @kleros/maintainers-court-v2-frontend
3+
contracts @jaybuidl
4+
5+
# Owned by everyone
6+
yarn.lock @kleros/devs
7+
.gitignore @kleros/devs

.github/workflows/codeql.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -38,12 +38,12 @@ jobs:
3838

3939
steps:
4040
- name: Harden Runner
41-
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423 # v2.6.0
41+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
4242
with:
4343
egress-policy: audit
4444

4545
- name: Checkout repository
46-
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
46+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
4747

4848
# Initializes the CodeQL tools for scanning.
4949
- name: Initialize CodeQL

.github/workflows/contracts-testing.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ jobs:
2424
runs-on: ubuntu-latest
2525
steps:
2626
- name: Harden Runner
27-
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
27+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
2828
with:
2929
disable-sudo: true
3030
egress-policy: block

.github/workflows/dependabot-automerge.yml

-37
This file was deleted.

.github/workflows/dependency-review.yml

+6-5
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
#
33
# This Action will scan dependency manifest files that change as part of a Pull Request,
44
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5-
# Once installed, if the workflow run is marked as required,
5+
# Once installed, if the workflow run is marked as required,
66
# PRs introducing known-vulnerable packages will be blocked from merging.
77
#
88
# Source repository: https://github.com/actions/dependency-review-action
99
name: 'Dependency Review'
10-
on:
10+
on:
1111
merge_group:
1212
pull_request:
1313

@@ -19,21 +19,22 @@ jobs:
1919
runs-on: ubuntu-latest
2020
steps:
2121
- name: Harden Runner
22-
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423 # v2.6.0
22+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
2323
with:
2424
disable-sudo: true
2525
egress-policy: block
2626
allowed-endpoints: >
2727
api.github.com:443
28+
api.deps.dev:443
2829
github.com:443
2930
pipelinesghubeus2.actions.githubusercontent.com:443
3031
acghubeus1.actions.githubusercontent.com:443
3132
3233
- name: 'Checkout Repository'
33-
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
34+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
3435

3536
- name: 'Dependency Review'
36-
uses: actions/dependency-review-action@f6fff72a3217f580d5afd49a46826795305b63c7 # v3.0.8
37+
uses: actions/dependency-review-action@3b139cfc5fae8b618d3eae3675e383bb1769c019 # v4.5.0
3738
with:
3839
base-ref: ${{ github.event.pull_request.base.sha || 'dev' }}
3940
head-ref: ${{ github.event.pull_request.head.sha || github.ref }}

.github/workflows/deploy-bots.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ jobs:
88
runs-on: ubuntu-latest
99
steps:
1010
- name: Harden Runner
11-
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423
11+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
1212
with:
1313
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
1414

.github/workflows/deploy-subgraph.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ jobs:
3535
environment: ${{ inputs.graph_environment }}
3636
steps:
3737
- name: Harden Runner
38-
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423 # v2.5.0
38+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
3939
with:
4040
egress-policy: audit
4141

@@ -44,10 +44,10 @@ jobs:
4444
run: echo ${{vars.NETWORK}} && exit 1
4545

4646
- name: Checkout code
47-
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
47+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
4848

4949
- name: Set up Node.js
50-
uses: actions/setup-node@5e21ff4d9bc1a8cf6de233a3057d20ec6b3fb69d # v3.8.1
50+
uses: actions/setup-node@1d0ff469b7ec7b3cb9d8673fde0c81c44821de2a # v4.2.0
5151
with:
5252
node-version: 20
5353

.github/workflows/scorecards.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232

3333
steps:
3434
- name: Harden Runner
35-
uses: step-security/harden-runner@1b05615854632b887b69ae1be8cbefe72d3ae423 # v2.5.0
35+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
3636
with:
3737
disable-sudo: true
3838
egress-policy: block
@@ -51,7 +51,7 @@ jobs:
5151
sigstore-tuf-root.storage.googleapis.com:443
5252
5353
- name: "Checkout code"
54-
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
54+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
5555
with:
5656
persist-credentials: false
5757

@@ -78,7 +78,7 @@ jobs:
7878
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
7979
# format to the repository Actions tab.
8080
- name: "Upload artifact"
81-
uses: actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # v3.1.2
81+
uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
8282
with:
8383
name: SARIF file
8484
path: results.sarif

.github/workflows/sentry-release.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ jobs:
1717
version: ${{ steps.set-version.outputs.version }}
1818
steps:
1919
- name: Harden Runner
20-
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
20+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
2121
with:
2222
disable-sudo: true
2323
egress-policy: block
@@ -72,7 +72,7 @@ jobs:
7272
working-directory: web
7373

7474
- name: Create Sentry release
75-
uses: getsentry/action-release@v1
75+
uses: getsentry/action-release@f6dfa3d84a1c740b94aa45255c5e032b744a095d # v1.9.0
7676
env:
7777
SENTRY_AUTH_TOKEN: ${{ secrets.SENTRY_AUTH_TOKEN }}
7878
SENTRY_ORG: ${{ secrets.SENTRY_ORG }}

.github/workflows/sonarcloud.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ jobs:
1919
runs-on: ubuntu-latest
2020
steps:
2121
- name: Harden Runner
22-
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
22+
uses: step-security/harden-runner@446798f8213ac2e75931c1b0769676d927801858 # v2.10.3
2323
with:
2424
egress-policy: audit
2525

26-
- uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 # v3.6.0
26+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2727
with:
2828
fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis
2929

0 commit comments

Comments
 (0)