Skip to content

Commit 279f577

Browse files
authored
Security remediation 1735478746 (#2016)
1 parent 09fec70 commit 279f577

File tree

1 file changed

+28
-28
lines changed

1 file changed

+28
-28
lines changed

.github/workflows/scorecard.yml

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,41 +1,26 @@
1-
# This workflow uses actions that are not certified by GitHub. They are provided
2-
# by a third-party and are governed by separate terms of service, privacy
3-
# policy, and support documentation.
4-
5-
name: Scorecard supply-chain security
1+
name: Scorecard analysis workflow
62
on:
7-
# For Branch-Protection check. Only the default branch is supported. See
8-
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9-
branch_protection_rule:
10-
# To guarantee Maintained check is occasionally updated. See
11-
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
12-
schedule:
13-
- cron: '20 8 * * 4'
143
push:
15-
branches: [ "develop" ]
4+
# Only the default branch is supported.
5+
branches:
6+
- develop
7+
schedule:
8+
# Weekly on Saturdays.
9+
- cron: '30 1 * * 6'
1610

17-
# Declare default permissions as read only.
1811
permissions: read-all
1912

2013
jobs:
2114
analysis:
2215
name: Scorecard analysis
23-
runs-on: blacksmith-4vcpu-ubuntu-2204
16+
runs-on: ubuntu-latest
2417
permissions:
25-
# Needed to upload the results to code-scanning dashboard.
18+
# Needed for Code scanning upload
2619
security-events: write
27-
# Needed to publish results and get a badge (see publish_results below).
20+
# Needed for GitHub OIDC token if publish_results is true
2821
id-token: write
29-
# Uncomment the permissions below if installing in a private repository.
30-
# contents: read
31-
# actions: read
3222

3323
steps:
34-
- name: Harden Runner
35-
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
36-
with:
37-
egress-policy: audit
38-
3924
- name: "Checkout code"
4025
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
4126
with:
@@ -48,10 +33,25 @@ jobs:
4833
results_file: results.sarif
4934
# OUTPUT: format of the results [json, sarif]
5035
results_format: sarif
51-
# INPUT: Publish results
52-
publish_results: true
36+
# Scorecard team runs a weekly scan of public GitHub repos,
37+
# see https://github.com/ossf/scorecard#public-data.
38+
# Setting `publish_results: true` helps us scale by leveraging your workflow to
39+
# extract the results instead of relying on our own infrastructure to run scans.
40+
# And it's free for you!
41+
publish_results: true
42+
43+
# Upload the results as artifacts (optional). Commenting out will disable
44+
# uploads of run results in SARIF format to the repository Actions tab.
45+
# https://docs.github.com/en/actions/advanced-guides/storing-workflow-data-as-artifacts
46+
- name: "Upload artifact"
47+
uses: actions/upload-artifact@6f51ac03b9356f520e9adb1b1b7802705f340c2b # v4.5.0
48+
with:
49+
name: SARIF file
50+
path: results.sarif
51+
retention-days: 5
5352

54-
# Upload the results to GitHub's code scanning dashboard.
53+
# Upload the results to GitHub's code scanning dashboard (optional).
54+
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
5555
- name: "Upload to code-scanning"
5656
uses: github/codeql-action/upload-sarif@48ab28a6f5dbc2a99bf1e0131198dd8f1df78169 # v3.28.0
5757
with:

0 commit comments

Comments
 (0)