Skip to content

Commit a9a5bf4

Browse files
Add Dependabot configuration for managing GitHub Actions (#15)
1 parent 8e105cc commit a9a5bf4

File tree

3 files changed

+52
-36
lines changed

3 files changed

+52
-36
lines changed

.github/dependabot.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# This file is used by GitHub Dependabot to manage dependencies in the project.
2+
3+
version: 2
4+
updates:
5+
- package-ecosystem: github-actions
6+
directory: /
7+
schedule:
8+
interval: daily
9+
10+
- package-ecosystem: pip
11+
directory: /
12+
schedule:
13+
interval: daily

.github/workflows/ossf-scoreboard.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ on:
77
branch_protection_rule:
88
schedule:
99
- cron: '32 4 * * 5'
10+
pull_request:
11+
branches: [ "main" ]
12+
paths-ignore:
13+
- .github/workflows/ossf-scoreboard.yml
1014
push:
1115
branches: [ "main" ]
1216

.github/workflows/trivy.yml

Lines changed: 35 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,43 +1,42 @@
1-
---
2-
name: trivy
1+
name: trivy
32

4-
on:
5-
pull_request:
6-
types: [ 'opened', 'reopened', 'synchronize' ]
7-
merge_group:
8-
workflow_dispatch:
3+
on:
4+
pull_request:
5+
types: [ 'opened', 'reopened', 'synchronize' ]
6+
merge_group:
7+
workflow_dispatch:
98

9+
permissions: read-all
1010

11-
permissions:
12-
actions: read
13-
contents: read
14-
security-events: write
11+
jobs:
12+
build:
13+
name: 'trivy scan'
14+
runs-on: ubuntu-latest
15+
permissions:
16+
security-events: write
17+
contents: read
1518

16-
jobs:
17-
build:
18-
name: 'trivy scan'
19-
runs-on: ubuntu-latest
20-
steps:
21-
- name: Harden Runner
22-
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
23-
with:
24-
egress-policy: audit
19+
steps:
20+
- name: Harden Runner
21+
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
22+
with:
23+
egress-policy: audit
2524

26-
- name: Checkout code
27-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
25+
- name: Checkout code
26+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2827

29-
- name: Run Trivy vulnerability scanner (file system)
30-
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
31-
with:
32-
scan-type: 'fs'
33-
ignore-unfixed: true
34-
scan-ref: .
35-
format: 'sarif'
36-
scanners: 'vuln,secret,config'
37-
output: report-fs.sarif
28+
- name: Run Trivy vulnerability scanner (file system)
29+
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
30+
with:
31+
scan-type: 'fs'
32+
ignore-unfixed: true
33+
scan-ref: .
34+
format: 'sarif'
35+
scanners: 'vuln,secret,config'
36+
output: report-fs.sarif
3837

39-
- name: Upload Trivy report (fs) GitHub Security
40-
uses: github/codeql-action/upload-sarif@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd # v3.28.2
41-
with:
42-
sarif_file: report-fs.sarif
43-
category: 'fs'
38+
- name: Upload Trivy report (fs) GitHub Security
39+
uses: github/codeql-action/upload-sarif@9e8d0789d4a0fa9ceb6b1738f7e269594bdd67f0 # v3.28.9
40+
with:
41+
sarif_file: report-fs.sarif
42+
category: 'fs'

0 commit comments

Comments
 (0)