File tree Expand file tree Collapse file tree 7 files changed +51
-10
lines changed
Expand file tree Collapse file tree 7 files changed +51
-10
lines changed Original file line number Diff line number Diff line change 1616 runs-on : ubuntu-latest
1717 steps :
1818 - name : Configure AWS Credentials
19- uses : aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4
19+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4
2020 with :
2121 role-to-assume : ${{ secrets.CI_MAIN_TESTING_ACCOUNT_ROLE_ARN }}
2222 role-duration-seconds : 7200
2929 $roleArn=$(cat ./response.json)
3030 "roleArn=$($roleArn -replace '"', '')" >> $env:GITHUB_OUTPUT
3131 - name : Configure Test Runner Credentials
32- uses : aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4
32+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4
3333 with :
3434 role-to-assume : ${{ steps.lambda.outputs.roleArn }}
3535 role-duration-seconds : 7200
Original file line number Diff line number Diff line change @@ -12,11 +12,11 @@ jobs:
1212
1313 steps :
1414 - name : Checkout PR code
15- uses : actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 # v3.6.0
15+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
1616
1717 - name : Get List of Changed Files
1818 id : changed-files
19- uses : tj-actions/changed-files@4edd678ac3f81e2dc578756871e4d00c19191daf # v45
19+ uses : tj-actions/changed-files@ed68ef82c095e0d48ec87eccea555d944a631a4c # v45
2020
2121 - name : Check for Change File(s) in .autover/changes/
2222 run : |
Original file line number Diff line number Diff line change @@ -25,13 +25,13 @@ jobs:
2525 steps :
2626 # Assume an AWS Role that provides access to the Access Token
2727 - name : Configure AWS Credentials
28- uses : aws-actions/configure-aws-credentials@8c3f20df09ac63af7b3ae3d7c91f105f857d8497 # v4
28+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4
2929 with :
3030 role-to-assume : ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_ROLE_ARN }}
3131 aws-region : us-west-2
3232 # Retrieve the Access Token from Secrets Manager
3333 - name : Retrieve secret from AWS Secrets Manager
34- uses : aws-actions/aws-secretsmanager-get-secrets@fbd65ea98e018858715f591f03b251f02b2316cb # v2.0.8
34+ uses : aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 # v2.0.9
3535 with :
3636 secret-ids : |
3737 AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }}
Original file line number Diff line number Diff line change 2828 - name : Checkout
2929 uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
3030 - name : Dotnet Setup
31- uses : actions/setup-dotnet@4d6c8fcf3c8f7a60068d26b594648e99df24cee3 # v4.0.0
31+ uses : actions/setup-dotnet@67a3573c9a986a3f9c594539f4ab511d57bb3ce9 # v4.3.1
3232 with :
3333 dotnet-version : 8.x
3434
Original file line number Diff line number Diff line change 1313 discussions : write
1414 steps :
1515 - name : Stale discussions action
16- uses : aws-github-ops/handle-stale-discussions@711a9813957be17629fc6933afcd8bd132c57254 # v1.6
16+ uses : aws-github-ops/handle-stale-discussions@c0beee451a5d33d9c8f048a6d4e7c856b5422544 # v1.6.0
1717 env :
1818 GITHUB_TOKEN : ${{secrets.GITHUB_TOKEN}}
Original file line number Diff line number Diff line change 1+ name : Semgrep
2+
3+ on :
4+ # Scan changed files in PRs, block on new issues only (existing issues ignored)
5+ pull_request :
6+
7+ push :
8+ branches : ["dev", "main"]
9+
10+ schedule :
11+ - cron : ' 23 20 * * 1'
12+
13+ # Manually trigger the workflow
14+ workflow_dispatch :
15+
16+ jobs :
17+ semgrep :
18+ name : Scan
19+ permissions :
20+ security-events : write
21+ runs-on : ubuntu-latest
22+ container :
23+ image : returntocorp/semgrep
24+ # Skip any PR created by dependabot to avoid permission issues
25+ if : (github.actor != 'dependabot[bot]')
26+ steps :
27+ # Fetch project source
28+ - uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
29+
30+ - run : semgrep ci --sarif > semgrep.sarif
31+ env :
32+ SEMGREP_RULES : >- # more at semgrep.dev/explore
33+ p/security-audit
34+ p/secrets
35+ p/owasp-top-ten
36+
37+ - name : Upload SARIF file for GitHub Advanced Security Dashboard
38+ uses : github/codeql-action/upload-sarif@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
39+ with :
40+ sarif_file : semgrep.sarif
41+ if : always()
Original file line number Diff line number Diff line change @@ -27,13 +27,13 @@ jobs:
2727 steps :
2828 # Assume an AWS Role that provides access to the Access Token
2929 - name : Configure AWS Credentials
30- uses : aws-actions/configure-aws-credentials@8c3f20df09ac63af7b3ae3d7c91f105f857d8497 # v4
30+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4
3131 with :
3232 role-to-assume : ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_ROLE_ARN }}
3333 aws-region : us-west-2
3434 # Retrieve the Access Token from Secrets Manager
3535 - name : Retrieve secret from AWS Secrets Manager
36- uses : aws-actions/aws-secretsmanager-get-secrets@fbd65ea98e018858715f591f03b251f02b2316cb # v2.0.8
36+ uses : aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 # v2.0.9
3737 with :
3838 secret-ids : |
3939 AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }}
You can’t perform that action at this time.
0 commit comments