Skip to content

Commit 20f7a2f

Browse files
Sync main from dev (#219)
* Add dependabot configuration (#216) * Add Semgrep security scanning workflow (#217) * chore: Pinned to v1.6.0 of aws-github-ops/handle-stale-discussions so that closed GitHub discussions are not auto-reopened. --------- Co-authored-by: Garrett Beatty <[email protected]>
1 parent 909cfee commit 20f7a2f

File tree

3 files changed

+55
-1
lines changed

3 files changed

+55
-1
lines changed

.github/dependabot.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# Set update schedule for GitHub Actions
2+
3+
version: 2
4+
updates:
5+
6+
- package-ecosystem: "github-actions"
7+
directory: "/"
8+
schedule:
9+
# Check for updates to GitHub Actions every week
10+
interval: "weekly"
11+
labels:
12+
- "Release Not Needed"
13+
target-branch: "dev"

.github/workflows/handle-stale-discussions.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,6 @@ jobs:
1313
discussions: write
1414
steps:
1515
- name: Stale discussions action
16-
uses: aws-github-ops/handle-stale-discussions@711a9813957be17629fc6933afcd8bd132c57254 #v1.6
16+
uses: aws-github-ops/handle-stale-discussions@c0beee451a5d33d9c8f048a6d4e7c856b5422544 #v1.6.0
1717
env:
1818
GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
name: Semgrep
2+
3+
on:
4+
# Scan changed files in PRs, block on new issues only (existing issues ignored)
5+
pull_request:
6+
7+
push:
8+
branches: ["dev", "main"]
9+
10+
schedule:
11+
- cron: '23 20 * * 1'
12+
13+
# Manually trigger the workflow
14+
workflow_dispatch:
15+
16+
jobs:
17+
semgrep:
18+
name: Scan
19+
permissions:
20+
security-events: write
21+
runs-on: ubuntu-latest
22+
container:
23+
image: returntocorp/semgrep
24+
# Skip any PR created by dependabot to avoid permission issues
25+
if: (github.actor != 'dependabot[bot]')
26+
steps:
27+
# Fetch project source
28+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 #v4.2.2
29+
30+
- run: semgrep ci --sarif > semgrep.sarif
31+
env:
32+
SEMGREP_RULES: >- # more at semgrep.dev/explore
33+
p/security-audit
34+
p/secrets
35+
p/owasp-top-ten
36+
37+
- name: Upload SARIF file for GitHub Advanced Security Dashboard
38+
uses: github/codeql-action/upload-sarif@28deaeda66b76a05916b6923827895f2b14ab387 #v3.28.16
39+
with:
40+
sarif_file: semgrep.sarif
41+
if: always()

0 commit comments

Comments
 (0)