Skip to content

Commit 1180cb5

Browse files
authored
Merge branch 'main' into safer-chown-call
2 parents d1e5fae + a00a427 commit 1180cb5

File tree

10 files changed

+98
-0
lines changed

10 files changed

+98
-0
lines changed

.github/workflows/codeql.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ on:
1010
schedule:
1111
- cron: '25 19 * * 2'
1212

13+
permissions:
14+
contents: read
15+
1316
jobs:
1417
analyze:
1518
name: Analyze (${{ matrix.language }})
@@ -24,6 +27,11 @@ jobs:
2427
language: ['javascript-typescript', 'actions']
2528

2629
steps:
30+
- name: Harden the runner (Audit all outbound calls)
31+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
32+
with:
33+
egress-policy: audit
34+
2735
- name: Checkout repository
2836
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2937
with:
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required,
6+
# PRs introducing known-vulnerable packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
name: 'Dependency Review'
10+
on: [pull_request]
11+
12+
permissions:
13+
contents: read
14+
15+
jobs:
16+
dependency-review:
17+
runs-on: ubuntu-latest
18+
steps:
19+
- name: Harden the runner (Audit all outbound calls)
20+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
21+
with:
22+
egress-policy: audit
23+
24+
- name: 'Checkout Repository'
25+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26+
with:
27+
persist-credentials: false
28+
- name: 'Dependency Review'
29+
uses: actions/dependency-review-action@da24556b548a50705dd671f47852072ea4c105d9 # v4.7.1

.github/workflows/lambda.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,11 @@ jobs:
2424
working-directory: ./lambdas
2525

2626
steps:
27+
- name: Harden the runner (Audit all outbound calls)
28+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
29+
with:
30+
egress-policy: audit
31+
2732
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2833
with:
2934
persist-credentials: false

.github/workflows/ossf-scorecard.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@ jobs:
1919
id-token: write
2020

2121
steps:
22+
- name: Harden the runner (Audit all outbound calls)
23+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
24+
with:
25+
egress-policy: audit
26+
2227
- name: "Checkout code"
2328
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2429
with:

.github/workflows/packer-build.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,11 @@ jobs:
2828
run:
2929
working-directory: images/${{ matrix.image }}
3030
steps:
31+
- name: Harden the runner (Audit all outbound calls)
32+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
33+
with:
34+
egress-policy: audit
35+
3136
- name: "Checkout"
3237
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
3338
with:

.github/workflows/release.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@ on:
66
- v1
77
workflow_dispatch:
88

9+
permissions:
10+
contents: read
11+
912
jobs:
1013
release:
1114
name: Release
@@ -16,6 +19,11 @@ jobs:
1619
id-token: write
1720
attestations: write
1821
steps:
22+
- name: Harden the runner (Audit all outbound calls)
23+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
24+
with:
25+
egress-policy: audit
26+
1927
- uses: actions/setup-node@49933ea5288caeca8642d1e84afbd3f7d6820020 # v4.4.0
2028
with:
2129
node-version: 22

.github/workflows/semantic-check.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,11 @@ jobs:
1313
name: Semantic Commit Message Check
1414
runs-on: ubuntu-latest
1515
steps:
16+
- name: Harden the runner (Audit all outbound calls)
17+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
18+
with:
19+
egress-policy: audit
20+
1621
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
1722
with:
1823
persist-credentials: false

.github/workflows/stale.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@ jobs:
1010
stale:
1111
runs-on: ubuntu-latest
1212
steps:
13+
- name: Harden the runner (Audit all outbound calls)
14+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
15+
with:
16+
egress-policy: audit
17+
1318
- uses: actions/stale@5bef64f19d7facfb25b37b414482c7164d639639 # v9.1.0
1419
with:
1520
stale-issue-message: >

.github/workflows/terraform.yml

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,11 @@ jobs:
2121
container:
2222
image: hashicorp/terraform:${{ matrix.terraform }}
2323
steps:
24+
- name: Harden the runner (Audit all outbound calls)
25+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
26+
with:
27+
egress-policy: audit
28+
2429
- name: "Checkout"
2530
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2631
with:
@@ -90,6 +95,11 @@ jobs:
9095
container:
9196
image: hashicorp/terraform:${{ matrix.terraform }}
9297
steps:
98+
- name: Harden the runner (Audit all outbound calls)
99+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
100+
with:
101+
egress-policy: audit
102+
93103
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
94104
with:
95105
persist-credentials: false
@@ -148,6 +158,11 @@ jobs:
148158
container:
149159
image: hashicorp/terraform:${{ matrix.terraform }}
150160
steps:
161+
- name: Harden the runner (Audit all outbound calls)
162+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
163+
with:
164+
egress-policy: audit
165+
151166
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
152167
with:
153168
persist-credentials: false

.github/workflows/update-docs.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@ on:
66
- "**/*.md"
77
- ".github/workflows/update-docs.yml"
88

9+
permissions:
10+
contents: read
11+
912
jobs:
1013
docs:
1114
name: Auto update terraform docs
@@ -14,6 +17,11 @@ jobs:
1417
contents: write
1518
pull-requests: write
1619
steps:
20+
- name: Harden the runner (Audit all outbound calls)
21+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
22+
with:
23+
egress-policy: audit
24+
1725
- name: Checkout with GITHUB Action token
1826
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
1927
with:
@@ -58,6 +66,11 @@ jobs:
5866
permissions:
5967
contents: write
6068
steps:
69+
- name: Harden the runner (Audit all outbound calls)
70+
uses: step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
71+
with:
72+
egress-policy: audit
73+
6174
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
6275
- name: Configure Git Credentials
6376
run: |

0 commit comments

Comments
 (0)