File tree Expand file tree Collapse file tree 10 files changed +98
-0
lines changed Expand file tree Collapse file tree 10 files changed +98
-0
lines changed Original file line number Diff line number Diff line change 10
10
schedule :
11
11
- cron : ' 25 19 * * 2'
12
12
13
+ permissions :
14
+ contents : read
15
+
13
16
jobs :
14
17
analyze :
15
18
name : Analyze (${{ matrix.language }})
24
27
language : ['javascript-typescript', 'actions']
25
28
26
29
steps :
30
+ - name : Harden the runner (Audit all outbound calls)
31
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
32
+ with :
33
+ egress-policy : audit
34
+
27
35
- name : Checkout repository
28
36
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
29
37
with :
Original file line number Diff line number Diff line change
1
+ # Dependency Review Action
2
+ #
3
+ # This Action will scan dependency manifest files that change as part of a Pull Request,
4
+ # surfacing known-vulnerable versions of the packages declared or updated in the PR.
5
+ # Once installed, if the workflow run is marked as required,
6
+ # PRs introducing known-vulnerable packages will be blocked from merging.
7
+ #
8
+ # Source repository: https://github.com/actions/dependency-review-action
9
+ name : ' Dependency Review'
10
+ on : [pull_request]
11
+
12
+ permissions :
13
+ contents : read
14
+
15
+ jobs :
16
+ dependency-review :
17
+ runs-on : ubuntu-latest
18
+ steps :
19
+ - name : Harden the runner (Audit all outbound calls)
20
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
21
+ with :
22
+ egress-policy : audit
23
+
24
+ - name : ' Checkout Repository'
25
+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26
+ with :
27
+ persist-credentials : false
28
+ - name : ' Dependency Review'
29
+ uses : actions/dependency-review-action@da24556b548a50705dd671f47852072ea4c105d9 # v4.7.1
Original file line number Diff line number Diff line change 24
24
working-directory : ./lambdas
25
25
26
26
steps :
27
+ - name : Harden the runner (Audit all outbound calls)
28
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
29
+ with :
30
+ egress-policy : audit
31
+
27
32
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
28
33
with :
29
34
persist-credentials : false
Original file line number Diff line number Diff line change 19
19
id-token : write
20
20
21
21
steps :
22
+ - name : Harden the runner (Audit all outbound calls)
23
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
24
+ with :
25
+ egress-policy : audit
26
+
22
27
- name : " Checkout code"
23
28
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
24
29
with :
Original file line number Diff line number Diff line change 28
28
run :
29
29
working-directory : images/${{ matrix.image }}
30
30
steps :
31
+ - name : Harden the runner (Audit all outbound calls)
32
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
33
+ with :
34
+ egress-policy : audit
35
+
31
36
- name : " Checkout"
32
37
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
33
38
with :
Original file line number Diff line number Diff line change 6
6
- v1
7
7
workflow_dispatch :
8
8
9
+ permissions :
10
+ contents : read
11
+
9
12
jobs :
10
13
release :
11
14
name : Release
16
19
id-token : write
17
20
attestations : write
18
21
steps :
22
+ - name : Harden the runner (Audit all outbound calls)
23
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
24
+ with :
25
+ egress-policy : audit
26
+
19
27
- uses : actions/setup-node@49933ea5288caeca8642d1e84afbd3f7d6820020 # v4.4.0
20
28
with :
21
29
node-version : 22
Original file line number Diff line number Diff line change 13
13
name : Semantic Commit Message Check
14
14
runs-on : ubuntu-latest
15
15
steps :
16
+ - name : Harden the runner (Audit all outbound calls)
17
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
18
+ with :
19
+ egress-policy : audit
20
+
16
21
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
17
22
with :
18
23
persist-credentials : false
Original file line number Diff line number Diff line change 10
10
stale :
11
11
runs-on : ubuntu-latest
12
12
steps :
13
+ - name : Harden the runner (Audit all outbound calls)
14
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
15
+ with :
16
+ egress-policy : audit
17
+
13
18
- uses : actions/stale@5bef64f19d7facfb25b37b414482c7164d639639 # v9.1.0
14
19
with :
15
20
stale-issue-message : >
Original file line number Diff line number Diff line change 21
21
container :
22
22
image : hashicorp/terraform:${{ matrix.terraform }}
23
23
steps :
24
+ - name : Harden the runner (Audit all outbound calls)
25
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
26
+ with :
27
+ egress-policy : audit
28
+
24
29
- name : " Checkout"
25
30
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26
31
with :
90
95
container :
91
96
image : hashicorp/terraform:${{ matrix.terraform }}
92
97
steps :
98
+ - name : Harden the runner (Audit all outbound calls)
99
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
100
+ with :
101
+ egress-policy : audit
102
+
93
103
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
94
104
with :
95
105
persist-credentials : false
@@ -148,6 +158,11 @@ jobs:
148
158
container :
149
159
image : hashicorp/terraform:${{ matrix.terraform }}
150
160
steps :
161
+ - name : Harden the runner (Audit all outbound calls)
162
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
163
+ with :
164
+ egress-policy : audit
165
+
151
166
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
152
167
with :
153
168
persist-credentials : false
Original file line number Diff line number Diff line change 6
6
- " **/*.md"
7
7
- " .github/workflows/update-docs.yml"
8
8
9
+ permissions :
10
+ contents : read
11
+
9
12
jobs :
10
13
docs :
11
14
name : Auto update terraform docs
14
17
contents : write
15
18
pull-requests : write
16
19
steps :
20
+ - name : Harden the runner (Audit all outbound calls)
21
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
22
+ with :
23
+ egress-policy : audit
24
+
17
25
- name : Checkout with GITHUB Action token
18
26
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
19
27
with :
58
66
permissions :
59
67
contents : write
60
68
steps :
69
+ - name : Harden the runner (Audit all outbound calls)
70
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
71
+ with :
72
+ egress-policy : audit
73
+
61
74
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
62
75
- name : Configure Git Credentials
63
76
run : |
You can’t perform that action at this time.
0 commit comments