File tree Expand file tree Collapse file tree 20 files changed +292
-215
lines changed Expand file tree Collapse file tree 20 files changed +292
-215
lines changed Original file line number Diff line number Diff line change 51
51
path : results.sarif
52
52
53
53
- name : Upload SARIF file
54
- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
54
+ uses : github/codeql-action/upload-sarif@d6bbdef45e766d081b84a2def353b0055f728d3e # v3.29.3
55
55
with :
56
56
sarif_file : results.sarif
57
57
category : actions-zizmor
Original file line number Diff line number Diff line change 28
28
29
29
steps :
30
30
- name : Harden the runner (Audit all outbound calls)
31
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
31
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
32
32
with :
33
33
egress-policy : audit
34
34
@@ -39,12 +39,12 @@ jobs:
39
39
40
40
# Initializes the CodeQL tools for scanning.
41
41
- name : Initialize CodeQL
42
- uses : github/codeql-action/init@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
42
+ uses : github/codeql-action/init@d6bbdef45e766d081b84a2def353b0055f728d3e # v3.29.3
43
43
with :
44
44
languages : ${{ matrix.language }}
45
45
build-mode : none
46
46
47
47
- name : Perform CodeQL Analysis
48
- uses : github/codeql-action/analyze@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
48
+ uses : github/codeql-action/analyze@d6bbdef45e766d081b84a2def353b0055f728d3e # v3.29.3
49
49
with :
50
50
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change 9
9
name : ' Dependency Review'
10
10
on : [pull_request]
11
11
12
- permissions :
13
- contents : read
12
+ permissions : {}
14
13
15
14
jobs :
16
15
dependency-review :
17
16
runs-on : ubuntu-latest
17
+ permissions :
18
+ contents : read
19
+ pull-requests : write
18
20
steps :
19
21
- name : Harden the runner (Audit all outbound calls)
20
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
22
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
21
23
with :
22
24
egress-policy : audit
23
25
27
29
persist-credentials : false
28
30
- name : ' Dependency Review'
29
31
uses : actions/dependency-review-action@da24556b548a50705dd671f47852072ea4c105d9 # v4.7.1
32
+ with :
33
+ comment-summary-in-pr : always
Original file line number Diff line number Diff line change 25
25
26
26
steps :
27
27
- name : Harden the runner (Audit all outbound calls)
28
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
28
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
29
29
with :
30
30
egress-policy : audit
31
31
Original file line number Diff line number Diff line change 20
20
21
21
steps :
22
22
- name : Harden the runner (Audit all outbound calls)
23
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
23
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
24
24
with :
25
25
egress-policy : audit
26
26
48
48
# Upload the results to GitHub's code scanning dashboard (optional).
49
49
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
50
50
- name : " Upload to code-scanning"
51
- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b
51
+ uses : github/codeql-action/upload-sarif@d6bbdef45e766d081b84a2def353b0055f728d3e
52
52
with :
53
53
sarif_file : results.sarif
Original file line number Diff line number Diff line change 29
29
working-directory : images/${{ matrix.image }}
30
30
steps :
31
31
- name : Harden the runner (Audit all outbound calls)
32
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
32
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
33
33
with :
34
34
egress-policy : audit
35
35
Original file line number Diff line number Diff line change 20
20
attestations : write
21
21
steps :
22
22
- name : Harden the runner (Audit all outbound calls)
23
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
23
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
24
24
with :
25
25
egress-policy : audit
26
26
Original file line number Diff line number Diff line change 14
14
runs-on : ubuntu-latest
15
15
steps :
16
16
- name : Harden the runner (Audit all outbound calls)
17
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
17
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
18
18
with :
19
19
egress-policy : audit
20
20
Original file line number Diff line number Diff line change 11
11
runs-on : ubuntu-latest
12
12
steps :
13
13
- name : Harden the runner (Audit all outbound calls)
14
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
14
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
15
15
with :
16
16
egress-policy : audit
17
17
Original file line number Diff line number Diff line change 22
22
image : hashicorp/terraform:${{ matrix.terraform }}
23
23
steps :
24
24
- name : Harden the runner (Audit all outbound calls)
25
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
25
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
26
26
with :
27
27
egress-policy : audit
28
28
96
96
image : hashicorp/terraform:${{ matrix.terraform }}
97
97
steps :
98
98
- name : Harden the runner (Audit all outbound calls)
99
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
99
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
100
100
with :
101
101
egress-policy : audit
102
102
@@ -159,7 +159,7 @@ jobs:
159
159
image : hashicorp/terraform:${{ matrix.terraform }}
160
160
steps :
161
161
- name : Harden the runner (Audit all outbound calls)
162
- uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
162
+ uses : step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
163
163
with :
164
164
egress-policy : audit
165
165
You can’t perform that action at this time.
0 commit comments