Skip to content

Commit b6ea952

Browse files
Merge pull request #1987 from step-security/varunsh-coder-patch-2-1
Update scorecards.yml
2 parents ab21626 + d33b85f commit b6ea952

File tree

1 file changed

+32
-22
lines changed

1 file changed

+32
-22
lines changed

.github/workflows/scorecards.yml

Lines changed: 32 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,62 +1,72 @@
1-
name: Scorecards supply-chain security
1+
# This workflow uses actions that are not certified by GitHub. They are provided
2+
# by a third-party and are governed by separate terms of service, privacy
3+
# policy, and support documentation.
4+
5+
name: Scorecard supply-chain security
26
on:
3-
# Only the default branch is supported.
7+
# For Branch-Protection check. Only the default branch is supported. See
8+
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
49
branch_protection_rule:
10+
# To guarantee Maintained check is occasionally updated. See
11+
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
512
schedule:
6-
# Weekly on Saturdays.
7-
- cron: '30 1 * * 6'
13+
- cron: '33 16 * * 3'
814
push:
9-
branches: [ main, master ]
15+
branches: [ "main" ]
1016

1117
# Declare default permissions as read only.
1218
permissions: read-all
1319

1420
jobs:
1521
analysis:
16-
name: Scorecards analysis
22+
name: Scorecard analysis
1723
runs-on: ubuntu-latest
1824
permissions:
1925
# Needed to upload the results to code-scanning dashboard.
2026
security-events: write
21-
# Used to receive a badge. (Upcoming feature)
27+
# Needed to publish results and get a badge (see publish_results below).
2228
id-token: write
23-
actions: read
24-
contents: read
25-
29+
# Uncomment the permissions below if installing in a private repository.
30+
# contents: read
31+
# actions: read
32+
2633
steps:
2734
- name: "Checkout code"
28-
uses: actions/checkout@a12a3943b4bdde767164f792f33f40b04645d846 # tag=v3.0.0
35+
uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3.1.0
2936
with:
3037
persist-credentials: false
3138

3239
- name: "Run analysis"
33-
uses: ossf/scorecard-action@e363bfca00e752f91de7b7d2a77340e2e523cb18 # tag=v1.1.1
40+
uses: ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2
3441
with:
3542
results_file: results.sarif
3643
results_format: sarif
37-
# (Optional) Read-only PAT token. Uncomment the `repo_token` line below if:
44+
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
3845
# - you want to enable the Branch-Protection check on a *public* repository, or
39-
# - you are installing Scorecards on a *private* repository
46+
# - you are installing Scorecard on a *private* repository
4047
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
41-
# repo_token: ${{ secrets.SCORECARD_READ_TOKEN }}
48+
# repo_token: ${{ secrets.SCORECARD_TOKEN }}
4249

43-
# Publish the results for public repositories to enable scorecard badges. For more details, see
44-
# https://github.com/ossf/scorecard-action#publishing-results.
45-
# For private repositories, `publish_results` will automatically be set to `false`, regardless
46-
# of the value entered here.
50+
# Public repositories:
51+
# - Publish results to OpenSSF REST API for easy access by consumers
52+
# - Allows the repository to include the Scorecard badge.
53+
# - See https://github.com/ossf/scorecard-action#publishing-results.
54+
# For private repositories:
55+
# - `publish_results` will always be set to `false`, regardless
56+
# of the value entered here.
4757
publish_results: true
4858

4959
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
5060
# format to the repository Actions tab.
5161
- name: "Upload artifact"
52-
uses: actions/upload-artifact@6673cd052c4cd6fcf4b4e6e60ea986c889389535 # tag=v3.0.0
62+
uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0
5363
with:
5464
name: SARIF file
5565
path: results.sarif
5666
retention-days: 5
57-
67+
5868
# Upload the results to GitHub's code scanning dashboard.
5969
- name: "Upload to code-scanning"
60-
uses: github/codeql-action/upload-sarif@5f532563584d71fdef14ee64d17bafb34f751ce5 # tag=v1.0.26
70+
uses: github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4
6171
with:
6272
sarif_file: results.sarif

0 commit comments

Comments
 (0)