123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354 |
- name: Scorecards supply-chain security
- on:
- # Only the default branch is supported.
- branch_protection_rule:
- schedule:
- - cron: '44 17 * * 0'
- push:
- branches: [ "main" ]
- # Declare default permissions as read only.
- permissions: read-all
- jobs:
- analysis:
- name: Scorecards analysis
- runs-on: ubuntu-latest
- permissions:
- # Needed to upload the results to code-scanning dashboard.
- security-events: write
- # Used to receive a badge.
- id-token: write
- steps:
- - name: "Checkout code"
- uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # tag=v3.1.0
- with:
- persist-credentials: false
- - name: "Run analysis"
- uses: ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # tag=v2.1.2
- with:
- results_file: results.sarif
- results_format: sarif
- # Publish the results for public repositories to enable scorecard badges. For more details, see
- # https://github.com/ossf/scorecard-action#publishing-results.
- # For private repositories, `publish_results` will automatically be set to `false`, regardless
- # of the value entered here.
- publish_results: true
- # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
- # format to the repository Actions tab.
- - name: "Upload artifact"
- uses: actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # tag=v3.1.2
- with:
- name: SARIF file
- path: results.sarif
- retention-days: 5
- # Upload the results to GitHub's code scanning dashboard.
- - name: "Upload to code-scanning"
- uses: github/codeql-action/upload-sarif@959cbb7472c4d4ad70cdfe6f4976053fe48ab394 # tag=v2.1.27
- with:
- sarif_file: results.sarif
|