Skip to content

chore(deps): bump tokio-cron-scheduler from 0.13.0 to 0.15.1 #347

chore(deps): bump tokio-cron-scheduler from 0.13.0 to 0.15.1

chore(deps): bump tokio-cron-scheduler from 0.13.0 to 0.15.1 #347

Workflow file for this run

---
name: Semgrep
on:
# Scan changed files in PRs (diff-aware scanning):
pull_request_target: {}
# Scan on-demand through GitHub Actions interface:
workflow_dispatch: {}
# Scan mainline branches and report all findings:
push:
branches: [main]
# Schedule the CI job (this method uses cron syntax):
schedule:
- cron: 15 11 * * * # Sets Semgrep to scan every day at 11:15 UTC.
permissions:
contents: read
jobs:
semgrep:
name: semgrep/ci
runs-on: ubuntu-latest
permissions:
security-events: write
# contents: read
# actions: read
container:
image: semgrep/semgrep@sha256:85f9de554201cc891c470774bb93a7f4faf41ea198ddccc34a855b53f7a51443 # v1.127.1
# Skip any PR created by dependabot to avoid permission issues:
if: (github.actor != 'dependabot[bot]')
steps:
- name: Harden Runner
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
with:
egress-policy: audit
- name: Checkout code
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.5.4
# Run the "semgrep ci" command on the command line of the docker image.
- run: semgrep ci --sarif --sarif-output=semgrep.sarif
env:
# Connect to Semgrep AppSec Platform through your SEMGREP_APP_TOKEN.
SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}
# Do not check for new version
SEMGREP_ENABLE_VERSION_CHECK: 0
# No metrics
SEMGREP_SEND_METRICS: 'off'
- name: Upload SARIF file for GitHub Advanced Security Dashboard
uses: github/codeql-action/upload-sarif@fca7ace96b7d713c7035871441bd52efbe39e27e # v3.28.19
with:
sarif_file: semgrep.sarif