Merge pull request #2479 from jku/dont-pin-code-scanner-actions #259
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Scorecards analysis | |
on: | |
branch_protection_rule: | |
schedule: | |
- cron: '21 6 * * 1' | |
push: | |
branches: [ develop ] | |
workflow_dispatch: | |
permissions: {} | |
jobs: | |
analysis: | |
name: Scorecards analysis | |
runs-on: ubuntu-latest | |
permissions: | |
# NOTE: If you add security critical permissions, start pinning used actions | |
security-events: write # for uploading to code-scanning dashboard | |
id-token: write # for publishing results in scorecard public dataset | |
actions: read | |
contents: read | |
steps: | |
- name: "Checkout code" | |
uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0 | |
- name: "Run analysis" | |
uses: ossf/scorecard-action@v2 # unpinned since this is not security critical | |
with: | |
results_file: results.sarif | |
# sarif format required by upload-sarif action | |
results_format: sarif | |
# "repo_token" not set because personal access tokens are dangerous. | |
# This means Branch-Protection check will not have correct results. | |
publish_results: true | |
- name: "Upload to code-scanning dashboard" | |
uses: github/codeql-action/upload-sarif@v2 # unpinned since this is not security critical | |
with: | |
sarif_file: results.sarif |