This repository was archived by the owner on Nov 28, 2024. It is now read-only.
File tree Expand file tree Collapse file tree 28 files changed +63
-62
lines changed Expand file tree Collapse file tree 28 files changed +63
-62
lines changed Original file line number Diff line number Diff line change 13
13
runs-on : ubuntu-latest
14
14
steps :
15
15
- name : Harden Runner
16
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
16
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
17
17
with :
18
18
egress-policy : audit
19
19
Original file line number Diff line number Diff line change 33
33
runs-on : ubuntu-latest
34
34
steps :
35
35
- name : Harden Runner
36
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
36
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
37
37
with :
38
38
disable-sudo : true
39
39
egress-policy : block
Original file line number Diff line number Diff line change 9
9
runs-on : ubuntu-latest
10
10
steps :
11
11
- name : Harden Runner
12
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
12
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
13
13
with :
14
14
disable-sudo : true
15
15
egress-policy : block
Original file line number Diff line number Diff line change 36
36
steps :
37
37
# Checkout the repository to the GitHub Actions runner
38
38
- name : Harden Runner
39
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
39
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
40
40
with :
41
41
egress-policy : audit
42
42
45
45
46
46
# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
47
47
- name : Run Codacy Analysis CLI
48
- uses : codacy/codacy-analysis-cli-action@3ff8e64eb4b714c4bee91b7b4eea31c6fc2c4f93
48
+ uses : codacy/codacy-analysis-cli-action@97bf5df3c09e75f5bcd72695998f96ebd701846e
49
49
with :
50
50
# Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
51
51
# You can also omit the token and run the tools that support default configurations
61
61
62
62
# Upload the SARIF file generated in the previous step
63
63
- name : Upload SARIF results file
64
- uses : github/codeql-action/upload-sarif@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
64
+ uses : github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
65
65
with :
66
66
sarif_file : results.sarif
Original file line number Diff line number Diff line change 8
8
runs-on : self-ubuntu
9
9
steps :
10
10
- name : Harden Runner
11
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
11
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
12
12
with :
13
13
egress-policy : audit
14
14
21
21
- name : Run tests and collect coverage
22
22
run : pytest --cov app ${{ env.CODECOV_ATS_TESTS }}
23
23
- name : Upload coverage to Codecov
24
- uses : codecov/codecov-action@125fc84a9a348dbcf27191600683ec096ec9021c # v4.4.1
24
+ uses : codecov/codecov-action@e28ff129e5465c2c0dcc6f003fc735cb6ae0c673 # v4.5.0
25
25
with :
26
26
flags : smart-tests
27
27
verbose : true
Original file line number Diff line number Diff line change 41
41
42
42
steps :
43
43
- name : Harden Runner
44
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
44
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
45
45
with :
46
46
egress-policy : audit
47
47
50
50
51
51
# Initializes the CodeQL tools for scanning.
52
52
- name : Initialize CodeQL
53
- uses : github/codeql-action/init@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
53
+ uses : github/codeql-action/init@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
54
54
with :
55
55
languages : ${{ matrix.language }}
56
56
# If you wish to specify custom queries, you can do so here or in a config file.
60
60
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
61
61
# If this step fails, then you should remove it and run the build manually (see below)
62
62
- name : Autobuild
63
- uses : github/codeql-action/autobuild@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
63
+ uses : github/codeql-action/autobuild@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
64
64
65
65
# ℹ️ Command-line programs to run using the OS shell.
66
66
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
73
73
# ./location_of_script_within_repo/buildscript.sh
74
74
75
75
- name : Perform CodeQL Analysis
76
- uses : github/codeql-action/analyze@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
76
+ uses : github/codeql-action/analyze@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
77
77
with :
78
78
category : " /language:${{matrix.language}}"
Original file line number Diff line number Diff line change @@ -34,12 +34,12 @@ jobs:
34
34
35
35
steps :
36
36
- name : Harden Runner
37
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
37
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
38
38
with :
39
39
egress-policy : audit
40
40
41
41
- uses : actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
42
- - uses : actions/setup-dotnet@4d6c8fcf3c8f7a60068d26b594648e99df24cee3 # v4.0.0
42
+ - uses : actions/setup-dotnet@6bd8b7f7774af54e05809fcc5431931b3eb1ddee # v4.0.1
43
43
with :
44
44
dotnet-version : |
45
45
5.0.x
48
48
uses : microsoft/security-devops-action@d16b24e8eb9f5afa5385fa133f26090c8e7689c9 # v1
49
49
id : msdo
50
50
- name : Upload results to Security tab
51
- uses : github/codeql-action/upload-sarif@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
51
+ uses : github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
52
52
with :
53
53
sarif_file : ${{ steps.msdo.outputs.sarifFile }}
Original file line number Diff line number Diff line change @@ -29,14 +29,14 @@ jobs:
29
29
runs-on : windows-latest
30
30
steps :
31
31
- name : Harden Runner
32
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
32
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
33
33
with :
34
34
egress-policy : audit
35
35
36
36
- name : ' Checkout repository'
37
37
uses : actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
38
38
- name : ' Dependency Review'
39
- uses : actions/dependency-review-action@72eb03d02c7872a771aacd928f3123ac62ad6d3a # v4.3.3
39
+ uses : actions/dependency-review-action@5a2ce3f5b92ee19cbb1541a4984c76d921601d7c # v4.3.4
40
40
# Commonly enabled options, see https://github.com/actions/dependency-review-action#configuration-options for all available options.
41
41
with :
42
42
comment-summary-in-pr : always
Original file line number Diff line number Diff line change 26
26
security-events : write
27
27
steps :
28
28
- name : Harden Runner
29
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
29
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
30
30
with :
31
31
disable-sudo : true
32
32
egress-policy : block
41
41
uses : microsoft/DevSkim-Action@914fa647b406c387000300b2f09bb28691be2b6d # v1.0.14
42
42
43
43
- name : Upload DevSkim scan results to GitHub Security tab
44
- uses : github/codeql-action/upload-sarif@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
44
+ uses : github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
45
45
with :
46
46
sarif_file : devskim-results.sarif
Original file line number Diff line number Diff line change 24
24
runs-on : windows-latest
25
25
steps :
26
26
- name : Harden Runner
27
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
27
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
28
28
with :
29
29
egress-policy : audit
30
30
@@ -42,18 +42,18 @@ jobs:
42
42
# run: mvn clean install
43
43
- name : Endor Labs scan pull request
44
44
if : github.event_name == 'pull_request'
45
- uses : endorlabs/github-action@a8ac7b44747fcbe98d0e80ab2d4e91f7ab9028fa
45
+ uses : endorlabs/github-action@802fa65ba7c140405ee52d1c806cfdb647f8f743
46
46
with :
47
47
namespace : " example" # Modify the namespace to your Endor Labs tenant namespace.
48
48
sarif_file : findings.sarif
49
49
- name : Endor Labs scan monitor
50
50
if : github.event_name == 'push'
51
- uses : endorlabs/github-action@a8ac7b44747fcbe98d0e80ab2d4e91f7ab9028fa
51
+ uses : endorlabs/github-action@802fa65ba7c140405ee52d1c806cfdb647f8f743
52
52
with :
53
53
namespace : " example" # Modify the namespace to your Endor Labs tenant namespace.
54
54
ci_run : " false"
55
55
sarif_file : findings.sarif
56
56
- name : Upload SARIF to github
57
- uses : github/codeql-action/upload-sarif@530d4feaa9c62aaab2d250371e2061eb7a172363
57
+ uses : github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac
58
58
with :
59
59
sarif_file : findings.sarif
Original file line number Diff line number Diff line change 10
10
runs-on : ubuntu-latest
11
11
steps :
12
12
- name : Harden Runner
13
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
13
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
14
14
with :
15
15
egress-policy : audit
16
16
Original file line number Diff line number Diff line change 13
13
pull-requests : write
14
14
steps :
15
15
- name : Harden Runner
16
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
16
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
17
17
with :
18
18
egress-policy : audit
19
19
Original file line number Diff line number Diff line change 21
21
22
22
steps :
23
23
- name : Harden Runner
24
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
24
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
25
25
with :
26
26
egress-policy : audit
27
27
Original file line number Diff line number Diff line change 32
32
33
33
steps :
34
34
- name : Harden Runner
35
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
35
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
36
36
with :
37
37
egress-policy : audit
38
38
56
56
57
57
# Upload results to the Security tab
58
58
- name : Upload OSSAR results
59
- uses : github/codeql-action/upload-sarif@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
59
+ uses : github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
60
60
with :
61
61
sarif_file : ${{ steps.ossar.outputs.sarifFile }}
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ permissions:
31
31
jobs :
32
32
scan-scheduled :
33
33
if : ${{ github.event_name == 'push' || github.event_name == 'schedule' }}
34
- uses : " google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@ba0b4d196d231340e0ae94ae00933c8be0984192 " # v1.7.4
34
+ uses : " google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@7ac94f9d40028db4cacf8d53adec6626f5d3d2f7 " # v1.8.2
35
35
with :
36
36
# Example of specifying custom arguments
37
37
scan-args : |-
40
40
./
41
41
scan-pr :
42
42
if : ${{ github.event_name == 'pull_request' || github.event_name == 'merge_group' }}
43
- uses : " google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@ba0b4d196d231340e0ae94ae00933c8be0984192 " # v1.7.4
43
+ uses : " google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@7ac94f9d40028db4cacf8d53adec6626f5d3d2f7 " # v1.8.2
44
44
with :
45
45
# Example of specifying custom arguments
46
46
scan-args : |-
Original file line number Diff line number Diff line change @@ -13,13 +13,13 @@ jobs:
13
13
python-version : ["3.11.8"]
14
14
steps :
15
15
- name : Harden Runner
16
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
16
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
17
17
with :
18
18
egress-policy : audit
19
19
20
20
- uses : actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
21
21
- name : Set up Python ${{ matrix.python-version }}
22
- uses : actions/setup-python@82c7e631bb3cdc910f68e0081d67478d79c6982d # v5.1.0
22
+ uses : actions/setup-python@39cd14951b08e74b54015e9e001cdefcf80e669f # v5.1.1
23
23
with :
24
24
python-version : ${{ matrix.python-version }}
25
25
- name : Install dependencies
Original file line number Diff line number Diff line change 35
35
runs-on : windows-latest
36
36
steps :
37
37
- name : Harden Runner
38
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
38
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
39
39
with :
40
40
egress-policy : audit
41
41
Original file line number Diff line number Diff line change 36
36
runs-on : ubuntu-latest
37
37
steps :
38
38
- name : Harden Runner
39
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
39
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
40
40
with :
41
41
egress-policy : block
42
42
allowed-endpoints : >
Original file line number Diff line number Diff line change 19
19
20
20
steps :
21
21
- name : Harden Runner
22
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
22
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
23
23
with :
24
24
disable-sudo : true
25
25
egress-policy : block
32
32
33
33
- uses : actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
34
34
- name : Set up Python 3.11.8
35
- uses : actions/setup-python@82c7e631bb3cdc910f68e0081d67478d79c6982d # v5.1.0
35
+ uses : actions/setup-python@39cd14951b08e74b54015e9e001cdefcf80e669f # v5.1.1
36
36
with :
37
37
python-version : " 3.11.8"
38
38
- name : Install dependencies
Original file line number Diff line number Diff line change @@ -13,13 +13,13 @@ jobs:
13
13
14
14
steps :
15
15
- name : Harden Runner
16
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
16
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
17
17
with :
18
18
egress-policy : audit
19
19
20
20
- uses : actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
21
21
- name : Set up Python 3.11
22
- uses : actions/setup-python@82c7e631bb3cdc910f68e0081d67478d79c6982d # v5.1.0
22
+ uses : actions/setup-python@39cd14951b08e74b54015e9e001cdefcf80e669f # v5.1.1
23
23
with :
24
24
python-version : ' 3.11'
25
25
- name : Add conda to system path
Original file line number Diff line number Diff line change 27
27
28
28
steps :
29
29
- name : Harden Runner
30
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
30
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
31
31
with :
32
32
disable-sudo : true
33
33
egress-policy : block
39
39
40
40
- uses : actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
41
41
- name : Set up Python
42
- uses : actions/setup-python@82c7e631bb3cdc910f68e0081d67478d79c6982d # v5.1.0
42
+ uses : actions/setup-python@39cd14951b08e74b54015e9e001cdefcf80e669f # v5.1.1
43
43
with :
44
44
python-version : ' 3.11'
45
45
- name : Install dependencies
49
49
- name : Build package
50
50
run : python -m build
51
51
- name : Publish package
52
- uses : pypa/gh-action-pypi-publish@81e9d935c883d0b210363ab89cf05f3894778450
52
+ uses : pypa/gh-action-pypi-publish@ec4db0b4ddc65acdf4bff5fa45ac92d78b56bdf0
53
53
with :
54
54
user : __token__
55
55
password : ${{ secrets.PYPI_API_TOKEN }}
Original file line number Diff line number Diff line change 32
32
33
33
steps :
34
34
- name : Harden Runner
35
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
35
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
36
36
with :
37
37
disable-sudo : true
38
38
egress-policy : block
78
78
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
79
79
# format to the repository Actions tab.
80
80
- name : " Upload artifact"
81
- uses : actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3
81
+ uses : actions/upload-artifact@0b2256b8c012f0828dc542b3febcab082c67f72b # v4.3.4
82
82
with :
83
83
name : SARIF file
84
84
path : results.sarif
87
87
# Upload the results to GitHub's code scanning dashboard (optional).
88
88
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
89
89
- name : " Upload to code-scanning"
90
- uses : github/codeql-action/upload-sarif@530d4feaa9c62aaab2d250371e2061eb7a172363 # v3.25.9
90
+ uses : github/codeql-action/upload-sarif@2d790406f505036ef40ecba973cc774a50395aac # v3.25.13
91
91
with :
92
92
sarif_file : results.sarif
Original file line number Diff line number Diff line change 24
24
image : returntocorp/semgrep
25
25
steps :
26
26
- name : Harden Runner
27
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
27
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
28
28
with :
29
29
egress-policy : audit
30
30
Original file line number Diff line number Diff line change 11
11
12
12
steps :
13
13
- name : Harden Runner
14
- uses : step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
14
+ uses : step-security/harden-runner@0d381219ddf674d61a7572ddd19d7941e271515c # v2.9.0
15
15
with :
16
16
disable-sudo : true
17
17
egress-policy : block
You can’t perform that action at this time.
0 commit comments