1
- # SPDX-FileCopyrightText: 2024 Intel Corporation
2
- #
3
- # SPDX-License-Identifier: Apache-2.0
4
-
5
1
# This workflow uses actions that are not certified by GitHub. They are provided
6
2
# by a third-party and are governed by separate terms of service, privacy
7
3
# policy, and support documentation.
14
10
# To guarantee Maintained check is occasionally updated. See
15
11
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
16
12
schedule :
17
- - cron : ' 45 14 * * 2'
13
+ - cron : ' 26 22 * * 2'
18
14
push :
19
15
branches : [ "master" ]
20
16
@@ -36,19 +32,19 @@ jobs:
36
32
37
33
steps :
38
34
- name : " Checkout code"
39
- uses : actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3 .1.0
35
+ uses : actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4 .1.1
40
36
with :
41
37
persist-credentials : false
42
38
43
39
- name : " Run analysis"
44
- uses : ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2
40
+ uses : ossf/scorecard-action@0864cf19026789058feabb7e87baa5f140aac736 # v2.3.1
45
41
with :
46
42
results_file : results.sarif
47
43
results_format : sarif
48
44
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
49
45
# - you want to enable the Branch-Protection check on a *public* repository, or
50
46
# - you are installing Scorecard on a *private* repository
51
- # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
47
+ # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action?tab=readme-ov-file #authentication-with-fine-grained- pat-optional .
52
48
# repo_token: ${{ secrets.SCORECARD_TOKEN }}
53
49
54
50
# Public repositories:
@@ -63,14 +59,15 @@ jobs:
63
59
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
64
60
# format to the repository Actions tab.
65
61
- name : " Upload artifact"
66
- uses : actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0
62
+ uses : actions/upload-artifact@97a0fba1372883ab732affbe8f94b823f91727db # v3.pre.node20
67
63
with :
68
64
name : SARIF file
69
65
path : results.sarif
70
66
retention-days : 5
71
67
72
- # Upload the results to GitHub's code scanning dashboard.
68
+ # Upload the results to GitHub's code scanning dashboard (optional).
69
+ # Commenting out will disable upload of results to your repo's Code Scanning dashboard
73
70
- name : " Upload to code-scanning"
74
- uses : github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4
71
+ uses : github/codeql-action/upload-sarif@1b1aada464948af03b950897e5eb522f92603cc2 # v3.24.9
75
72
with :
76
73
sarif_file : results.sarif
0 commit comments