Skip to content

Commit a0ae703

Browse files
authored
Update scorecards.yml
Signed-off-by: Nicolás Georger <[email protected]>
1 parent cc9b231 commit a0ae703

File tree

1 file changed

+23
-43
lines changed

1 file changed

+23
-43
lines changed

.github/workflows/scorecards.yml

+23-43
Original file line numberDiff line numberDiff line change
@@ -1,76 +1,56 @@
1-
# This workflow uses actions that are not certified by GitHub. They are provided
2-
# by a third-party and are governed by separate terms of service, privacy
3-
# policy, and support documentation.
4-
5-
name: Scorecard supply-chain security
1+
name: Scorecard analysis workflow
62
on:
7-
# For Branch-Protection check. Only the default branch is supported. See
8-
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9-
branch_protection_rule:
10-
# To guarantee Maintained check is occasionally updated. See
11-
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
12-
schedule:
13-
- cron: '20 7 * * 2'
143
push:
15-
branches: ["main"]
4+
# Only the default branch is supported.
5+
branches:
6+
- main
7+
schedule:
8+
# Weekly on Saturdays.
9+
- cron: '30 1 * * 6'
1610

17-
# Declare default permissions as read only.
1811
permissions: read-all
1912

2013
jobs:
2114
analysis:
2215
name: Scorecard analysis
2316
runs-on: ubuntu-latest
2417
permissions:
25-
# Needed to upload the results to code-scanning dashboard.
18+
# Needed for Code scanning upload
2619
security-events: write
27-
# Needed to publish results and get a badge (see publish_results below).
20+
# Needed for GitHub OIDC token if publish_results is true
2821
id-token: write
29-
contents: read
30-
actions: read
3122

3223
steps:
33-
- name: Harden Runner
34-
uses: step-security/harden-runner@f086349bfa2bd1361f7909c78558e816508cdc10 # v2.8.0
35-
with:
36-
egress-policy: audit
37-
3824
- name: "Checkout code"
39-
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 # v3.6.0
25+
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6
4026
with:
4127
persist-credentials: false
4228

4329
- name: "Run analysis"
44-
uses: ossf/scorecard-action@99c53751e09b9529366343771cc321ec74e9bd3d # v2.0.6
30+
uses: ossf/scorecard-action@dc50aa9510b46c811795eb24b2f1ba02a914e534 # v2.3.3
4531
with:
4632
results_file: results.sarif
4733
results_format: sarif
48-
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
49-
# - you want to enable the Branch-Protection check on a *public* repository, or
50-
# - you are installing Scorecards on a *private* repository
51-
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
52-
# repo_token: ${{ secrets.SCORECARD_TOKEN }}
53-
54-
# Public repositories:
55-
# - Publish results to OpenSSF REST API for easy access by consumers
56-
# - Allows the repository to include the Scorecard badge.
57-
# - See https://github.com/ossf/scorecard-action#publishing-results.
58-
# For private repositories:
59-
# - `publish_results` will always be set to `false`, regardless
60-
# of the value entered here.
34+
# Scorecard team runs a weekly scan of public GitHub repos,
35+
# see https://github.com/ossf/scorecard#public-data.
36+
# Setting `publish_results: true` helps us scale by leveraging your workflow to
37+
# extract the results instead of relying on our own infrastructure to run scans.
38+
# And it's free for you!
6139
publish_results: true
6240

63-
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
64-
# format to the repository Actions tab.
41+
# Upload the results as artifacts (optional). Commenting out will disable
42+
# uploads of run results in SARIF format to the repository Actions tab.
43+
# https://docs.github.com/en/actions/advanced-guides/storing-workflow-data-as-artifacts
6544
- name: "Upload artifact"
66-
uses: actions/upload-artifact@a8a3f3ad30e3422c9c7b888a15615d19a852ae32 # v3.1.3
45+
uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3
6746
with:
6847
name: SARIF file
6948
path: results.sarif
7049
retention-days: 5
7150

72-
# Upload the results to GitHub's code scanning dashboard.
51+
# Upload the results to GitHub's code scanning dashboard (optional).
52+
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
7353
- name: "Upload to code-scanning"
74-
uses: github/codeql-action/upload-sarif@162eb1e32abe518e88bd229ebc8784a533ceaa51 # v2.25.6
54+
uses: github/codeql-action/upload-sarif@9fdb3e49720b44c48891d036bb502feb25684276 # v3.25.6
7555
with:
7656
sarif_file: results.sarif

0 commit comments

Comments
 (0)