scorecard.yml 1.1 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. name: Scorecard supply-chain security
  2. on:
  3. branch_protection_rule:
  4. schedule:
  5. - cron: '27 2 * * 3'
  6. push:
  7. branches: [ "main" ]
  8. permissions: read-all
  9. jobs:
  10. analysis:
  11. name: Scorecard analysis
  12. runs-on: ubuntu-latest
  13. permissions:
  14. # Needed to upload the results to code-scanning dashboard.
  15. security-events: write
  16. # Needed to publish results and get a badge (see publish_results below).
  17. id-token: write
  18. steps:
  19. - name: "Checkout code"
  20. uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
  21. with:
  22. persist-credentials: false
  23. - name: "Run analysis"
  24. uses: ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2
  25. with:
  26. results_file: results.sarif
  27. results_format: sarif
  28. publish_results: true
  29. # Upload the results to GitHub's code scanning dashboard.
  30. - name: "Upload to code-scanning"
  31. uses: github/codeql-action/upload-sarif@0b21cf2492b6b02c465a3e5d7c473717ad7721ba # v3.23.1
  32. with:
  33. sarif_file: results.sarif