From f87e62cefbcdb6377cb471f4f152b6ef4d467626 Mon Sep 17 00:00:00 2001 From: Marc Ransome Date: Sun, 10 Mar 2024 00:17:11 +0000 Subject: [PATCH] Add OpenSSF Scorecard supply-chain security workflow --- .github/workflows/openssf-scorecard.yml | 40 +++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 .github/workflows/openssf-scorecard.yml diff --git a/.github/workflows/openssf-scorecard.yml b/.github/workflows/openssf-scorecard.yml new file mode 100644 index 0000000..254d85c --- /dev/null +++ b/.github/workflows/openssf-scorecard.yml @@ -0,0 +1,40 @@ +name: OpenSSF Scorecard supply-chain security +on: + branch_protection_rule: + schedule: + - cron: '0 3 * * 1' + push: + branches: [ "main" ] + +# Declare default workflow permissions as read only +permissions: read-all + +jobs: + analysis: + name: OpenSSF Scorecard analysis + runs-on: ubuntu-latest + permissions: + security-events: write # Needed to upload the results to code scanning dashboard + id-token: write # Needed to publish results to OpenSSF API and get a badge (see publish_results below) + steps: + - name: Checkout code + uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3.1.0 + with: + persist-credentials: false + - name: Run analysis + uses: ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2 + with: + results_file: results.sarif + results_format: sarif + publish_results: true + - name: Upload Actions artifact + uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0 + with: + name: SARIF file + path: results.sarif + retention-days: 5 + - name: Upload to code scanning dashboard + uses: github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4 + with: + sarif_file: results.sarif +