Skip to content

remove scorecard token #32

remove scorecard token

remove scorecard token #32

Workflow file for this run

name: Scorecard analysis workflow
on:
push:
# Only the default branch is supported.
branches:
- main
schedule:
# Weekly on Saturdays.
- cron: '30 1 * * 6'
pull_request:
# All branches are supported.
branches: [ main ]
permissions: read-all
jobs:
analysis:
name: Scorecard analysis
runs-on: ubuntu-latest
permissions:
# Needed for Code scanning upload
security-events: write
# Needed for GitHub OIDC token if publish_results is true
id-token: write
steps:
- uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
api.osv.dev:443
github.com:443
- name: "Checkout code"
uses: actions/checkout@cd7d8d697e10461458bc61a30d094dc601a8b017 # pin@main
with:
persist-credentials: false
- name: "Run analysis"
uses: ossf/scorecard-action@279bc104ced111345c5595d3417ea20e8c131d56 # pin@main
with:
results_file: results.sarif
results_format: sarif
# Read-only PAT token. To create it,
# follow the steps in https://github.com/ossf/scorecard-action#pat-token-creation.
# repo_token: ${{ secrets.SCORECARD_READ_TOKEN }}
# Publish the results to enable scorecard badges. For more details, see
# https://github.com/ossf/scorecard-action#publishing-results.
# For private repositories, `publish_results` will automatically be set to `false`,
# regardless of the value entered here.
publish_results: true
# Upload the results as artifacts (optional).
- name: "Upload artifact"
uses: actions/upload-artifact@0c366cb4fc8897159c94880f94b55bc716ad6a66 # pin@master
with:
name: SARIF file
path: results.sarif
retention-days: 5
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
uses: github/codeql-action/upload-sarif@24a01703e471c90cfb2687429069c3d41242cdf5 # pin@main
with:
sarif_file: results.sarif