Mercurial > p > roundup > code
diff .github/workflows/anchore.yml @ 7148:cc49ac11850f
Pin actions by using hashes removing tags like @v2. or @master
Now that actions are being scanned by dependabot, this is easier to
keep up with.
This also clears multiple security issues flagged by ossf-scorecard.
| author | John Rouillard <rouilj@ieee.org> |
|---|---|
| date | Thu, 16 Feb 2023 20:12:55 -0500 |
| parents | 7f4d20ebae4a |
| children | fcf7e210a0f9 |
line wrap: on
line diff
--- a/.github/workflows/anchore.yml Wed Feb 15 18:50:53 2023 -0500 +++ b/.github/workflows/anchore.yml Thu Feb 16 20:12:55 2023 -0500 @@ -36,18 +36,20 @@ runs-on: ubuntu-latest steps: - name: Checkout the code - uses: actions/checkout@v3 + uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c + # v3.3.0 - name: Build the Docker image run: docker pull python:3-alpine; docker build . --file scripts/Docker/Dockerfile --tag localbuild/testimage:latest - name: Run the Anchore scan action itself with GitHub Advanced Security code scanning integration enabled - uses: anchore/scan-action@v3 + uses: anchore/scan-action@dafbc97d7259af88b61bd260f2fde565d0668a72 # v3.3.4 id: scan with: image: "localbuild/testimage:latest" fail-build: true - name: Upload Anchore Scan Report if: always() - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 + # v2.2.4 with: sarif_file: ${{ steps.scan.outputs.sarif }} - name: Inspect action SARIF report
