File tree 5 files changed +7
-7
lines changed
5 files changed +7
-7
lines changed Original file line number Diff line number Diff line change 19
19
vsixPath : ${{ steps.packageExtension.outputs.vsixPath }}
20
20
steps :
21
21
- name : Harden the runner (Audit all outbound calls)
22
- uses : step-security/harden-runner@c6295a65d1254861815972266d5933fd6e532bdf # v2.11.1
22
+ uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
23
23
with :
24
24
egress-policy : audit
25
25
# ToDo: Change to block after couple of workflow runs
Original file line number Diff line number Diff line change 12
12
runs-on : ubuntu-latest
13
13
steps :
14
14
- name : Harden the runner (Audit all outbound calls)
15
- uses : step-security/harden-runner@c6295a65d1254861815972266d5933fd6e532bdf # v2.11.1
15
+ uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
16
16
with :
17
17
egress-policy : audit
18
18
# ToDo: Change to block after couple of workflow runs
Original file line number Diff line number Diff line change 19
19
vsixPath : ${{ steps.packageExtension.outputs.vsixPath }}
20
20
steps :
21
21
- name : Harden the runner (Audit all outbound calls)
22
- uses : step-security/harden-runner@c6295a65d1254861815972266d5933fd6e532bdf # v2.11.1
22
+ uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
23
23
with :
24
24
egress-policy : audit
25
25
# ToDo: Change to block after couple of workflow runs
Original file line number Diff line number Diff line change 31
31
32
32
steps :
33
33
- name : Harden the runner (Audit all outbound calls)
34
- uses : step-security/harden-runner@c6295a65d1254861815972266d5933fd6e532bdf # v2.11.1
34
+ uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
35
35
with :
36
36
egress-policy : audit
37
37
# ToDo: Change to block after couple of workflow runs
75
75
# Upload the results to GitHub's code scanning dashboard (optional).
76
76
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
77
77
- name : " Upload to code-scanning"
78
- uses : github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
78
+ uses : github/codeql-action/upload-sarif@60168efe1c415ce0f5521ea06d5c2062adbeed1b # v3.28.17
79
79
with :
80
80
sarif_file : results.sarif
Original file line number Diff line number Diff line change 33
33
34
34
steps :
35
35
- name : Harden the runner (Audit all outbound calls)
36
- uses : step-security/harden-runner@c6295a65d1254861815972266d5933fd6e532bdf # v2.11.1
36
+ uses : step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
37
37
with :
38
38
egress-policy : audit
39
39
# ToDo: Change to block after couple of workflow runs
46
46
SEMGREP_APP_TOKEN : ${{ secrets.SEMGREP_APP_TOKEN }}
47
47
48
48
- name : Upload SARIF file for GitHub Advanced Security Dashboard
49
- uses : github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
49
+ uses : github/codeql-action/upload-sarif@60168efe1c415ce0f5521ea06d5c2062adbeed1b # v3.28.17
50
50
with :
51
51
sarif_file : semgrep.sarif
52
52
if : always()
You can’t perform that action at this time.
0 commit comments