CID - OSSF Scorecard #4
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# cid-workflow-version: 0.0.17 | |
# This file is generated by the CID Workflow GitHub App. | |
# DO NOT EDIT! | |
# name | |
name: CID - OSSF Scorecard | |
on: | |
# For Branch-Protection check. Only the default branch is supported. See | |
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection | |
branch_protection_rule: | |
# To guarantee Maintained check is occasionally updated. See | |
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained | |
schedule: | |
- cron: '40 23 * * 5' | |
# Allow manual triggering of the workflow | |
workflow_dispatch: | |
# Read Permissions. See | |
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions | |
# https://docs.github.com/en/rest/overview/permissions-required-for-github-apps | |
permissions: read-all | |
# Cancel in progress jobs when a new run starts on the same ref | |
concurrency: | |
group: '${{ github.workflow }} @ ${{ github.event.pull_request.head.label || github.head_ref || github.ref }}' | |
cancel-in-progress: true | |
jobs: | |
analysis: | |
name: OSSF Scorecard Analysis | |
runs-on: ubuntu-latest | |
permissions: | |
id-token: write # needed to publish results | |
actions: read # required in private repos | |
contents: read # required in private repos | |
steps: | |
- name: Harden Runner | |
uses: step-security/harden-runner@f086349bfa2bd1361f7909c78558e816508cdc10 # v2.8.0 | |
with: | |
disable-telemetry: true | |
disable-sudo: true | |
egress-policy: block | |
allowed-endpoints: >- | |
api.github.com:443 | |
cdn01.quay.io:443 | |
cdn02.quay.io:443 | |
cdn03.quay.io:443 | |
codeload.github.com:443 | |
github.com:443 | |
objects.githubusercontent.com:443 | |
proxy.golang.org:443 | |
quay.io:443 | |
raw.githubusercontent.com:443 | |
storage.googleapis.com:443 | |
sum.golang.org:443 | |
uploads.github.com:443 | |
api.osv.dev:443 | |
www.bestpractices.dev:443 | |
oss-fuzz-build-logs.storage.googleapis.com:443 | |
rekor.sigstore.dev:443 | |
fulcio.sigstore.dev:443 | |
tuf-repo-cdn.sigstore.dev:443 | |
api.securityscorecards.dev:443 | |
- name: Checkout | |
uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4.1.6 | |
with: | |
persist-credentials: false | |
- name: OSSF Analysis | |
uses: ossf/scorecard-action@0864cf19026789058feabb7e87baa5f140aac736 # v2.3.1 | |
with: | |
results_file: results.sarif | |
results_format: sarif | |
publish_results: true # publish results to OpenSSF REST API | |
- name: Upload Analysis Result | |
uses: actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4.3.3 | |
with: | |
name: SARIF file | |
path: results.sarif | |
retention-days: 5 |