forked from actions/starter-workflows
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
37 changed files
with
655 additions
and
50 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Validating CODEOWNERS rules …
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
* @actions/starter-workflows | ||
* @actions/actions-workflow-development-reviewers | ||
|
||
/code-scanning/ @actions/advanced-security-code-scanning @actions/starter-workflows | ||
/pages/ @actions/pages @actions/starter-workflows | ||
/code-scanning/ @actions/advanced-security-code-scanning @actions/actions-workflow-development-reviewers | ||
/pages/ @actions/pages @actions/actions-workflow-development-reviewers |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,61 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
|
||
# Credo is a static code analysis tool for the Elixir language with a focus on teaching and code consistency. | ||
# https://github.com/rrrene/credo | ||
# | ||
# To use this workflow, you must have GitHub Advanced Security (GHAS) enabled for your repository. | ||
# | ||
# Instructions: | ||
# 1. Add :credo as a dependency to your project's mix.exs with version ~> 1.7.0-rc.1 - https://github.com/rrrene/credo#installation-and-usage | ||
# 2. Follow the annotated workflow below and make any necessary modifications then save the workflow to your repository | ||
# and review the "Security" tab once the action has run. | ||
|
||
name: Credo | ||
|
||
on: | ||
push: | ||
branches: [ $default-branch, $protected-branches ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ $default-branch ] | ||
schedule: | ||
- cron: $cron-weekly | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
security-scan: | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status | ||
runs-on: ubuntu-latest | ||
strategy: | ||
fail-fast: false | ||
matrix: | ||
otp: [version] | ||
elixir: [version] | ||
steps: | ||
- uses: actions/checkout@v3 | ||
- uses: erlef/setup-beam@988e02bfe678367a02564f65ca2e37726dc0268f | ||
with: | ||
otp-version: ${{matrix.otp}} | ||
elixir-version: ${{matrix.elixir}} | ||
- name: get dependencies | ||
run: mix deps.get | ||
- name: compile dependencies | ||
run: mix deps.compile | ||
- name: compile | ||
run: mix compile | ||
- name: credo-scan | ||
run: mix credo --format=sarif > credo_output.sarif | ||
- name: upload sarif | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
# Path to SARIF file relative to the root of the repository | ||
sarif_file: credo_output.sarif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
name: Endor Labs | ||
on: | ||
push: | ||
branches: [ $default-branch, $protected-branches ] | ||
pull_request: | ||
branches: [ $default-branch ] | ||
schedule: | ||
- cron: $cron-weekly | ||
jobs: | ||
scan: | ||
permissions: | ||
security-events: write # Used to upload sarif artifact to GitHub | ||
contents: read # Used to checkout a private repository by actions/checkout. | ||
actions: read # Required for private repositories to upload sarif files. GitHub Advanced Security licenses are required. | ||
id-token: write # Used for keyless authentication to Endor Labs | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Checkout repository | ||
uses: actions/checkout@v3 | ||
#### Package Build Instructions | ||
### Use this section to define the build steps used by your software package. | ||
### Endor Labs builds your software for you where possible but the required build tools must be made availible. | ||
# - name: Setup Java | ||
# uses: actions/setup-java@v3 | ||
# with: | ||
# distribution: 'microsoft' | ||
# java-version: '17' | ||
# - name: Build Package | ||
# run: mvn clean install | ||
- name: Endor Labs scan pull request | ||
if: github.event_name == 'pull_request' | ||
uses: endorlabs/github-action@b51bd06466b545f01a6ac788e3e1147695d3936c | ||
with: | ||
namespace: "example" # Modify the namespace to your Endor Labs tenant namespace. | ||
sarif_file: findings.sarif | ||
- name: Endor Labs scan monitor | ||
if: github.event_name == 'push' | ||
uses: endorlabs/github-action@b51bd06466b545f01a6ac788e3e1147695d3936c | ||
with: | ||
namespace: "example" # Modify the namespace to your Endor Labs tenant namespace. | ||
ci_run: "false" | ||
sarif_file: findings.sarif | ||
- name: Upload SARIF to github | ||
uses: github/codeql-action/upload-sarif@9885f86fab4879632b7e44514f19148225dfbdcd | ||
with: | ||
sarif_file: findings.sarif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
{ | ||
"name": "Credo Scan", | ||
"creator": "Credo", | ||
"description": "Credo is a static code analysis tool for the Elixir language with a focus on teaching and code consistency.", | ||
"iconName": "code", | ||
"categories": ["Code Scanning", "Elixir"] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
{ | ||
"name": "Endor Labs scan", | ||
"creator": "Endor Labs", | ||
"description": "Identify, prioritize and address open source and code governance issues with Endor Labs.", | ||
"iconName": "endorlabs", | ||
"categories": ["Code Scanning", "javascript", "python", "java", "php", "c#", "ruby", "go", "kotlin", "scala" ] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
{ | ||
"name": "Psalm Security Scan", | ||
"creator": "psalm", | ||
"description": "Psalm is a static analysis tool for finding errors in PHP applications", | ||
"iconName": "psalm", | ||
"categories": [ | ||
"Code Scanning", | ||
"PHP" | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
name: Psalm Security Scan | ||
|
||
on: | ||
push: | ||
branches: [ $default-branch, $protected-branches ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ $default-branch ] | ||
schedule: | ||
- cron: $cron-weekly | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
php-security: | ||
runs-on: ubuntu-latest | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status | ||
|
||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@v3 | ||
|
||
- name: Psalm Security Scan | ||
uses: psalm/psalm-github-security-scan@f3e6fd9432bc3e44aec078572677ce9d2ef9c287 | ||
|
||
- name: Upload Security Analysis results to GitHub | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: results.sarif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.