name: Scorecards supply-chain security on: schedule: - cron: '30 1 * * 6' push: branches: - main concurrency: group: ${{ github.workflow }}-${{ github.ref }} cancel-in-progress: true jobs: analysis: runs-on: ubuntu-latest permissions: security-events: write id-token: write steps: - name: Checkout uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2 with: persist-credentials: false - name: Check secret id: checksecret uses: ./.github/actions/is-defined with: value: ${{ secrets.SCORECARD_READ_TOKEN }} - name: Setup build env if: steps.checksecret.outputs.result == 'true' uses: ./.github/actions/setup-build-env - name: Run analysis if: steps.checksecret.outputs.result == 'true' uses: ossf/scorecard-action@80e868c13c90f172d68d1f4501dee99e2479f7af # v2.1.3 with: results_file: results.sarif results_format: sarif repo_token: ${{ secrets.SCORECARD_READ_TOKEN }} publish_results: true - name: Upload artifact if: steps.checksecret.outputs.result == 'true' uses: actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # v3.1.2 with: name: SARIF file path: results.sarif retention-days: 5 - name: Upload to code-scanning if: steps.checksecret.outputs.result == 'true' uses: github/codeql-action/upload-sarif@0225834cc549ee0ca93cb085b92954821a145866 # v2.3.5 with: sarif_file: results.sarif