Bump sonarsource/sonarqube-scan-action from f885e52a7572cf7943f28637e75730227df2dbf2 to 884b79409bbd464b2a59edc326a4b77dc56b2195 #120
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# SPDX-FileCopyrightText: 2022-2023 The go-mail Authors | |
# | |
# SPDX-License-Identifier: CC0-1.0 | |
# Dependency Review Action | |
# | |
# This Action will scan dependency manifest files that change as part of a Pull Request, | |
# surfacing known-vulnerable versions of the packages declared or updated in the PR. | |
# Once installed, if the workflow run is marked as required, | |
# PRs introducing known-vulnerable packages will be blocked from merging. | |
# | |
# Source repository: https://github.com/actions/dependency-review-action | |
name: 'Dependency Review' | |
on: [pull_request] | |
permissions: | |
contents: read | |
jobs: | |
dependency-review: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Harden Runner | |
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1 | |
with: | |
egress-policy: audit | |
- name: 'Checkout Repository' | |
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 # v3.6.0 | |
- name: 'Dependency Review' | |
uses: actions/dependency-review-action@5a2ce3f5b92ee19cbb1541a4984c76d921601d7c # v4.3.4 |