chore(deps): bump aws-actions/configure-aws-credentials from 131c7b6fd10c0d7f36e1e49650b241d91ee327b9 to fbaaea849082b09c6da098c397edb77cf7d2875a #4086
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Dependency Review Action | |
# | |
# This Action will scan dependency manifest files that change as part of a Pull Request, | |
# surfacing known-vulnerable versions of the packages declared or updated in the PR. | |
# Once installed, if the workflow run is marked as required, | |
# PRs introducing known-vulnerable packages will be blocked from merging. | |
# | |
# Source repository: https://github.com/actions/dependency-review-action | |
name: 'Dependency Review' | |
on: | |
merge_group: | |
pull_request: | |
permissions: | |
contents: read | |
jobs: | |
dependency-review: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Harden Runner | |
uses: step-security/harden-runner@8ca2b8b2ece13480cda6dacd3511b49857a23c09 # v2.5.1 | |
with: | |
disable-sudo: true | |
egress-policy: block | |
allowed-endpoints: > | |
api.github.com:443 | |
github.com:443 | |
pipelinesghubeus2.actions.githubusercontent.com:443 | |
acghubeus1.actions.githubusercontent.com:443 | |
- name: 'Checkout Repository' | |
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 | |
- name: 'Dependency Review' | |
uses: actions/dependency-review-action@f6fff72a3217f580d5afd49a46826795305b63c7 # v3.0.8 | |
with: | |
base-ref: ${{ github.event.pull_request.base.sha || 'dev' }} | |
head-ref: ${{ github.event.pull_request.head.sha || github.ref }} |