Skip to content

[GFSB-2259] update argo-cd #149

[GFSB-2259] update argo-cd

[GFSB-2259] update argo-cd #149

Workflow file for this run

# name: Scorecards supply-chain security
# on:
# # Only the default branch is supported.
# branch_protection_rule:
# schedule:
# - cron: "39 9 * * 2"
# push:
# branches: ["master"]
# concurrency:
# group: ${{ github.workflow }}-${{ github.ref }}
# cancel-in-progress: true
# # Declare default permissions as read only.
# permissions: read-all
# jobs:
# analysis:
# name: Scorecards analysis
# runs-on: ubuntu-22.04
# permissions:
# # Needed to upload the results to code-scanning dashboard.
# security-events: write
# # Used to receive a badge. (Upcoming feature)
# id-token: write
# # Needs for private repositories.
# contents: read
# actions: read
# if: github.repository == 'argoproj/argo-cd'
# steps:
# - name: "Checkout code"
# uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
# with:
# persist-credentials: false
# - name: "Run analysis"
# uses: ossf/scorecard-action@80e868c13c90f172d68d1f4501dee99e2479f7af # v2.1.3
# with:
# results_file: results.sarif
# results_format: sarif
# # (Optional) Read-only PAT token. Uncomment the `repo_token` line below if:
# # - you want to enable the Branch-Protection check on a *public* repository, or
# # - you are installing Scorecards on a *private* repository
# # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
# # repo_token: ${{ secrets.SCORECARD_READ_TOKEN }}
# # Publish the results for public repositories to enable scorecard badges. For more details, see
# # https://github.com/ossf/scorecard-action#publishing-results.
# # For private repositories, `publish_results` will automatically be set to `false`, regardless
# # of the value entered here.
# publish_results: true
# # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# # format to the repository Actions tab.
# - name: "Upload artifact"
# uses: actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # v3.1.2
# with:
# name: SARIF file
# path: results.sarif
# retention-days: 5
# # Upload the results to GitHub's code scanning dashboard.
# - name: "Upload to code-scanning"
# uses: github/codeql-action/upload-sarif@3ebbd71c74ef574dbc558c82f70e52732c8b44fe # v2.2.1
# with:
# sarif_file: results.sarif