Bump actions/download-artifact from 3 to 4.1.7 in /.github/workflows #1
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Fully Compliant | |
on: | |
push: | |
branches: [master, main] | |
pull_request: | |
branches: [master, main] | |
workflow_dispatch: | |
jobs: | |
licensing: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Advance Security Compliance Action | |
uses: advanced-security/policy-as-code@main | |
with: | |
# Set the severity levels which to set the threshold. All previous | |
# severities are included so selecting 'error' also selects 'critical' and | |
# 'high' along with 'error'. | |
# severity: error | |
# Repository owner/name. | |
# This can be setup using a separate repository to the one being analysed | |
# for security compliance | |
# repository: octoaustenstone/ghas-policy-as-code | |
# The owner/repo of where the policy is stored | |
# This generally is primarily used for a single repository that defines | |
# your organizations security policy | |
policy: octoaustenstone/ghas-policy-as-code | |
# The path where the policy lives. This might be in either the current | |
# repository or in a remote repository. | |
policy-path: policy.yml | |
# The branch you want to target using `policy` argument | |
# policy-branch: 'main' | |
# GitHub Personal Access Token to access the GitHub API. | |
# Secret Scanning and Dependabot do not allow their resources to be | |
# exposed to Actions so this might need to be set using a token that has | |
# the ability to access the resources | |
token: ${{ secrets.GHAS_POLICY_AS_CODE_TOKEN }} | |
# [optional] GitHub reference, this is passed in by Actions at runtime | |
# ref: refs/heads/main | |
# [optional] What course of action to take upon discovering security issues that pass | |
# threshold? | |
# action: break | |
# [optional] Additional arguments | |
# argvs: "--disable-secret-scanning --disable-dependabot" |