Gradience/.github/workflows/dependency-review.yml
tfuxu 2a94a508b2
meta: make Dependency Review not fail
Dependency Review action can be only run on pull requests, as it requires base_ref/head_ref configuration options, which are only available on `pull_request` and `pull_request_target` triggers. More info: https://docs.github.com/en/actions/learn-github-actions/contexts

Signed-off-by: tfuxu <73042332+tfuxu@users.noreply.github.com>
2023-01-23 16:33:22 +00:00

26 lines
884 B
YAML

# Dependency Review Action
#
# This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable packages will be blocked from merging.
#
# Source repository: https://github.com/actions/dependency-review-action
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
name: Dependency Review
on:
pull_request:
permissions:
contents: read
jobs:
dependency-review:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v3
- name: Dependency Review
uses: actions/dependency-review-action@v3