Clarify lifecycle of google_secret_manager_secret_version
and google_secret_manager_regional_secret_version
resource in documentation
#10
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Required actions to scan GitHub action workflows for security issues. | |
name: Scan GitHub Action workflows files for security issues | |
on: | |
pull_request: {} | |
permissions: | |
contents: read | |
security-events: write | |
actions: read | |
jobs: | |
semgrep: | |
name: semgrep-oss/scan | |
runs-on: ubuntu-latest | |
container: | |
image: semgrep/semgrep | |
# Skip any PR created by dependabot to avoid permission issues: | |
if: (github.actor != 'dependabot[bot]') | |
steps: | |
- name: Checkout Code | |
uses: actions/checkout@v4 | |
- name: Checkout Workflow Config | |
uses: actions/checkout@v4 | |
env: | |
GH_REPO_OWNER: ${{ github.repository_owner }} | |
with: | |
repository: 'google/github-team' | |
path: action_scanning | |
- name: Run Actions semgrep scan | |
run: semgrep scan --sarif --config action_scanning/semgrep-rules/actions >> semgrep-results-actions.sarif | |
- name: Save Actions SARIF results as artifact | |
uses: actions/upload-artifact@v4 | |
with: | |
name: semgrep-scan-results-actions | |
path: semgrep-results-actions.sarif | |
- name: Upload Actions SARIF result to the GitHub Security Dashboard | |
uses: github/codeql-action/upload-sarif@v3 | |
with: | |
sarif_file: semgrep-results-actions.sarif | |
if: always() |