Skip to content

build(deps): bump fortify/gha-export-vulnerabilities from fcb374411cff9809028c911dabb8b57dbdae623b to d2838d7a21c0499504efe8f384573f51bea799e0 #183

build(deps): bump fortify/gha-export-vulnerabilities from fcb374411cff9809028c911dabb8b57dbdae623b to d2838d7a21c0499504efe8f384573f51bea799e0

build(deps): bump fortify/gha-export-vulnerabilities from fcb374411cff9809028c911dabb8b57dbdae623b to d2838d7a21c0499504efe8f384573f51bea799e0 #183

Workflow file for this run

# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
# This workflow integrates Pyre with GitHub's
# Code Scanning feature.
#
# Pyre is a performant type checker for Python compliant with
# PEP 484. Pyre can analyze codebases with millions of lines
# of code incrementally – providing instantaneous feedback
# to developers as they write code.
#
# See https://pyre-check.org
name: Pyre
on:
workflow_dispatch:
push:
branches: [ "master" ]
pull_request:
branches: [ "master" ]
permissions:
contents: read
jobs:
pyre:
permissions:
actions: read
contents: read
security-events: write
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0
with:
egress-policy: audit
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
with:
submodules: true
- name: Run Pyre
uses: facebook/pyre-action@60697a7858f7cc8470d8cc494a3cf2ad6b06560d
with:
# To customize these inputs:
# See https://github.com/facebook/pyre-action#inputs
repo-directory: './'
requirements-path: 'requirements.txt'