diff --git a/.github/workflows/test-secrets-action-sarif.yaml b/.github/workflows/test-secrets-action-sarif.yaml index 28e6f04..7157f40 100644 --- a/.github/workflows/test-secrets-action-sarif.yaml +++ b/.github/workflows/test-secrets-action-sarif.yaml @@ -8,24 +8,20 @@ jobs: permissions: security-events: write steps: - - uses: actions/checkout@v3 + - uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # ratchet:actions/checkout@v4 with: fetch-depth: 0 - name: Scan Secrets id: orcasecurity_secrets_scan uses: ./ with: - api_token: - ${{ secrets.ORCA_SECURITY_API_TOKEN }} - project_key: - "default" - format: - "sarif" - output: - "results/" + api_token: ${{ secrets.ORCA_SECURITY_API_TOKEN }} + project_key: "default" + format: "sarif" + output: "results/" console_output: "table" - name: Upload SARIF file - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@2e230e8fe0ad3a14a340ad0815ddb96d599d2aff # ratchet:github/codeql-action/upload-sarif@v3 if: ${{ always() && steps.orcasecurity_secrets_scan.outputs.exit_code != 1 }} with: sarif_file: results/secrets.sarif \ No newline at end of file diff --git a/.github/workflows/test-secrets-action.yaml b/.github/workflows/test-secrets-action.yaml index 3933bc6..55db19b 100644 --- a/.github/workflows/test-secrets-action.yaml +++ b/.github/workflows/test-secrets-action.yaml @@ -7,16 +7,14 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout - uses: actions/checkout@v3 + uses: actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # ratchet:actions/checkout@v4 with: fetch-depth: 0 - + - name: Scan Secrets id: orcasecurity uses: ./ with: - api_token: - ${{ secrets.ORCA_SECURITY_API_TOKEN }} - project_key: - "default" + api_token: ${{ secrets.ORCA_SECURITY_API_TOKEN }} + project_key: "default" console_output: "table" \ No newline at end of file diff --git a/README.md b/README.md index 8bf931c..2089b0a 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,7 @@ jobs: steps: # Checkout your repository under $GITHUB_WORKSPACE, so your job can access it - name: Checkout Repository - uses: actions/checkout@v3 + uses: actions/checkout@v4 with: fetch-depth: 0 @@ -116,7 +116,7 @@ jobs: permissions: security-events: write steps: - - uses: actions/checkout@v3 + - uses: actions/checkout@v4 with: fetch-depth: 0 - name: Scan Secrets @@ -133,7 +133,7 @@ jobs: "results/" console_output: "table" - name: Upload SARIF file - uses: github/codeql-action/upload-sarif@v2 + uses: github/codeql-action/upload-sarif@v3 if: ${{ always() && steps.orcasecurity_secrets_scan.outputs.exit_code != 1 }} with: sarif_file: results/secrets.sarif