Skip to content

Roll BoringSSL from 739613d2e62b to 40e035a9e5d7 (82 revisions) #9398

Roll BoringSSL from 739613d2e62b to 40e035a9e5d7 (82 revisions)

Roll BoringSSL from 739613d2e62b to 40e035a9e5d7 (82 revisions) #9398

name: Third party deps scan
on:
# Only the default branch is supported.
branch_protection_rule:
push:
branches: [ main ]
pull_request:
types: [ labeled ]
# Declare default permissions as read only.
permissions: read-all
jobs:
extract-deps:
name: Extract dependencies
runs-on: 'ubuntu-24.04'
if: ${{ (github.repository == 'dart-lang/sdk' && github.event_name == 'push') || github.event.label.name == 'vulnerability scan' }}
permissions:
# Needed to upload the SARIF results to the code-scanning dashboard.
security-events: write
contents: read
steps:
- name: "Checkout code"
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8
with:
persist-credentials: false
- name: "Set up python"
uses: actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065
with:
python-version: '3.13.3' # Install the python version needed.
- name: "Extract deps, find commit hash, pass to osv-scanner"
run: python .github/extract_deps.py --output osv-lockfile-${{github.sha}}.json
- name: "Upload osv-scanner deps"
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02
with:
# Use github.ref in name to avoid duplicated artifacts.
name: osv-lockfile-${{github.sha}}
path: osv-lockfile-${{github.sha}}.json
retention-days: 2
vuln-scan:

Check failure on line 41 in .github/workflows/third-party-deps-scan.yml

View workflow run for this annotation

GitHub Actions / Third party deps scan

Invalid workflow file

The workflow is not valid. .github/workflows/third-party-deps-scan.yml (Line: 41, Col: 3): Error calling workflow 'google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@main'. The workflow is requesting 'actions: read', but is only allowed 'actions: none'.
name: Vulnerability scanning
needs:
extract-deps
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@main"
with:
# Download the artifact uploaded in the extract-deps step.
download-artifact: osv-lockfile-${{github.sha}}
scan-args: |-
--lockfile=osv-scanner:osv-lockfile-${{github.sha}}.json
fail-on-vuln: false
# Makes sure the osv-formatted vulns are uploaded.
permissions:
# Needed to upload the SARIF results to the code-scanning dashboard.
security-events: write
contents: read