chore(deps): bump pytest from 8.3.3 to 9.0.3 #3
Workflow file for this run
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| name: zizmor | |
| on: | |
| pull_request: | |
| permissions: | |
| contents: read | |
| security-events: write | |
| actions: read | |
| jobs: | |
| scan: | |
| if: github.actor != 'dependabot[bot]' | |
| runs-on: ubuntu-latest | |
| steps: | |
| - name: Harden the runner (Audit all outbound calls) | |
| uses: step-security/harden-runner@fa2e9d605c4eeb9fcad4c99c224cee0c6c7f3594 # v2.16.0 | |
| with: | |
| egress-policy: audit | |
| - name: Checkout target repository | |
| uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
| with: | |
| persist-credentials: false | |
| # Intentionally fails loudly when the org-level variable/secret is | |
| # missing (e.g. fork PRs, where GitHub withholds secrets from workflows | |
| # triggered from forks). A red check on the required workflow is the | |
| # desired signal: it forces a human to either mark the PR trusted or | |
| # investigate why the scanner credentials are unavailable. Do NOT add | |
| # an `if:` guard here to silently skip — loud failure is the contract. | |
| - name: Mint scanner token (org-wide read access for action ref resolution) | |
| id: app-token | |
| uses: actions/create-github-app-token@f8d387b68d61c58ab83c6c016672934102569859 # v3.0.0 | |
| with: | |
| app-id: ${{ vars.ZIZMOR_SCANNER_APP_ID }} | |
| private-key: ${{ secrets.ZIZMOR_SCANNER_PRIVATE_KEY }} | |
| owner: rudderlabs | |
| permission-contents: read | |
| permission-metadata: read | |
| # Inject the shared zizmor config from this repo into the target repo's | |
| # run context. Required because zizmor only auto-discovers config from | |
| # the checked-out working tree, and injected runs check out the target | |
| # repo's tree, not shared-workflows. Without this step, any config-level | |
| # rule overrides we ship here (e.g. the `secrets-outside-env` ignore for | |
| # the zizmor workflow itself) would never apply to injected runs. | |
| - name: Checkout shared zizmor config | |
| uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 | |
| with: | |
| repository: rudderlabs/shared-workflows | |
| # For self-scans (PRs against shared-workflows itself), test the | |
| # PR's proposed config — otherwise a PR that breaks .github/zizmor.yml | |
| # would be validated against main's config and merge green. For | |
| # injected runs in other repos, pin to main for stability. | |
| ref: ${{ github.repository == 'rudderlabs/shared-workflows' && github.event.pull_request.head.sha || 'main' }} | |
| token: ${{ steps.app-token.outputs.token }} | |
| path: .zizmor-shared | |
| persist-credentials: false | |
| sparse-checkout: | | |
| .github/zizmor.yml | |
| sparse-checkout-cone-mode: false | |
| - name: Run zizmor | |
| uses: zizmorcore/zizmor-action@71321a20a9ded102f6e9ce5718a2fcec2c4f70d8 # v0.5.2 | |
| with: | |
| advanced-security: true | |
| min-severity: medium | |
| config: .zizmor-shared/.github/zizmor.yml | |
| token: ${{ steps.app-token.outputs.token }} |