A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://github.com/actions/dependency-review-action below:

actions/dependency-review-action: A GitHub Action for detecting vulnerable dependencies and invalid licenses in your PRs

The dependency review action scans your pull requests for dependency changes, and will raise an error if any vulnerabilities or invalid licenses are being introduced. The action is supported by an API endpoint that diffs the dependencies between any two revisions on your default branch.

The action is available for:

When the action runs, you can see the results on:

You can install the action on any public repository, or any organization-owned private repository, provided the organization has a GitHub Advanced Security license.

  1. Add a new YAML workflow to your .github/workflows folder:

    name: 'Dependency Review'
    on: [pull_request]
    
    permissions:
      contents: read
    
    jobs:
      dependency-review:
        runs-on: ubuntu-latest
        steps:
          - name: 'Checkout Repository'
            uses: actions/checkout@v4
          - name: 'Dependency Review'
            uses: actions/dependency-review-action@v4
Installation (GitHub Enterprise Server)

You can install the action on repositories on GitHub Enterprise Server.

  1. Ensure GitHub Advanced Security and GitHub Connect are enabled for the enterprise.

  2. Ensure you have installed the dependency-review-action on the server.

  3. Add a new YAML workflow to your .github/workflows folder:

    name: 'Dependency Review'
    on: [pull_request]
    
    permissions:
      contents: read
    
    jobs:
      dependency-review:
        runs-on: self-hosted
        steps:
          - name: 'Checkout Repository'
            uses: actions/checkout@v4
          - name: 'Dependency Review'
            uses: actions/dependency-review-action@v4
  4. In the workflow file, replace the runs-on value with the label of any of your runners. (The default value is self-hosted.)

There are various configuration options you can use to specify settings for the dependency review action.

All configuration options are optional.

Option Usage Possible values Default value fail-on-severity Defines the threshold for the level of severity. The action will fail on any pull requests that introduce vulnerabilities of the specified severity level or higher. low, moderate, high, critical low allow-licenses* Contains a list of allowed licenses. The action will fail on pull requests that introduce dependencies with licenses that do not match the list. Any SPDX-compliant identifier(s) none deny-licenses* Contains a list of prohibited licenses. The action will fail on pull requests that introduce dependencies with licenses that match the list. Any SPDX-compliant identifier(s) none fail-on-scopes Contains a list of strings of the build environments you want to support. The action will fail on pull requests that introduce vulnerabilities in the scopes that match the list. runtime, development, unknown runtime allow-ghsas Contains a list of GitHub Advisory Database IDs that can be skipped during detection. Any GHSAs from the GitHub Advisory Database none license-check Enable or disable the license check performed by the action. true, false true vulnerability-check Enable or disable the vulnerability check performed by the action. true, false true allow-dependencies-licenses* Contains a list of packages that will be excluded from license checks. Any package(s) in purl format none base-ref/head-ref Provide custom git references for the git base/head when performing the comparison check. This is only used for event types other than pull_request and pull_request_target. Any valid git ref(s) in your project none comment-summary-in-pr Enable or disable reporting the review summary as a comment in the pull request. If enabled, you must give the workflow or job the pull-requests: write permission. With each execution, a new comment will overwrite the existing one. always, on-failure, never never deny-packages Any number of packages to block in a PR. This option will match on the exact version provided. If no version is provided, the option will treat the specified package as a wildcard and deny all versions. Package(s) in purl format empty deny-groups Any number of groups (namespaces) to block in a PR. Namespace(s) in purl format (no package name, no version number) empty retry-on-snapshot-warnings* Enable or disable retrying the action every 10 seconds while waiting for dependency submission actions to complete. true, false false retry-on-snapshot-warnings-timeout* Maximum amount of time (in seconds) to retry the action while waiting for dependency submission actions to complete. Any positive integer 120 warn-only+ When set to true, the action will log all vulnerabilities as warnings regardless of the severity, and the action will complete with a success status. This overrides the fail-on-severity option. true, false false show-openssf-scorecard When set to true, the action will output information about all the known OpenSSF Scorecard scores for the dependencies changed in this pull request. true, false true warn-on-openssf-scorecard-level When show-openssf-scorecard-levels is set to true, this option lets you configure the threshold for when a score is considered too low and gets a ⚠️ warning in the CI. Any positive integer 3

Note

To specify settings for the dependency review action, you can choose from two options:

Option 1: Using inline configuration

You can pass configuration options to the dependency review action using your workflow file.

  1. In the same YAML workflow file you created during installation, use the with: key to specify your chosen settings:

    name: 'Dependency Review'
    on: [pull_request]
    permissions:
      contents: read
    jobs:
      dependency-review:
        runs-on: ubuntu-latest
        steps:
          - name: 'Checkout Repository'
            uses: actions/checkout@v4
          - name: Dependency Review
            uses: actions/dependency-review-action@v4
            with:
              fail-on-severity: moderate
    
              # Use comma-separated names to pass list arguments:
              deny-licenses: LGPL-2.0, BSD-2-Clause
Option 2: Using an external configuration file

You can use an external configuration file to specify settings for this action. The file can be a local file or a file in an external repository.

  1. In the same YAML workflow file you created during installation, use config-file to specify that you are using an external configuration file.

    name: 'Dependency Review'
    on: [pull_request]
    permissions:
      contents: read
    jobs:
      dependency-review:
        runs-on: ubuntu-latest
        steps:
          - name: 'Checkout Repository'
            uses: actions/checkout@v4
          - name: Dependency Review
            uses: actions/dependency-review-action@v4
            with:
              config-file: './.github/dependency-review-config.yml'
    Option Usage Possible values config-file A path to a file in the current repository or an external repository. Use this syntax for external files: OWNER/REPOSITORY/FILENAME@BRANCH Local file: ./.github/dependency-review-config.yml
    External repo: github/octorepo/dependency-review-config.yml@main
  2. Optionally, if the file resides in a private external repository, and for all GitHub Enterprise Server repositories, use external-repo-token to specify a token for fetching the file.

    - name: Dependency Review
      uses: actions/dependency-review-action@v4
      with:
        config-file: 'github/octorepo/dependency-review-config.yml@main'
        external-repo-token: 'ghp_123456789abcde'
    Option Usage Possible values external-repo-token Specifies a token for fetching the configuration file. It is required if the file resides in a private external repository and for all GitHub Enterprise Server repositories. Create a token in developer settings. Any token with read permissions to the repository hosting the config file.
  3. Create the configuration file in the path you specified for config-file.

  4. In the configuration file, specify your chosen settings.

    fail_on_severity: 'critical'
    allow_licenses:
      - 'GPL-3.0'
      - 'BSD-3-Clause'
      - 'MIT'

    [!NOTE] For external configuration files, the option names use underscores instead of dashes. Example: fail_on_severity

License data comes from ClearlyDefined and you may sometimes see licenses displayed with the string OTHER in them. ClearlyDefined defines OTHER as:

This indicates that a human confirmed that there is license information in the file but that the license is not an SPDX-identified license.

OTHER is not a valid SPDX license identifier, so we convert OTHER in a license string into LicenseRef-clearlydefined-OTHER, which is valid in SPDX. If you want to add that to the deny or allow list, be sure to add LicenseRef-clearlydefined-OTHER to this list, because that is what we'll actually be comparing.

Using dependency review action to block a pull request from being merged

You can configure your repository to block a pull request from being merged if the pull request fails the dependency review action check. To do this, the repository owner must configure branch protection settings that require the check to pass before merging. For more information, see "Require status checks before merging" in GitHub Docs documentation.

Dependency review action can create outputs, so that data from its execution can be used by other jobs in a workflow.

Note

Action outputs are unicode strings with a 1MB size limit.

If you use these outputs in a run-step, you must store the output data in an environment variable instead of using the output directly. Using an output directly might break shell scripts. For example:

env:
  VULNERABLE_CHANGES: ${{ steps.review.outputs.vulnerable-changes }}
run: |
  echo "$VULNERABLE_CHANGES" | jq

instead of direct echo '${{ steps.review.outputs.vulnerable-changes }}'. See examples for more.

If you have bug reports, questions or suggestions please create a new issue.

We are grateful for any contributions made to this project. Please read CONTRIBUTING.MD to get started.

This project is released under the MIT License.


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4