-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
github: add a dependency review action #1665
github: add a dependency review action #1665
Conversation
141bb46
to
d3d239f
Compare
Based on the output: This checks the github actions used in a workflow, so adding it in a new workflows does not check the actions used in the ramen/tools/e2e workflows. |
d3d239f
to
c097984
Compare
IMO, it is reporting that this PR added dependency on these two actions. If a subsequent PR adds dependency on a go package/module, it will report that. I am not sure if the scoping is limited to the top most Go module in the repository. If that happens to be the case, we will fix it. |
ok, make sense. We can test this by adding a new dependency in another workflow or in ramen in a temporary commit. |
@nirs I added a temporary commit and here is the run output https://github.com/RamenDR/ramen/actions/runs/11980488467?pr=1665
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Checked default configurations for the action, they seem to cover adequately required severity and result in failures. I was wondering if we should add allowed license list, but that can come subsequently (just noting the thought for now).
LGTM! waiting for the test code to be undone, before an approval/merge.
@ShyamsundarR GitHub has gone into a weird state. See the |
This action provides information about * Which dependencies were added, removed, or updated. * How many projects use these components. * Vulnerability data for these dependencies. * License type and compatibility. For more info, read: - [Understanding Your Software Supply Chain](https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review) - [Dependency Review Action](https://github.com/actions/dependency-review-action) Signed-off-by: Raghavendra Talur <[email protected]>
c097984
to
293a599
Compare
This action provides information about
For more info, read
https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review
https://github.com/actions/dependency-review-action