Skip to content

chore(deps): update step-security/harden-runner action to v2.10.2 #1761

chore(deps): update step-security/harden-runner action to v2.10.2

chore(deps): update step-security/harden-runner action to v2.10.2 #1761

Workflow file for this run

name: SonarCloud Analysis
on:
push:
branches:
- master
pull_request:
branches:
- master
workflow_dispatch:
permissions:
contents: read
jobs:
build:
name: SonarCloud Scan
runs-on: ubuntu-latest
permissions:
contents: read
if: github.event_name != 'pull_request' || github.event.pull_request.head.repo.full_name == github.event.pull_request.base.repo.full_name
steps:
- name: Harden Runner
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
github.com:443
npm.pkg.github.com:443
objects.githubusercontent.com:443
pipelinesghubeus23.actions.githubusercontent.com:443
pkg-npm.githubusercontent.com:443
registry.npmjs.org:443
api.sonarcloud.io:443
analysis-sensorcache-eu-central-1-prod.s3.amazonaws.com:443
sc-cleancode-sensorcache-eu-central-1-prod.s3.amazonaws.com:443
scanner.sonarcloud.io:443
sonarcloud.io:443
- name: Check out the source code
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
fetch-depth: 0
- name: Run SonarCloud analysis
uses: myrotvorets/composite-actions/node-sonarscan@cecb96664cb67f063d11aedb7456874eda7e9028
with:
sonar-token: ${{ secrets.SONAR_TOKEN }}
test-script: 'test:sonarqube'