Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Roll Fuchsia SDK from 30.20251201.7.1 to 30.20251204.5.1 #10729

Roll Fuchsia SDK from 30.20251201.7.1 to 30.20251204.5.1

Roll Fuchsia SDK from 30.20251201.7.1 to 30.20251204.5.1 #10729

name: Third party deps scan
on:
# Only the default branch is supported.
branch_protection_rule:
push:
branches: [ main ]
pull_request:
types: [ labeled ]
# Declare default permissions as read only.
permissions: read-all
jobs:
extract-deps:
name: Extract dependencies
runs-on: 'ubuntu-24.04'
if: ${{ (github.repository == 'dart-lang/sdk' && github.event_name == 'push') || github.event.label.name == 'vulnerability scan' }}
permissions:
# Needed to upload the SARIF results to the code-scanning dashboard.
security-events: write
contents: read
steps:
- name: "Checkout code"
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3
with:
persist-credentials: false
- name: "Set up python"
uses: actions/setup-python@83679a892e2d95755f2dac6acb0bfd1e9ac5d548
with:
python-version: '3.13.3' # Install the python version needed.
- name: "Extract deps, find commit hash, pass to osv-scanner"
run: python .github/extract_deps.py --output osv-lockfile-${{github.sha}}.json
- name: "Upload osv-scanner deps"
uses: actions/upload-artifact@330a01c490aca151604b8cf639adc76d48f6c5d4
with:
# Use github.ref in name to avoid duplicated artifacts.
name: osv-lockfile-${{github.sha}}
path: osv-lockfile-${{github.sha}}.json
retention-days: 2
vuln-scan:

Check failure on line 41 in .github/workflows/third-party-deps-scan.yml

View workflow run for this annotation

GitHub Actions / Third party deps scan

Invalid workflow file

The workflow is not valid. .github/workflows/third-party-deps-scan.yml (Line: 41, Col: 3): Error calling workflow 'google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@main'. The workflow is requesting 'actions: read', but is only allowed 'actions: none'.
name: Vulnerability scanning
needs:
extract-deps
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@main"
with:
# Download the artifact uploaded in the extract-deps step.
download-artifact: osv-lockfile-${{github.sha}}
scan-args: |-
--lockfile=osv-scanner:osv-lockfile-${{github.sha}}.json
fail-on-vuln: false
# Makes sure the osv-formatted vulns are uploaded.
permissions:
# Needed to upload the SARIF results to the code-scanning dashboard.
security-events: write
contents: read
Morty Proxy This is a proxified and sanitized view of the page, visit original site.