Bumps [actions/dependency-review-action](https://github.com/actions/dependency-review-action) from 2 to 3. - [Release notes](https://github.com/actions/dependency-review-action/releases) - [Commits](https://github.com/actions/dependency-review-action/compare/v2...v3) --- updated-dependencies: - dependency-name: actions/dependency-review-action dependency-type: direct:production update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] <support@github.com>
		
			
				
	
	
		
			21 lines
		
	
	
		
			886 B
		
	
	
	
		
			YAML
		
	
	
	
	
	
			
		
		
	
	
			21 lines
		
	
	
		
			886 B
		
	
	
	
		
			YAML
		
	
	
	
	
	
| # Dependency Review Action
 | |
| #
 | |
| # This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable packages will be blocked from merging.
 | |
| #
 | |
| # Source repository: https://github.com/actions/dependency-review-action
 | |
| # Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
 | |
| name: CI-dependency-review
 | |
| on: [pull_request]
 | |
| 
 | |
| permissions:
 | |
|   contents: read
 | |
| 
 | |
| jobs:
 | |
|   dependency-review:
 | |
|     runs-on: ubuntu-latest
 | |
|     steps:
 | |
|       - name: 'Checkout Repository'
 | |
|         uses: actions/checkout@v3
 | |
|       - name: 'Dependency Review'
 | |
|         uses: actions/dependency-review-action@v3
 |