Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
67 changes: 66 additions & 1 deletion .github/dependabot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -31,4 +31,69 @@ updates:
groups:
github-actions:
patterns:
- "*"
- "*"

- package-ecosystem: docker
directory: /
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.Core/src
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.Core/tests
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/examples/Fido2SampleCode
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/examples/OathSampleCode
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/examples/PivSampleCode
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/examples/SharedSampleCode
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/examples/U2fSampleCode
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/src
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/tests/integration
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/tests/sandbox
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/tests/unit
schedule:
interval: daily

- package-ecosystem: nuget
directory: /Yubico.YubiKey/tests/utilities
schedule:
interval: daily
35 changes: 34 additions & 1 deletion .github/workflows/build-nativeshims.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,11 +29,19 @@ on:
schedule:
- cron: '0 0 * * *' # Every day at midnight

permissions:
contents: read

jobs:
build-windows:
name: Build Windows
runs-on: windows-2022
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down Expand Up @@ -79,6 +87,11 @@ jobs:
name: Build Linux (amd64)
runs-on: ubuntu-24.04
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down Expand Up @@ -231,6 +244,11 @@ jobs:
name: Build Linux (arm64)
runs-on: ubuntu-24.04
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down Expand Up @@ -304,7 +322,7 @@ jobs:
bash ./build-linux-arm64.sh
fi
- name: Set up QEMU for ARM64 testing
uses: docker/setup-qemu-action@v3
uses: docker/setup-qemu-action@c7c53464625b32c7a7e944ae62b3e17d2b600130 # v3.7.0
with:
platforms: arm64
- name: Test on Ubuntu 18.04 (glibc 2.27)
Expand Down Expand Up @@ -387,6 +405,11 @@ jobs:
name: Build macOS
runs-on: macos-14
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down Expand Up @@ -421,6 +444,11 @@ jobs:
PACKAGE_VERSION: ${{ github.event.inputs.version != '' && github.event.inputs.version || '1.0.0' }}
GITHUB_REPO_URL: https://github.com/${{ github.repository }}
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: Download contents, set metadata and package
uses: actions/download-artifact@018cc2cf5baa6db3ef3c5f8a56943fffe632ef53 # v6.0.0
- run: |
Expand Down Expand Up @@ -460,6 +488,11 @@ jobs:
packages: write
if: ${{ github.event.inputs.push-to-dev == 'true' }}
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/download-artifact@018cc2cf5baa6db3ef3c5f8a56943fffe632ef53 # v6.0.0
with:
name: NuGet Package NativeShims
Expand Down
5 changes: 5 additions & 0 deletions .github/workflows/build-pull-requests.yml
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,11 @@ jobs:
needs: run-tests

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down
18 changes: 18 additions & 0 deletions .github/workflows/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,9 @@ on:
schedule:
- cron: '0 0 * * *' # Every day at midnight

permissions:
contents: read

jobs:
run-tests:
name: Run tests
Expand Down Expand Up @@ -76,6 +79,11 @@ jobs:
symbols-packages-id: ${{ steps.symbols-upload.outputs.artifact-id }}
assemblies-id: ${{ steps.assemblies-upload.outputs.artifact-id }}
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down Expand Up @@ -187,6 +195,11 @@ jobs:
contents: read
packages: write
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/download-artifact@018cc2cf5baa6db3ef3c5f8a56943fffe632ef53 # v6.0.0
with:
name: Nuget Packages
Expand All @@ -209,6 +222,11 @@ jobs:
needs: [run-tests, build-artifacts, publish-internal, upload-docs]
if: always()
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: Generate build summary
env:
# Pass job results into the environment
Expand Down
8 changes: 8 additions & 0 deletions .github/workflows/claude.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,9 @@ on:
pull_request_review:
types: [submitted]

permissions:
contents: read

jobs:
claude:
if: |
Expand All @@ -25,6 +28,11 @@ jobs:
id-token: write
actions: read # Required for Claude to read CI results on PRs
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: Checkout repository
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
Expand Down
5 changes: 5 additions & 0 deletions .github/workflows/codeql-analysis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,11 @@ jobs:
runs-on: windows-2022

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: Checkout repository
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
Expand Down
27 changes: 27 additions & 0 deletions .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
# Dependency Review Action
#
# This Action will scan dependency manifest files that change as part of a Pull Request,
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
# Once installed, if the workflow run is marked as required,
# PRs introducing known-vulnerable packages will be blocked from merging.
#
# Source repository: https://github.com/actions/dependency-review-action
name: 'Dependency Review'
on: [pull_request]

permissions:
contents: read

jobs:
dependency-review:
runs-on: ubuntu-latest
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: 'Checkout Repository'
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4.3.1
- name: 'Dependency Review'
uses: actions/dependency-review-action@3c4e3dcb1aa7874d2c16be7d79418e9b7efd6261 # v4.8.2
10 changes: 10 additions & 0 deletions .github/workflows/deploy-docs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,11 @@ jobs:
runs-on: ubuntu-latest

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: Check out current repo
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
Expand Down Expand Up @@ -82,6 +87,11 @@ jobs:
needs: deploy

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: Checkout
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
Expand Down
7 changes: 6 additions & 1 deletion .github/workflows/scorecard.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,11 @@ jobs:
# actions: read

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- name: "Checkout code"
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
Expand Down Expand Up @@ -74,6 +79,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard (optional).
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
- name: "Upload to code-scanning"
uses: github/codeql-action/upload-sarif@v3
uses: github/codeql-action/upload-sarif@497990dfed22177a82ba1bbab381bc8f6d27058f # v3.31.6
with:
sarif_file: results.sarif
8 changes: 8 additions & 0 deletions .github/workflows/test-macos.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,9 @@ on:
workflow_dispatch:
workflow_call:

permissions:
contents: read

jobs:
test:
name: MacOS
Expand All @@ -27,6 +30,11 @@ jobs:
packages: read

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down
8 changes: 8 additions & 0 deletions .github/workflows/test-ubuntu.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,9 @@ on:
workflow_dispatch:
workflow_call:

permissions:
contents: read

jobs:
test:
name: Ubuntu
Expand All @@ -27,6 +30,11 @@ jobs:
packages: read

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down
8 changes: 8 additions & 0 deletions .github/workflows/test-windows.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,9 @@ on:
workflow_dispatch:
workflow_call:

permissions:
contents: read

jobs:
test:
name: Windows
Expand All @@ -27,6 +30,11 @@ jobs:
contents: read

steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
with:
egress-policy: audit

- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 # v6.0.0
with:
persist-credentials: false
Expand Down
Loading
Loading