Skip to content

chore(deps): bump tqdm from 4.67.2 to 4.67.3 in the pip group #812

chore(deps): bump tqdm from 4.67.2 to 4.67.3 in the pip group

chore(deps): bump tqdm from 4.67.2 to 4.67.3 in the pip group #812

Workflow file for this run

# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
#
# Sobelow is a security-focused static analysis tool for the Phoenix framework. https://sobelow.io/
#
# To use this workflow, you must have GitHub Advanced Security (GHAS) enabled for your repository.
#
# Instructions:
# 2. Follow the annotated workflow below and make any necessary modifications then save the workflow to your repository
# and review the "Security" tab once the action has run.
# This GitHub Actions workflow is named "Sobelow" and is triggered on push and pull request events to the "main" branch,
# as well as on a scheduled cron job every Friday at 22:25 UTC.
#
# The workflow has read permissions for repository contents.
#
# The "security-scan" job within the workflow has the following permissions:
# - Write access to contents for actions/checkout to fetch code.
# - Write access to security events for github/codeql-action/upload-sarif to upload SARIF results.
# - Read access to actions, required only for private repositories by github/codeql-action/upload-sarif to get the Action run status.
#
# The job runs on the latest Ubuntu runner and includes the following steps:
# 1. Harden Runner: Uses the step-security/harden-runner action to enhance security by disabling sudo, blocking egress traffic,
# and allowing specific endpoints.
# 2. Checkout Code: Uses the actions/checkout action to fetch the repository code.
# 3. Run Sobelow Action: Uses the sobelow/action to perform a security scan.
name: Sobelow
on:
push:
branches: ["main"]
pull_request:
branches: ["main"]
schedule:
- cron: "25 22 * * 5"
permissions:
contents: read
concurrency:
group: sobelow-${{ github.ref }}
cancel-in-progress: false
jobs:
security-scan:
permissions:
contents: write # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
with:
disable-sudo: false
egress-policy: audit
allowed-endpoints: >
builds.hex.pm:443
github.com:443
repo.hex.pm:443
sobelow.io:443
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
- id: run-action
uses: sobelow/action@4c2cc216597acef2c5f8b4b2e49ad591be36ce36
continue-on-error: true