This is an automated email from the ASF dual-hosted git repository.

rusackas pushed a commit to branch depedency-review
in repository https://gitbox.apache.org/repos/asf/superset.git

commit ae606e0758200d2ebecdbb11c0d72f037c04c1a6
Author: Evan Rusackas <[email protected]>
AuthorDate: Fri May 5 13:10:44 2023 -0600

    Create dependency-review.yml
---
 .github/workflows/dependency-review.yml | 20 ++++++++++++++++++++
 1 file changed, 20 insertions(+)

diff --git a/.github/workflows/dependency-review.yml 
b/.github/workflows/dependency-review.yml
new file mode 100644
index 0000000000..fe461b4243
--- /dev/null
+++ b/.github/workflows/dependency-review.yml
@@ -0,0 +1,20 @@
+# Dependency Review Action
+#
+# This Action will scan dependency manifest files that change as part of a 
Pull Request, surfacing known-vulnerable versions of the packages declared or 
updated in the PR. Once installed, if the workflow run is marked as required, 
PRs introducing known-vulnerable packages will be blocked from merging.
+#
+# Source repository: https://github.com/actions/dependency-review-action
+# Public documentation: 
https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
+name: 'Dependency Review'
+on: [pull_request]
+
+permissions:
+  contents: read
+
+jobs:
+  dependency-review:
+    runs-on: ubuntu-latest
+    steps:
+      - name: 'Checkout Repository'
+        uses: actions/checkout@v3
+      - name: 'Dependency Review'
+        uses: actions/dependency-review-action@v2

Reply via email to