name: "Frogbot Scan Pull Request" on: pull_request_target: types: [opened, synchronize] permissions: pull-requests: write contents: read # [Mandatory If using OIDC authentication protocol instead of JF_ACCESS_TOKEN] # id-token: write jobs: scan-pull-request: runs-on: ubuntu-latest # A pull request needs to be approved before Frogbot scans it. Any GitHub user who is associated with the # "frogbot" GitHub environment can approve the pull request to be scanned. environment: frogbot steps: - uses: jfrog/frogbot@v2 env: # [Mandatory] # JFrog platform URL JF_URL: ${{ secrets.JF_URL }} # [Mandatory if JF_USER and JF_PASSWORD are not provided] # JFrog access token with 'read' permissions on Xray service # JF_ACCESS_TOKEN: ${{ secrets.JF_ACCESS_TOKEN }} # [Mandatory if JF_ACCESS_TOKEN is not provided] # JFrog username with 'read' permissions for Xray. Must be provided with JF_PASSWORD JF_USER: ${{ secrets.JF_USER }} # [Mandatory if JF_ACCESS_TOKEN is not provided] # JFrog password. Must be provided with JF_USER JF_PASSWORD: ${{ secrets.JF_ACCESS_TOKEN }} # [Mandatory] # The GitHub token is automatically generated for the job JF_GIT_TOKEN: ${{ secrets.JF_GIT_TOKEN }} # [Mandatory if using OIDC authentication protocol instead of JF_ACCESS_TOKEN] # Insert to oidc-provider-name the 'Provider Name' defined in the OIDC integration configured in the JPD # with: # oidc-provider-name: ""