Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: Set permissions for GitHub actions #5090

Merged
merged 2 commits into from
Apr 12, 2022
Merged

chore: Set permissions for GitHub actions #5090

merged 2 commits into from
Apr 12, 2022

Conversation

neilnaveen
Copy link
Contributor

@neilnaveen neilnaveen requested a review from a team April 12, 2022 13:12
@jsjoeio jsjoeio changed the title Set permissions for GitHub actions chore: Set permissions for GitHub actions Apr 12, 2022
Copy link
Contributor

@jsjoeio jsjoeio left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for opening this and the detailed explanation!

I'll see if I can push a change to fix the formatting

image

@jsjoeio
Copy link
Contributor

jsjoeio commented Apr 12, 2022

Hmm...I tried pushing but it just created a new branch under our repo. @neilnaveen can you run yarn fmt locally?

- Included permissions for the action. https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions

https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions

https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs

[Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)

 Restrict the GitHub token permissions only to the required ones; this way, even if the attackers will succeed in compromising your workflow, they won’t be able to do much.

Signed-off-by: neilnaveen <42328488+neilnaveen@users.noreply.github.com>
@neilnaveen
Copy link
Contributor Author

Hmm...I tried pushing but it just created a new branch under our repo. @neilnaveen can you run yarn fmt locally?

I have done that, Thanks.

@jsjoeio jsjoeio enabled auto-merge (squash) April 12, 2022 18:43
@codecov
Copy link

codecov bot commented Apr 12, 2022

Codecov Report

Merging #5090 (13562ff) into main (fd2a031) will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##             main    #5090   +/-   ##
=======================================
  Coverage   71.30%   71.30%           
=======================================
  Files          30       30           
  Lines        1683     1683           
  Branches      373      373           
=======================================
  Hits         1200     1200           
  Misses        413      413           
  Partials       70       70           

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update fd2a031...13562ff. Read the comment docs.

@jsjoeio jsjoeio merged commit f4569f0 into coder:main Apr 12, 2022
TinLe pushed a commit to TinLe/code-server that referenced this pull request Apr 23, 2022
- Included permissions for the action. https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions

https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions

https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs

[Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)

 Restrict the GitHub token permissions only to the required ones; this way, even if the attackers will succeed in compromising your workflow, they won’t be able to do much.

Signed-off-by: neilnaveen <42328488+neilnaveen@users.noreply.github.com>

Co-authored-by: Joe Previte <jjprevite@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants