Skip to content

ci: Harden CI + Add zizmor static analysis for GH Actions#99

Merged
philipaconrad merged 1 commit intoopen-policy-agent:mainfrom
philipaconrad:philip/ci-hardening-zizmor
Feb 24, 2026
Merged

ci: Harden CI + Add zizmor static analysis for GH Actions#99
philipaconrad merged 1 commit intoopen-policy-agent:mainfrom
philipaconrad:philip/ci-hardening-zizmor

Conversation

@philipaconrad
Copy link
Copy Markdown
Member

@philipaconrad philipaconrad commented Feb 24, 2026

What changed, and why?

This commit fixes all findings from the Github Actions static analysis tool zizmor, and adds it to our pull request checks.

It also changes the release commit detection workflow to use the reduced-permissions pull_request workflow trigger, and now skips on non-releases. It succeeds/fails only when a release commit is detected.

Unfortunately, due to the pull_request_target already being set up on main, that version of the workflow is what will run on this PR, so we can't test the new reduced-permissions version until it's merged (breaking the "upstream only" behavior). 🙁

Definition of done

  • Do the existing workflows still pass?
  • Do release commits get detected / handled correctly in the detection workflow?
    • Skip: Normal PR, no release commit.
    • Fail: Release commit, version mismatches.
    • Pass: Release commit, versions all match.
  • We'll test the release commit detection in a follow-up PR (with the above strategy)

How to test

  • Allow normal CI to run for this PR.
  • For testing release workflow:
    • Skip: tested by the base state of this PR.
    • Fail: Push release commit to the PR branch with version mismatch.
    • Pass: Push release commit to the PR branch with all versions matched.

Related Resources

This commit fixes all findings from the Github Actions
static analyis tool zizmor, and adds it to our pull request
checks.

It also changes the release commit detection workflow to
use the reduced-permissions `pull_request` workflow trigger,
and now skips on non-releases. It succeeds/fails only when
a release commit is detected.

Signed-off-by: Philip Conrad <philip@chariot-chaser.net>
@philipaconrad philipaconrad self-assigned this Feb 24, 2026
@philipaconrad philipaconrad added the github-actions Involves changes to Github Actions label Feb 24, 2026
@github-advanced-security
Copy link
Copy Markdown

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Copy link
Copy Markdown
Contributor

@srenatus srenatus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also updating the actions! Nice, thanks!

@philipaconrad philipaconrad marked this pull request as ready for review February 24, 2026 20:12
@philipaconrad philipaconrad merged commit 31aa313 into open-policy-agent:main Feb 24, 2026
11 of 12 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

github-actions Involves changes to Github Actions

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants