-
Notifications
You must be signed in to change notification settings - Fork 1.4k
🌱 drop pr approver workflow top-level permissions #10659
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🌱 drop pr approver workflow top-level permissions #10659
Conversation
Set top-level permissions to none. This is the best practice for GH actions, and for example OpenSSF Scorecards penalize CAPI for not having it. Signed-off-by: Tuomo Tanskanen <[email protected]>
Does this workflow work without any permissions? |
Setting the job level permissions to As described, this is merely a best practice improvement to explicitly drop them at top-level (ie. safe guards against adding another job without permissions = full access via top-level) and it makes security scanners happier. For example, OpenSSF scorecard. |
Ups, missed that we are adding the permission on the lower level |
/lgtm |
LGTM label has been added. Git tree hash: e8c924efdec7abf6cdca1fd48f65b07b658faab0
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: sbueringer The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What this PR does / why we need it:
Set PR approver workflow top-level permissions to none. This is the best practice for GH actions, and for example OpenSSF Scorecards penalize CAPI for not having it.
/area ci