Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[check actions] setting GITHUB_TOKEN permissions to read #3983

Merged
merged 2 commits into from
Aug 24, 2023
Merged

[check actions] setting GITHUB_TOKEN permissions to read #3983

merged 2 commits into from
Aug 24, 2023

Conversation

gkunz
Copy link
Contributor

@gkunz gkunz commented Aug 17, 2023

This change limits the scope of GITHUB_TOKENs to "read-only" for all contexts for the checker actions.

This is one part of adopting security best practices of the OpenSSF based on the ScoreCard tool [1] as outlined in issue #3977.

Moreover, this PR only updates one workflow. For the other workflows, we need to determine if read-only is feasible or if some actions must be run with write permissions.

[1] https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions

This change limits the scope of GITHUB_TOKENs to read-only for
all contexts for the checker actions.

This is a part of adopting security best practices of the
OpenSSF based on the ScoreCard tool [1]

[1] https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions

Signed-off-by: Georg Kunz <georg.kunz@ericsson.com>
@gkunz gkunz requested review from bruntib and vodorok as code owners August 17, 2023 16:02
Setting read-only permission for all scopes for the GITHUB_TOKEN used
in all remaining workflows.

This is a part of adopting security best practices of the
OpenSSF based on the ScoreCard tool [1]

[1] https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions

Signed-off-by: Georg Kunz <georg.kunz@ericsson.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants