-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: least privileged GITHUB_TOKEN permissions #2395
ci: least privileged GITHUB_TOKEN permissions #2395
Conversation
Signed-off-by: Ricardo Lopes <ricardoapl.dev@gmail.com>
This issue is currently awaiting triage. If kube-state-metrics contributors determine this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
If #2398 is getting merged, will this workflow work with only read permissions? |
That's a good point, the workflow will not work with read only permissions then. I suggest we keep default top-level permissions to read-only, but add Although perhaps unlikely, there's a chance that a new job is added to this workflow, and its permissions could be left undefined because of human error. What do you think? |
Sounds good to me, let's mark this read-only for now. /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mrueg, ricardoapl The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What this PR does / why we need it:
The
GITHUB_TOKEN
is an automatically generated secret to make authenticated calls to the GitHub API. GitHub recommends setting minimum token permissions for theGITHUB_TOKEN
, otherwise attackers may use a compromised token with write access to, for example, push malicious code into the project.Found in CLOMonitor Checks and OpenSSF Scorecard Report.
How does this change affect the cardinality of KSM:
Does not change cardinality
Which issue(s) this PR fixes:
Part of #2274