You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(linter): add workflow permissions analysis with actions-permissions
- Add new permissions-analysis job to linter.yml workflow
- Job runs GitHubSecurityLab/actions-permissions to analyze workflow permissions
- Follows same pattern as actions-pinning job for consistency
- Uses minimal permissions (contents: read)
- Analyzes same workflow files as defined in action-files input
- Updates documentation to reflect new permissions analysis feature
Co-authored-by: neilime <314088+neilime@users.noreply.github.com>
Signed-off-by: Emilien Escalle <emilien.escalle@escemi.com>
Copy file name to clipboardExpand all lines: .github/workflows/linter.yml
+60-2Lines changed: 60 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,7 @@
4
4
# - [Super-Linter](https://github.com/super-linter/super-linter), with some opinionated defaults.
5
5
# - [CodeQL](https://docs.github.com/en/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql) to analyze the code.
6
6
# - [Ratchet](https://github.com/sethvargo/ratchet) to check that GitHub Action versions are pinned.
7
+
# - [Actions Permissions](https://github.com/GitHubSecurityLab/actions-permissions) to analyze and optimize workflow permissions.
7
8
8
9
name: "Linter"
9
10
on:
@@ -41,6 +42,15 @@ on:
41
42
./action.yml
42
43
./.github/workflows/**/*.yml
43
44
./actions/**/*.yml
45
+
workflow-files:
46
+
description: |
47
+
List of files or directories where GitHub workflows are located.
48
+
Supports glob patterns.
49
+
Leave empty to disable the check.
50
+
type: string
51
+
required: false
52
+
default: |
53
+
./.github/workflows/*.yml
44
54
lint-all:
45
55
description: "Run checks on all files, not just the changed ones."
0 commit comments