-
-
Notifications
You must be signed in to change notification settings - Fork 199
chore: Securing workflows #1105
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Otherwise you end up in an infinite loop of the bot closing your PR.
The latest updates on your projects. Learn more about Vercel for GitHub.
|
Use the on.pull_request.paths to filter out relevant PRs, and trigger only on: - PRs by maintainers - PRs labeled with `deploy:preview`
Co-authored-by: Copilot <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR removes risky GitHub Actions workflows to reduce the potential attack surface for token leaks and GHA misuse. The changes align with security best practices by eliminating workflows that could pose security risks while simplifying and improving the remaining automation.
- Completely removes snapshot release and ship-it workflows that required elevated permissions
- Simplifies pkg.pr.new workflow by removing approval-based triggers and using path-based filtering
- Enhances milestone automation with better error handling and support for updating linked issues
Reviewed Changes
Copilot reviewed 5 out of 5 changed files in this pull request and generated 2 comments.
Show a summary per file
File | Description |
---|---|
.github/workflows/snapshot-release.yml |
Removes entire snapshot deployment workflow that used NPM tokens |
.github/workflows/ship-it.yml |
Removes workflow that required PAT tokens for branch management |
.github/workflows/pr-base-enforcement.yml |
Updates comment message to clarify PR reopening requirement |
.github/workflows/pkg.pr.new.yml |
Simplifies trigger logic by removing approval-based deployment and using path filtering |
.github/workflows/milestone-automation.yml |
Adds comprehensive linked issues milestone updating with error handling |
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
To avoid invalid expansions into arbitrary commands
64198d4
to
2632fe2
Compare
🎉 This PR is included in version 2.6.0-beta.1 🎉 The release is available on: Your semantic-release bot 📦🚀 |
Objective is to reduce the potential attack surface for token leaks & GHA misuse.
GITHUB_TOKEN
permissions to be read-only by defaultmaster
tonext
, unused)on.pull_request.paths
, and remove approval-based trigger)Setting up proper OIDC trusted publishing for NPM will require
semantic-release
to have official support.Resources:
Thanks @ciffelia for the tips!
Closes #1106.