This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
     new c2760bd0a4 chore: Set permissions for GitHub actions (#956)
c2760bd0a4 is described below

commit c2760bd0a4776fa61402349af7bc94c3bd050873
Author: Naveen <[email protected]>
AuthorDate: Fri Jun 17 02:03:14 2022 -0500

    chore: Set permissions for GitHub actions (#956)
    
    Restrict the GitHub token permissions only to the required ones; this way, 
even if the attackers will succeed in compromising your workflow, they won’t be 
able to do much.
    
    - Included permissions for the action. 
https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions
    
    
https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
    
    https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs
    
    [Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn 
requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)
    
    Signed-off-by: naveen <[email protected]>
---
 .github/workflows/codeql-analysis.yml | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/.github/workflows/codeql-analysis.yml 
b/.github/workflows/codeql-analysis.yml
index 46791ebcba..d8a886582b 100644
--- a/.github/workflows/codeql-analysis.yml
+++ b/.github/workflows/codeql-analysis.yml
@@ -14,8 +14,15 @@ on:
   #schedule:
     #- cron: '0 18 * * 5'
 
+permissions:
+  contents: read
+
 jobs:
   analyze:
+    permissions:
+      actions: read  # for github/codeql-action/init to get workflow details
+      contents: read  # for actions/checkout to fetch code
+      security-events: write  # for github/codeql-action/analyze to upload 
SARIF results
     name: Analyze
     runs-on: ubuntu-latest
 

Reply via email to