Conversation
Bumps [ASFHyP3/actions](https://github.com/asfhyp3/actions) from 0.18.1 to 0.19.0. - [Release notes](https://github.com/asfhyp3/actions/releases) - [Changelog](https://github.com/ASFHyP3/actions/blob/develop/CHANGELOG.md) - [Commits](ASFHyP3/actions@v0.18.1...v0.19.0) --- updated-dependencies: - dependency-name: ASFHyP3/actions dependency-version: 0.19.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
…3/actions-0.19.0 Bump ASFHyP3/actions from 0.18.1 to 0.19.0
Pulling refs/tags/v0.10.9 into develop
Add content to ARIA GUNW product guide about coverage thresholds and ingesting on-demand products to the archive
| jobs: | ||
| call-changelog-check-workflow: | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-changelog-check.yml@v0.18.1 | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-changelog-check.yml@v0.19.0 |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 9 months ago
To fix the issue, we will add a permissions block at the root level of the workflow. Since the workflow is related to checking changelogs, it likely only needs read access to the repository contents. We will set contents: read as the minimal required permission. This ensures that the GITHUB_TOKEN is restricted to read-only access, adhering to the principle of least privilege.
| @@ -2,2 +2,5 @@ | ||
|
|
||
| permissions: | ||
| contents: read | ||
|
|
||
| on: |
| jobs: | ||
| call-labeled-pr-check-workflow: | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-labeled-pr-check.yml@v0.18.1 | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-labeled-pr-check.yml@v0.19.0 |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 9 months ago
To fix the issue, we will add a permissions block at the root level of the workflow. This block will specify the minimal permissions required for the workflow to function. Based on the context, the workflow likely only needs contents: read permissions, as it is checking labels on pull requests and does not appear to modify repository contents or perform other write operations.
| @@ -2,2 +2,5 @@ | ||
|
|
||
| permissions: | ||
| contents: read | ||
|
|
||
| on: |
| jobs: | ||
| call-secrets-analysis-workflow: | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-secrets-analysis.yml@v0.18.1 | ||
| uses: ASFHyP3/actions/.github/workflows/reusable-secrets-analysis.yml@v0.19.0 |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 9 months ago
To fix the issue, we need to add a permissions block to the workflow. This block should specify the least privileges required for the workflow to function correctly. Since the workflow calls a reusable workflow for secrets analysis, it likely only needs contents: read permissions. If additional permissions are required, they should be explicitly added based on the functionality of the reusable workflow.
The permissions block should be added at the root level of the workflow to apply to all jobs unless overridden by job-specific permissions.
| @@ -4,2 +4,5 @@ | ||
|
|
||
| permissions: | ||
| contents: read | ||
|
|
||
| jobs: |
Developer checklist
Reviewer checklist
|
Final edits to ARIA S1 GUNW Product Guide
Remove references to 90% coverage threshold
|
Project priorities have changed, and ingest of on-demand products will not be released until after other functionality has been released. |
Add content to ARIA GUNW product guide about 90% coverage threshold and ingesting on-demand products to the archive