-
Notifications
You must be signed in to change notification settings - Fork 139
ci: add actions-security job to audit GitHub Actions usage #4260
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
Adds a new GitHub Actions workflow job to audit the security of GitHub Actions usage in the repository. This addresses security concerns by implementing automated checks on action usage as part of the CI pipeline.
- Adds
actions-security
job to CI workflow - Configures security auditing with high-level checks and Ansys actions trust
- Enables automated summary generation for security audit results
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #4260 +/- ##
==========================================
- Coverage 91.33% 91.27% -0.07%
==========================================
Files 193 193
Lines 15720 15720
==========================================
- Hits 14358 14348 -10
- Misses 1362 1372 +10 🚀 New features to boost your workflow:
|
Looks like you have some fixes to perform right @germa89 ? Run python ${GITHUB_ACTION_PATH}/../python-utils/zizmor-summary.py
========= ================
File name Number of issues
========= ================
./.github/actions/build-matrix/action.yml 5
./.github/actions/pytest-summary/action.yml 3
./.github/actions/test-julia/action.yml 1
./.github/actions/test-windows/action.yml 4
./.github/workflows/approver.yml 18
./.github/workflows/cache_cleaner.yml 8
./.github/workflows/ci.yml 19
./.github/workflows/codeql-analysis.yml 5
./.github/workflows/doc-build.yml 23
./.github/workflows/docker_clean_untagged.yml 2
./.github/workflows/label.yml 14
./.github/workflows/linkchecker.yml 4
./.github/workflows/migrator.yml 14
./.github/workflows/pr-docs-cleaner.yml 2
./.github/workflows/test-local.yml 26
./.github/workflows/test-remote.yml 33
========= ================
Total 181
========= ================ |
@RobPasMue I knowww 😭😭😭 |
@germa89, use https://github.com/suzuki-shunsuke/pinact to automatically pin the latest hash for the actions you use. It will save you some time when addressing previous warnings.
|
thank you a lot @jorgepiloto !! 😄 |
Unify workflows to use top-level `permissions: {}` and grant minimal, explicit job-level permissions where needed across GitHub Actions (ci, doc-build, test-local, test-remote, approver, cache_cleaner, codeql-analysis, docker_clean_untagged, label, linkchecker, migrator, pr-docs-cleaner). Also include small behavioural fixes: - Pass BUILDER via env in doc-build and use it when invoking Make. - Introduce PYTHON_ACTIVATE env usage in CI steps that activate venvs. - Use LATEST_VERSION env in test-local and annotate container image as unpinned. - Minor reorganization of permissions/read/write scopes per job.
…heck-actions-security-job
…k-actions-security-job
@RobPasMue @jorgepiloto @moe-ad ... it took aaaaagess.... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀 🚀 🚀 🚀 🚀
I think the permission changes are going to bite me in the future... @pyansys-ci-bot LGTM. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Description
As the title.
Issue linked
Close #4238
Checklist
draft
if it is not ready to be reviewed yet.feat: adding new MAPDL command
)