-
-
Notifications
You must be signed in to change notification settings - Fork 868
Specify default permissions for vrms-data.yml #8588
Copy link
Copy link
Open
Labels
Complexity: MediumFeature: Refactor GHARefactoring GitHub actions to fit latest architectural normsRefactoring GitHub actions to fit latest architectural normsrole: back end/devOpsTasks for back-end developersTasks for back-end developerssize: 5ptCan be done in 19-30 hoursCan be done in 19-30 hours
Milestone
Metadata
Metadata
Assignees
Labels
Complexity: MediumFeature: Refactor GHARefactoring GitHub actions to fit latest architectural normsRefactoring GitHub actions to fit latest architectural normsrole: back end/devOpsTasks for back-end developersTasks for back-end developerssize: 5ptCan be done in 19-30 hoursCan be done in 19-30 hours
Type
Fields
Give feedbackNo fields configured for issues without a type.
Projects
Status
Prioritized backlog
Prerequisites
Overview
We need to update the default permissions for the GitHub workflow specified in vrms-data.yml, so that it does not have more permissions than it needs.
Details
To align with GitHub security best practices, we want to specify the minimum required permissions for each workflow via a top-level
permissions:block to ensure that workflows only have the access they need by default.Every GitHub Actions workflow automatically receives a
GITHUB_TOKENwith a set of default repository permissions defined in the repo settings which may result in the workflow having more permissions than it needs to complete its job. By explicitly defining minimum default permissions at the workflow level, we can ensure that workflow has only the permissions it needs. Then if a job or step requires more access, those permissions can be explicitly granted using job-level permissions statements or step-level tokens (PATs).We performed an audit to identify the minimum top-level permissions required for each workflow. The goal of this and related issues is to verify that each workflow continues to function correctly with the explicitly defined permissions. This approach helps minimize unnecessary privileges and strengthen overall repository security.
For additional info, see issue #8178 and GitHub's recommendation for security best practice.
Action Items
Note that this issue involves testing GitHub Actions. See "Resources/Instructions" below for how to set up your personal environment for testing.
Refer to vrms-data.yml.
on:section.jobs:insert:Resources/Instructions