Harden GITHUB_TOKEN permissions

Signed-off-by: Craig Ingram <cjingram@google.com>
This commit is contained in:
Craig Ingram 2022-11-01 10:56:38 -04:00
parent 8167751f56
commit a270d6e8ae
No known key found for this signature in database
GPG Key ID: 5B1AE4FE04985AD3
11 changed files with 48 additions and 1 deletions

View File

@ -20,7 +20,7 @@ on:
default: westeurope
permissions:
packages: write
contents: read
env:
AZURE_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUB_ID }}
@ -30,6 +30,8 @@ env:
jobs:
images:
permissions:
packages: write
name: "Build volume test images"
runs-on: ubuntu-latest
timeout-minutes: 60

View File

@ -14,11 +14,17 @@ env:
# Note: don't forget to update `Binaries` step, as it contains the matrix of all supported Go versions.
GO_VERSION: "1.19.2"
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
#
# golangci-lint
#
linters:
permissions:
contents: read # for actions/checkout to fetch code
pull-requests: read # for golangci/golangci-lint-action to fetch pull requests
name: Linters
runs-on: ${{ matrix.os }}
timeout-minutes: 10

View File

@ -10,9 +10,16 @@ on:
- main
- 'release/**'
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
CodeQL-Build:
permissions:
actions: read # for github/codeql-action/init to get workflow details
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/analyze to upload SARIF results
strategy:
fail-fast: false

View File

@ -1,5 +1,8 @@
name: Fuzzing
on: [pull_request]
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
# Run all fuzzing tests. Some of them use Go 1.18's testing.F.
# Others use https://github.com/AdaLogics/go-fuzz-headers.

View File

@ -9,6 +9,9 @@ on:
image:
description: "Target image name (override)"
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
mirror:
name: "Mirror Image"

View File

@ -9,6 +9,9 @@ on:
env:
GO_VERSION: '1.19.2'
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
linux:
name: Linux

View File

@ -8,6 +8,9 @@ name: Containerd Release
env:
GO_VERSION: '1.19.2'
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
check:
name: Check Signed Tag
@ -123,6 +126,8 @@ jobs:
release:
name: Create containerd Release
permissions:
contents: write
runs-on: ubuntu-20.04
timeout-minutes: 10
needs: [build, check]

View File

@ -7,9 +7,16 @@ on:
schedule:
- cron: "0 1 * * *"
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
triggerWinIntegration:
# NOTE: the following permissions are required by `google-github-actions/auth`:
permissions:
contents: 'read'
id-token: 'write'
if: github.repository == 'containerd/containerd'
# NOTE(aznashwan, 11/24/21): GitHub actions do not currently support referencing
# or evaluating any kind of variables in the `uses` clause, but this will

View File

@ -28,6 +28,8 @@ env:
WEBSERVER_TESTING_IMAGE_REF: "k8s.gcr.io/e2e-test-images/nginx:1.14-2"
HCSSHIM_TAG: "master"
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
winIntegration:

View File

@ -7,9 +7,16 @@ on:
schedule:
- cron: "0 1 * * *"
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
triggerWinIntegration:
# NOTE: the following permissions are required by `google-github-actions/auth`:
permissions:
contents: 'read'
id-token: 'write'
if: github.repository == 'containerd/containerd'
# NOTE(aznashwan, 11/24/21): GitHub actions do not currently support referencing
# or evaluating any kind of variables in the `uses` clause, but this will

View File

@ -27,6 +27,8 @@ env:
RESOURCE_CONSUMER_TESTING_IMAGE_REF: "registry.k8s.io/e2e-test-images/resource-consumer:1.10"
WEBSERVER_TESTING_IMAGE_REF: "registry.k8s.io/e2e-test-images/nginx:1.14-2"
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
winIntegration: