Skip to content

Pin mitlibraries/.github action to 935e2fa#330

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pin-dependencies
Open

Pin mitlibraries/.github action to 935e2fa#330
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pin-dependencies

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Mar 27, 2026

This PR contains the following updates:

Package Type Update Change
mitlibraries/.github action pinDigest 935e2fa

Configuration

📅 Schedule: Branch creation - At 12:00 AM through 04:59 AM and 10:00 PM through 11:59 PM, Monday through Friday ( * 0-4,22-23 * * 1-5 ), Only on Sunday and Saturday ( * * * * 0,6 ) (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@mitlib mitlib temporarily deployed to tacos-api-pipeline-pr-330 March 27, 2026 01:50 Inactive
@renovate renovate bot changed the title Pin mitlibraries/.github action to c758f3f Pin mitlibraries/.github action to 935e2fa Apr 3, 2026
@renovate renovate bot force-pushed the renovate/pin-dependencies branch from d2f863e to c16a8ab Compare April 3, 2026 17:42
jobs:
shared:
uses: mitlibraries/.github/.github/workflows/ruby-shared-ci.yml@main
uses: mitlibraries/.github/.github/workflows/ruby-shared-ci.yml@935e2fa59553dbb29b68d3c186a041f3233bfd10 # main

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 2 days ago

In general, the fix is to explicitly set a permissions block that limits the GITHUB_TOKEN to the minimum scopes needed. This can be set at the workflow root (applies to all jobs that don’t override it) or for the specific job. Since this workflow only has a single job delegating to a reusable workflow, and we don’t see it requiring any write permissions, a safe and typical choice is to give read‑only access to repository contents (contents: read), which is the minimal commonly useful setting for CI jobs that only need to fetch code.

The best way to fix this file without changing existing behavior is to add a permissions block at the top level, between the on: section and jobs:, specifying contents: read. This documents the intended least privilege and ensures that, even if org/repo defaults change, this workflow will keep the restricted permissions. Concretely, in .github/workflows/mit-libraries-ruby-ci.yml, after line 5–6 (the pull_request branches section) and before line 8 (jobs:), insert:

permissions:
  contents: read

No imports or additional definitions are needed; this is just YAML configuration for GitHub Actions.

Suggested changeset 1
.github/workflows/mit-libraries-ruby-ci.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/mit-libraries-ruby-ci.yml b/.github/workflows/mit-libraries-ruby-ci.yml
--- a/.github/workflows/mit-libraries-ruby-ci.yml
+++ b/.github/workflows/mit-libraries-ruby-ci.yml
@@ -4,6 +4,8 @@
     branches: [main]
   pull_request:
     branches: [main]
+permissions:
+  contents: read
 
 jobs:
   shared:
EOF
@@ -4,6 +4,8 @@
branches: [main]
pull_request:
branches: [main]
permissions:
contents: read

jobs:
shared:
Copilot is powered by AI and may make mistakes. Always verify output.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants