Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Dec 28, 2025

This PR contains the following updates:

Package Type Update Change
8hobbies/workflows action digest 00e8456 -> abd9589

Configuration

📅 Schedule: Branch creation - "on Sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from xuhdev as a code owner December 28, 2025 00:38
@renovate renovate bot enabled auto-merge (squash) December 28, 2025 00:38
jobs:
lint:
uses: 8hobbies/workflows/.github/workflows/npm-lint.yml@00e84568aa8441faba7d53d88666b78e19c677d7
uses: 8hobbies/workflows/.github/workflows/npm-lint.yml@abd958951e5f7fe9cdc2b25bf6686a4ba5b5c47e

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 8 days ago

In general, this problem is fixed by explicitly declaring a permissions block either at the root of the workflow (to apply to all jobs) or inside the specific job that uses the GITHUB_TOKEN. For a lint workflow that only needs to fetch code and run checks, contents: read is typically sufficient. This constrains GITHUB_TOKEN to read-only access to repository contents, rather than inheriting potentially broader read-write defaults.

The single best fix here, without changing functionality, is to add a root-level permissions block just after the name: line (or before jobs:) in .github/workflows/lint.yml, specifying contents: read. A root-level block will apply to the lint job unless that job or the called reusable workflow requests narrower permissions. Since this workflow appears only to run linting via a reusable workflow, read-only repository contents access is appropriate and should not break existing behavior.

Concretely:

  • Edit .github/workflows/lint.yml.

  • Insert:

    permissions:
      contents: read

    between the name: Lint line and the on: block. No imports or additional methods are needed, as this is pure YAML configuration.

Suggested changeset 1
.github/workflows/lint.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/lint.yml b/.github/workflows/lint.yml
--- a/.github/workflows/lint.yml
+++ b/.github/workflows/lint.yml
@@ -14,6 +14,9 @@
 
 name: Lint
 
+permissions:
+  contents: read
+
 on:
   push:
     branches: ["master"]
EOF
@@ -14,6 +14,9 @@

name: Lint

permissions:
contents: read

on:
push:
branches: ["master"]
Copilot is powered by AI and may make mistakes. Always verify output.
jobs:
run:
uses: 8hobbies/workflows/.github/workflows/npm-publish-dry-run.yml@00e84568aa8441faba7d53d88666b78e19c677d7
uses: 8hobbies/workflows/.github/workflows/npm-publish-dry-run.yml@abd958951e5f7fe9cdc2b25bf6686a4ba5b5c47e

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 8 days ago

Generally, the fix is to add an explicit permissions block that limits the default GITHUB_TOKEN scope to the minimum required. This can be declared either at the workflow root (applies to all jobs) or under the specific job. Since this workflow only has a single run job and delegates to another workflow, the cleanest approach is to set permissions at the workflow root so any future jobs also inherit restricted permissions by default.

Concretely, in .github/workflows/publish-dry-run.yml, insert a permissions: section between the name: and on: keys. For a publish dry run that should only need to read repository contents and metadata for dependency installation and tests, contents: read is a safe starting point. If the called workflow truly needs broader permissions (e.g., to write to packages or create releases), those can be further specialized in the called workflow itself; the local workflow does not need to grant write permissions unless explicitly required. No imports or additional methods are necessary because this is a YAML configuration file.

Suggested changeset 1
.github/workflows/publish-dry-run.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/publish-dry-run.yml b/.github/workflows/publish-dry-run.yml
--- a/.github/workflows/publish-dry-run.yml
+++ b/.github/workflows/publish-dry-run.yml
@@ -14,6 +14,9 @@
 
 name: Publish Dry Run
 
+permissions:
+  contents: read
+
 on:
   push:
     branches: ["master"]
EOF
@@ -14,6 +14,9 @@

name: Publish Dry Run

permissions:
contents: read

on:
push:
branches: ["master"]
Copilot is powered by AI and may make mistakes. Always verify output.
jobs:
test:
uses: 8hobbies/workflows/.github/workflows/npm-runtime.yml@00e84568aa8441faba7d53d88666b78e19c677d7
uses: 8hobbies/workflows/.github/workflows/npm-runtime.yml@abd958951e5f7fe9cdc2b25bf6686a4ba5b5c47e

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 8 days ago

To fix the problem, explicitly set permissions for the workflow or for the test job so that the GITHUB_TOKEN has only the minimal required scopes. Since this file triggers tests on push and pull_request and delegates all work to a reusable workflow, the safest and simplest approach is to set a restrictive default at the workflow root, which applies to all jobs that do not override it.

The single best fix without changing functionality is to add a root-level permissions: block with contents: read, which is a common minimal starting point for CI workflows that only need to read the repository. If the reusable workflow requires additional scopes (e.g., packages: read), those would be added there as needed, but we cannot infer that from the snippet, so we stick to a minimal yet standard configuration. Concretely, in .github/workflows/runtime.yml, add a permissions: section after the on: block and before jobs:. No imports or additional definitions are needed because this is a YAML workflow configuration change only.

Suggested changeset 1
.github/workflows/runtime.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/runtime.yml b/.github/workflows/runtime.yml
--- a/.github/workflows/runtime.yml
+++ b/.github/workflows/runtime.yml
@@ -20,6 +20,9 @@
   pull_request:
     branches: ["master"]
 
+permissions:
+  contents: read
+
 jobs:
   test:
     uses: 8hobbies/workflows/.github/workflows/npm-runtime.yml@abd958951e5f7fe9cdc2b25bf6686a4ba5b5c47e
EOF
@@ -20,6 +20,9 @@
pull_request:
branches: ["master"]

permissions:
contents: read

jobs:
test:
uses: 8hobbies/workflows/.github/workflows/npm-runtime.yml@abd958951e5f7fe9cdc2b25bf6686a4ba5b5c47e
Copilot is powered by AI and may make mistakes. Always verify output.
@renovate renovate bot merged commit e5be01d into master Dec 28, 2025
13 checks passed
@renovate renovate bot deleted the renovate/all-digest branch December 28, 2025 00:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant