Skip to content

🔄 Sync workflows from org defaults#155

Merged
clubanderson merged 1 commit intomainfrom
sync/workflows-from-org
Jan 13, 2026
Merged

🔄 Sync workflows from org defaults#155
clubanderson merged 1 commit intomainfrom
sync/workflows-from-org

Conversation

@clubanderson
Copy link
Copy Markdown
Contributor

This PR syncs the caller workflows from kubestellar/.github.

These workflows call reusable workflows from kubestellar/infra:

  • add-help-wanted.yml
  • assignment-helper.yml
  • feedback.yml
  • greetings.yml
  • label-helper.yml
  • pr-verifier.yml
  • pr-verify-title.yml
  • scorecard.yml

🤖 Auto-generated by workflow sync

@kubestellar-prow kubestellar-prow bot added the dco-signoff: no Indicates the PR's author has not signed the DCO. label Jan 13, 2026
@kubestellar-prow
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign pdettori for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubestellar-prow
Copy link
Copy Markdown
Contributor

Thanks for your pull request. Before we can look at it, you'll need to add a 'DCO signoff' to your commits.

📝 Please follow instructions in the contributing guide to update your commits with the DCO

Full details of the Developer Certificate of Origin can be found at developercertificate.org.

The list of commits missing DCO signoff:

  • b365fd5 🔄 Sync workflows from kubestellar/.github
Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@kubestellar-prow kubestellar-prow bot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Jan 13, 2026
Comment on lines +13 to +14
uses: kubestellar/infra/.github/workflows/reusable-scorecard.yml@main
secrets: inherit

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 3 months ago

To fix the problem, explicitly declare permissions so that the GITHUB_TOKEN granted to this workflow/job is minimized instead of inheriting potentially read‑write defaults. For a read‑only analysis workflow that invokes a scorecard check, the usual baseline is contents: read at the workflow root, which applies to all jobs unless overridden.

The best fix without changing existing functionality is to add a permissions block at the top level of .github/workflows/scorecard.yml, immediately after the name: line (or anywhere at the root level, before jobs:). This will ensure the analysis job runs with read‑only access to repository contents, which is sufficient for security/scorecard analysis and avoids unnecessary write privileges. No imports or additional methods are required, since this is just a YAML configuration change.

Concretely:

  • Edit .github/workflows/scorecard.yml.
  • Insert:
permissions:
  contents: read
  • Place it between line 1 (name: OpenSSF Scorecard) and the on: block at line 3 (or equivalently between the blank line following the name and on:), keeping indentation consistent.
Suggested changeset 1
.github/workflows/scorecard.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml
--- a/.github/workflows/scorecard.yml
+++ b/.github/workflows/scorecard.yml
@@ -1,5 +1,8 @@
 name: OpenSSF Scorecard
 
+permissions:
+  contents: read
+
 on:
   branch_protection_rule:
   schedule:
EOF
@@ -1,5 +1,8 @@
name: OpenSSF Scorecard

permissions:
contents: read

on:
branch_protection_rule:
schedule:
Copilot is powered by AI and may make mistakes. Always verify output.
@clubanderson clubanderson merged commit 4843ba3 into main Jan 13, 2026
6 of 9 checks passed
@kubestellar-prow kubestellar-prow bot deleted the sync/workflows-from-org branch January 13, 2026 16:05
@github-actions
Copy link
Copy Markdown

🎉 Thank you for your contribution! Your PR has been successfully merged.


🌟 Help KubeStellar Grow - We Need Adopters!

Our roadmap is driven entirely by adopter feedback - nothing else. Whether you're using KubeStellar yourself or know organizations that could benefit from multi-cluster Kubernetes, we need your help:

📋 Take our Multi-Cluster Survey - Share your use cases and help shape our direction!

🗣️ Spread the word - Tell colleagues, write blog posts, present at meetups

💬 Share feedback on Slack #kubestellar-dev

Every adopter story helps us prioritize what matters most. Thank you for being part of the KubeStellar community!

@clubanderson clubanderson added the kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. label Jan 13, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dco-signoff: no Indicates the PR's author has not signed the DCO. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants