You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This fixes issues identified by the zizmor linter which checks for
Github Actions security best practicies.
Summary of changes:
- Remove possibilities for shell injection. These can all only be
activated by workflow_dispatch input provided by people who already
have access to the repository but still a good idea to tidy this up.
Many of these occur in the build-package-docs actions. We should test
everything to make sure nothing is broken by these changes.
- Explicitly set permissions. This is not strictly required, because we
already enforce a limited set of default permissions in the repo's GHA
settings, but zizmor wants us to be explicit.
- Use `persist-credentials: false` with the checkout action.
0 commit comments