]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
ci: pin labeler
authorEvgeny Vereshchagin <evvers@ya.ru>
Thu, 11 Nov 2021 01:56:02 +0000 (01:56 +0000)
committerEvgeny Vereshchagin <evvers@ya.ru>
Thu, 11 Nov 2021 10:19:06 +0000 (10:19 +0000)
Turns out GHActions where `pull_request_target` is used are capable
of pwning repositories: https://securitylab.github.com/research/github-actions-preventing-pwn-requests/

labeler doesn't check out the source code or build anything so
it's safe in its current form but to avoid surprises let's just pin
it to the latest version. It's annoying to manage dependencies like this
manually so additionally dependabot.yml is introduced to make it
easier to keep GHActions up to date more or less automatically:
https://docs.github.com/en/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/keeping-your-actions-up-to-date-with-dependabot

.github/dependabot.yml [new file with mode: 0644]
.github/workflows/labeler.yml

diff --git a/.github/dependabot.yml b/.github/dependabot.yml
new file mode 100644 (file)
index 0000000..1230149
--- /dev/null
@@ -0,0 +1,6 @@
+version: 2
+updates:
+  - package-ecosystem: "github-actions"
+    directory: "/"
+    schedule:
+      interval: "daily"
index aad5d2157ffb80901a00ac4115bc4141af991e61..ee238c2fa713c4a57692d685c8a504decf4186f4 100644 (file)
@@ -11,7 +11,7 @@ jobs:
   triage:
     runs-on: ubuntu-latest
     steps:
-    - uses: actions/labeler@main
+    - uses: actions/labeler@69da01b8e0929f147b8943611bee75ee4175a49e
       with:
         repo-token: "${{ secrets.GITHUB_TOKEN }}"
         configuration-path: .github/labeler.yml