This makes it easy to verify the permissions and to apply them to all jobs
within a given workflow.
- cron: "0 0 * * 4"
workflow_dispatch:
+permissions:
+ contents: read
+
jobs:
test:
uses: ./.github/workflows/aws-lc-template.yml
- cron: "0 0 * * 4"
workflow_dispatch:
+permissions:
+ contents: read
+
jobs:
test:
uses: ./.github/workflows/aws-lc-template.yml
- cron: "0 0 25 * *"
workflow_dispatch:
+permissions:
+ contents: read
+
jobs:
gcc:
runs-on: ubuntu-latest
if: ${{ github.repository_owner == 'haproxy' || github.event_name == 'workflow_dispatch' }}
- permissions:
- contents: read
steps:
- name: "Checkout repository"
uses: actions/checkout@v5
- cron: "0 0 25 * *"
workflow_dispatch:
+permissions:
+ contents: read
+
jobs:
gcc:
runs-on: ubuntu-latest
if: ${{ github.repository_owner == 'haproxy' || github.event_name == 'workflow_dispatch' }}
- permissions:
- contents: read
steps:
- name: "Checkout repository"
uses: actions/checkout@v5
schedule:
- cron: "0 0 * * 2"
+permissions:
+ contents: read
jobs:
combined-build-and-run:
runs-on: ubuntu-24.04
if: ${{ github.repository_owner == 'haproxy' || github.event_name == 'workflow_dispatch' }}
- permissions:
- contents: read
steps:
- uses: actions/checkout@v5
schedule:
- cron: "0 0 * * 2"
+permissions:
+ contents: read
jobs:
combined-build-and-run:
runs-on: ubuntu-24.04
if: ${{ github.repository_owner == 'haproxy' || github.event_name == 'workflow_dispatch' }}
- permissions:
- contents: read
steps:
- uses: actions/checkout@v5