mirror of
https://github.com/StarWishsama/Slimefun4.git
synced 2024-09-20 03:35:51 +00:00
55c9251d5b
Restrict the GitHub token permissions only to the required ones; this way, even if the attackers will succeed in compromising your workflow, they won’t be able to do much. - Included permissions for the action. https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs [Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/) Signed-off-by: naveen <172697+naveensrinivasan@users.noreply.github.com>
25 lines
591 B
YAML
25 lines
591 B
YAML
name: Auto approve
|
|
|
|
on: pull_request
|
|
|
|
permissions:
|
|
contents: read
|
|
|
|
jobs:
|
|
auto-approve:
|
|
|
|
permissions:
|
|
pull-requests: write # for hmarr/auto-approve-action to approve PRs
|
|
name: Auto approve Pull Request
|
|
runs-on: ubuntu-latest
|
|
|
|
## Only run this on the main repo
|
|
if: github.event.pull_request.head.repo.full_name == 'Slimefun/Slimefun4'
|
|
|
|
steps:
|
|
- name: Approve via actions
|
|
uses: hmarr/auto-approve-action@v2.2.1
|
|
if: github.actor == 'TheBusyBot' || github.actor == 'renovate[bot]'
|
|
with:
|
|
github-token: "${{ secrets.GITHUB_TOKEN }}"
|