Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,4 @@
uses: ./.github/workflows/lint.yml

test:
uses: ./.github/workflows/test.yml
uses: ./.github/workflows/test.yml

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 17 days ago

To fix the problem:

  • Add an explicit permissions: block at the top-level of .github/workflows/ci.yml, just below the workflow's name. This will ensure all jobs, except those with their own permissions block, have the minimum necessary privileges.
  • As a general least-privilege starting point, set contents: read, which is sufficient for most workflows needing to fetch code but not to write anything back to the repository or act on issues, etc.
  • If any downstream jobs/workflows specifically require additional permission, those should have their own explicit job-level permissions block.
  • To implement: Insert the following lines after name: CI and before on:.
Suggested changeset 1
.github/workflows/ci.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml
--- a/.github/workflows/ci.yml
+++ b/.github/workflows/ci.yml
@@ -1,4 +1,6 @@
 name: CI
+permissions:
+  contents: read
 
 on:
   push:
EOF
@@ -1,4 +1,6 @@
name: CI
permissions:
contents: read

on:
push:
Copilot is powered by AI and may make mistakes. Always verify output.
49 changes: 49 additions & 0 deletions .pipelines/security-scans.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
trigger:
branches:
include:
- main

pr: none

resources:
repositories:
- repository: codeql
type: github
name: UiPath/AzurePipelinesTemplates
ref: refs/tags/uipath.security.codeql.1.9.5
endpoint: UiPath
- repository: fossa
type: github
name: UiPath/AzurePipelinesTemplates
ref: refs/tags/uipath.security.fossa.3.0.13
endpoint: UiPath

variables:
- template: ./variables.yml

stages:
- stage: FOSSA
dependsOn: []
jobs:
- job: FOSSA
steps:
- template: Security/fossa.steps.yml@fossa
parameters:
OS: linux
azureSubscription: $(azureInternalProductionEaConnectionName)
FOSSAFlags: '--project "uipath-llamaindex-python" --branch "$(Build.SourceBranch)" --revision "$(Build.SourceVersion)-$(Build.BuildId)"'
FOSSATestFlags: '--project "uipath-llamaindex-python" --revision "$(Build.SourceVersion)-$(Build.BuildId)"'
${{ if contains(variables['Build.SourceBranch'], 'main') }}:
publishSecurityReports: true


- stage: CODEQL
dependsOn: []
jobs:
- job: CODEQL
steps:
- template: Security/codeql.interpreted.steps.yml@codeql
parameters:
os: 'linux64'
language: 'python'
azureSubscription: $(azureInternalProductionEaConnectionName)
2 changes: 2 additions & 0 deletions .pipelines/variables.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
variables:
azureInternalProductionEaConnectionName: Internal-Production-EA