@@ -36,23 +36,29 @@ jobs:
3636 steps :
3737 # Note that a duplicate of this step must be added at the top of
3838 # each job.
39- - uses : GitHubSecurityLab/actions-permissions/monitor@v1
39+ - name : Apply standard cisagov job preamble
40+ uses : cisagov/action-job-preamble@v1
4041 with :
41- # Uses the organization variable unless overridden
42- config : ${{ vars.ACTIONS_PERMISSIONS_CONFIG }}
43- # Note that a duplicate of this step must be added at the top of
44- # each job.
45- - id : harden-runner
46- name : Harden the runner
47- uses : step-security/harden-runner@v2
48- with :
49- egress-policy : audit
50- - id : github-status
51- name : Check GitHub status
52- uses : crazy-max/ghaction-github-status@v4
53- - id : dump-context
54- name : Dump context
55- uses : crazy-max/ghaction-dump-context@v2
42+ check_github_status : " true"
43+ # This functionality is poorly implemented and has been
44+ # causing a lot of problems due to the MITM implementation
45+ # hogging or leaking memory, so we disable it for now.
46+ monitor_permissions : " false"
47+ output_workflow_context : " true"
48+ # Use a variable to specify the permissions monitoring
49+ # configuration. By default this will yield the
50+ # configuration stored in the cisagov organization-level
51+ # variable, but if you want to use a different configuration
52+ # then simply:
53+ # 1. Create a repository-level variable with the name
54+ # ACTIONS_PERMISSIONS_CONFIG.
55+ # 2. Set this new variable's value to the configuration you
56+ # want to use for this repository.
57+ #
58+ # Note in particular that changing the permissions
59+ # monitoring configuration *does not* require you to modify
60+ # this workflow.
61+ permissions_monitoring_config : ${{ vars.ACTIONS_PERMISSIONS_CONFIG }}
5662 lint :
5763 needs :
5864 - diagnostics
@@ -61,15 +67,27 @@ jobs:
6167 contents : read
6268 runs-on : ubuntu-latest
6369 steps :
64- - uses : GitHubSecurityLab/actions-permissions/monitor@v1
65- with :
66- # Uses the organization variable unless overridden
67- config : ${{ vars.ACTIONS_PERMISSIONS_CONFIG }}
68- - id : harden-runner
69- name : Harden the runner
70- uses : step-security/harden-runner@v2
70+ - name : Apply standard cisagov job preamble
71+ uses : cisagov/action-job-preamble@v1
7172 with :
72- egress-policy : audit
73+ # This functionality is poorly implemented and has been
74+ # causing a lot of problems due to the MITM implementation
75+ # hogging or leaking memory, so we disable it for now.
76+ monitor_permissions : " false"
77+ # Use a variable to specify the permissions monitoring
78+ # configuration. By default this will yield the
79+ # configuration stored in the cisagov organization-level
80+ # variable, but if you want to use a different configuration
81+ # then simply:
82+ # 1. Create a repository-level variable with the name
83+ # ACTIONS_PERMISSIONS_CONFIG.
84+ # 2. Set this new variable's value to the configuration you
85+ # want to use for this repository.
86+ #
87+ # Note in particular that changing the permissions
88+ # monitoring configuration *does not* require you to modify
89+ # this workflow.
90+ permissions_monitoring_config : ${{ vars.ACTIONS_PERMISSIONS_CONFIG }}
7391 - id : setup-env
7492 uses : cisagov/setup-env-github-action@develop
7593 - uses : actions/checkout@v4
0 commit comments