Skip to content

Commit f8b0f2d

Browse files
ci: redistribute concurrency-cancel guard to read-only check workflows (#27)
Redistributes the canonical read-only-check workflow templates that gained `concurrency{cancel-in-progress:true}` in hyperpolymath/standards#122, so this consumer stops holding account-wide concurrent-job slots on superseded runs. Files updated: codeql.yml governance.yml scorecard-enforcer.yml scorecard.yml secret-scanner.yml. Read-only checks only; no publish/mutation workflow touched. Refs hyperpolymath/standards#122 Generated with Claude Code
1 parent 72e177a commit f8b0f2d

4 files changed

Lines changed: 45 additions & 104 deletions

File tree

.github/workflows/codeql.yml

Lines changed: 29 additions & 89 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,14 @@
1-
# SPDX-License-Identifier: PMPL-1.0-or-later
2-
# For most projects, this workflow file will not need changing; you simply need
3-
# to commit it to your repository.
4-
#
5-
# You may wish to alter this file to override the set of languages analyzed,
6-
# or to provide custom queries or build logic.
7-
#
8-
# ******** NOTE ********
9-
# We have attempted to detect the languages in your repository. Please check
10-
# the `language` matrix defined below to confirm you have the correct set of
11-
# supported CodeQL languages.
12-
#
1+
# SPDX-License-Identifier: PMPL-1.0
2+
name: CodeQL Security Analysis
3+
4+
on:
5+
push:
6+
branches: [main, master]
7+
pull_request:
8+
branches: [main, master]
9+
schedule:
10+
- cron: '0 6 * * 1'
11+
1312
# Estate guardrail: cancel superseded runs so re-pushes / rebased PR
1413
# updates do not pile up queued runs against the shared account-wide
1514
# Actions concurrency pool. Applied only to read-only check workflows
@@ -21,89 +20,30 @@ concurrency:
2120
permissions:
2221
contents: read
2322

24-
name: "CodeQL Advanced"
25-
26-
on:
27-
push:
28-
branches: [ "main" ]
29-
pull_request:
30-
branches: [ "main" ]
31-
schedule:
32-
- cron: '45 11 * * 4'
33-
3423
jobs:
3524
analyze:
36-
name: Analyze (${{ matrix.language }})
37-
# Runner size impacts CodeQL analysis time. To learn more, please see:
38-
# - https://gh.io/recommended-hardware-resources-for-running-codeql
39-
# - https://gh.io/supported-runners-and-hardware-resources
40-
# - https://gh.io/using-larger-runners (GitHub.com only)
41-
# Consider using larger runners or machines with greater resources for possible analysis time improvements.
42-
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
25+
runs-on: ubuntu-latest
4326
permissions:
44-
# required for all workflows
45-
security-events: write
46-
47-
# required to fetch internal or private CodeQL packs
48-
packages: read
49-
50-
# only required for workflows in private repositories
51-
actions: read
5227
contents: read
53-
28+
security-events: write
5429
strategy:
5530
fail-fast: false
5631
matrix:
5732
include:
58-
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'rust', 'swift'
59-
# Use `c-cpp` to analyze code written in C, C++ or both
60-
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
61-
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
62-
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
63-
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
64-
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
65-
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
66-
steps:
67-
- name: Checkout repository
68-
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
33+
- language: javascript-typescript
34+
build-mode: none
6935

70-
# Add any setup steps before running the `github/codeql-action/init` action.
71-
# This includes steps like installing compilers or runtimes (`actions/setup-node`
72-
# or others). This is typically only required for manual builds.
73-
# - name: Setup runtime (example)
74-
# uses: actions/setup-example@v1
75-
76-
# Initializes the CodeQL tools for scanning.
77-
- name: Initialize CodeQL
78-
uses: github/codeql-action/init@b2f9ef845756500b97acbdaf5c1dd4e9c1d15734 # v3.31.10
79-
with:
80-
languages: ${{ matrix.language }}
81-
build-mode: ${{ matrix.build-mode }}
82-
# If you wish to specify custom queries, you can do so here or in a config file.
83-
# By default, queries listed here will override any specified in a config file.
84-
# Prefix the list here with "+" to use these queries and those in the config file.
85-
86-
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
87-
# queries: security-extended,security-and-quality
88-
89-
# If the analyze step fails for one of the languages you are analyzing with
90-
# "We were unable to automatically build your code", modify the matrix above
91-
# to set the build mode to "manual" for that language. Then modify this step
92-
# to build your code.
93-
# ℹ️ Command-line programs to run using the OS shell.
94-
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
95-
- name: Run manual build steps
96-
if: matrix.build-mode == 'manual'
97-
shell: bash
98-
run: |
99-
echo 'If you are using a "manual" build mode for one or more of the' \
100-
'languages you are analyzing, replace this with the commands to build' \
101-
'your code, for example:'
102-
echo ' make bootstrap'
103-
echo ' make release'
104-
exit 1
105-
106-
- name: Perform CodeQL Analysis
107-
uses: github/codeql-action/analyze@b2f9ef845756500b97acbdaf5c1dd4e9c1d15734 # v3.31.10
108-
with:
109-
category: "/language:${{matrix.language}}"
36+
steps:
37+
- name: Checkout
38+
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
39+
40+
- name: Initialize CodeQL
41+
uses: github/codeql-action/init@c6f931105cb2c34c8f901cc885ba1e2e259cf745 # v3
42+
with:
43+
languages: ${{ matrix.language }}
44+
build-mode: ${{ matrix.build-mode }}
45+
46+
- name: Perform CodeQL Analysis
47+
uses: github/codeql-action/analyze@c6f931105cb2c34c8f901cc885ba1e2e259cf745 # v3
48+
with:
49+
category: "/language:${{ matrix.language }}"

.github/workflows/scorecard-enforcer.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727
security-events: write
2828
id-token: write # For OIDC
2929
steps:
30-
- uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4
30+
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
3131
with:
3232
persist-credentials: false
3333

@@ -39,7 +39,7 @@ jobs:
3939
publish_results: true
4040

4141
- name: Upload SARIF
42-
uses: github/codeql-action/upload-sarif@fb650c22f965a3eff7e20c5535e51a256dd16bf1 # v3
42+
uses: github/codeql-action/upload-sarif@c6f931105cb2c34c8f901cc885ba1e2e259cf745 # v4
4343
with:
4444
sarif_file: results.sarif
4545

@@ -62,7 +62,7 @@ jobs:
6262
check-critical:
6363
runs-on: ubuntu-latest
6464
steps:
65-
- uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4
65+
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
6666

6767
- name: Check SECURITY.md exists
6868
run: |

.github/workflows/scorecard.yml

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
1-
# SPDX-License-Identifier: PMPL-1.0-or-later
1+
# SPDX-License-Identifier: PMPL-1.0
22
name: OSSF Scorecard
33
on:
44
push:
55
branches: [main, master]
66
schedule:
7-
- cron: '0 4 * * 0'
7+
- cron: '0 4 * * *'
8+
workflow_dispatch:
89

910
# Estate guardrail: cancel superseded runs so re-pushes / rebased PR
1011
# updates do not pile up queued runs against the shared account-wide
@@ -24,17 +25,17 @@ jobs:
2425
security-events: write
2526
id-token: write
2627
steps:
27-
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
28+
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
2829
with:
2930
persist-credentials: false
30-
31+
3132
- name: Run Scorecard
32-
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
33+
uses: ossf/scorecard-action@4eaacf0543bb3f2c246792bd56e8cdeffafb205a # v2.3.1
3334
with:
3435
results_file: results.sarif
3536
results_format: sarif
36-
37+
3738
- name: Upload results
38-
uses: github/codeql-action/upload-sarif@b2f9ef845756500b97acbdaf5c1dd4e9c1d15734 # v3.31.10
39+
uses: github/codeql-action/upload-sarif@c6f931105cb2c34c8f901cc885ba1e2e259cf745 # v3.31.8
3940
with:
4041
sarif_file: results.sarif

.github/workflows/secret-scanner.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# SPDX-License-Identifier: PMPL-1.0-or-later
1+
# SPDX-License-Identifier: PMPL-1.0
22
# Prevention workflow - scans for hardcoded secrets before they reach main
33
name: Secret Scanner
44

@@ -22,12 +22,12 @@ jobs:
2222
trufflehog:
2323
runs-on: ubuntu-latest
2424
steps:
25-
- uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4
25+
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v4
2626
with:
2727
fetch-depth: 0 # Full history for scanning
2828

2929
- name: TruffleHog Secret Scan
30-
uses: trufflesecurity/trufflehog@8a8ef8526528d8a4ff3e2c90be08e25ef8efbd9b # v3
30+
uses: trufflesecurity/trufflehog@6c05c4a00b91aa542267d8e32a8254774799d68d # v3
3131
with:
3232
# The v3 action injects --fail automatically on pull_request events.
3333
# Passing --fail here triggers "flag 'fail' cannot be repeated".
@@ -36,7 +36,7 @@ jobs:
3636
gitleaks:
3737
runs-on: ubuntu-latest
3838
steps:
39-
- uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4
39+
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v4
4040
with:
4141
fetch-depth: 0
4242

@@ -49,7 +49,7 @@ jobs:
4949
rust-secrets:
5050
runs-on: ubuntu-latest
5151
steps:
52-
- uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4
52+
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v4
5353

5454
- name: Check for hardcoded secrets in Rust
5555
run: |

0 commit comments

Comments
 (0)