-
Notifications
You must be signed in to change notification settings - Fork 329
[task] Verify GitHub token permissions for Daily Firewall Report workflow #2613
Description
Objective
Verify that the Daily Firewall Report workflow has sufficient GitHub token permissions to access workflow runs and artifacts.
Context
The Q workflow investigation (issue #2604) reported:
Permission denied and could not request permission from user
The workflow currently has actions: read and contents: read permissions, but is experiencing permission issues when trying to list workflow runs, download artifacts, and access run metadata.
This issue is part of applying the Daily Firewall Report suggestions from the Q investigation.
Approach
- Review the current permissions in
.github/workflows/daily-firewall-report.md - Test if
actions: readis sufficient for the required operations - Check if additional permissions are needed (e.g.,
metadata: read) - Verify the GitHub token scope is appropriate for the operations
Files to Modify
.github/workflows/daily-firewall-report.md- Review and potentially update permissions section
Implementation Details
Current permissions (lines 8-10):
permissions:
contents: read
actions: readInvestigate whether these permissions are sufficient for:
list_workflowsGitHub API calllist_workflow_runsGitHub API calldownload_workflow_run_artifactGitHub API callghCLI commands that access workflow data
If additional permissions are needed, add them. If not, investigate why permission errors occurred.
Acceptance Criteria
- Identify root cause of permission denied error
- Update permissions if needed
- Document which permissions are required for each operation
- Run
make recompileto regenerate the.lock.ymlfile if changes made - Test that the workflow can successfully access workflow runs and artifacts
Related
Part of issue #2604 - Q Workflow Optimization Investigation
Related to #2604
AI generated by Plan Command for #2604