Skip to content

Add issues write permission to untriaged label workflow#6153

Merged
reta merged 1 commit into
opensearch-project:mainfrom
shreyah963:fix/add-untriaged-permissions
May 20, 2026
Merged

Add issues write permission to untriaged label workflow#6153
reta merged 1 commit into
opensearch-project:mainfrom
shreyah963:fix/add-untriaged-permissions

Conversation

@shreyah963
Copy link
Copy Markdown
Contributor

Description

Add permissions: issues: write to the add-untriaged.yml workflow to fix 403 "Resource not accessible by integration" error when applying the 'untriaged' label to issues.

Issues Resolved

[List any issues this PR will resolve]

Is this a backport? If so, please add backport PR # and/or commits #, and remove backport-failed label from the original PR.

Do these changes introduce new permission(s) to be displayed in the static dropdown on the front-end? If so, please open a draft PR in the security dashboards plugin and link the draft PR here

Testing

[Please provide details of testing done: unit testing, integration testing and manual testing]

Check List

  • New functionality includes testing
  • New functionality has been documented
  • New Roles/Permissions have a corresponding security dashboards plugin PR
  • API changes companion pull request created
  • Commits are signed per the DCO using --signoff

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.

Signed-off-by: shreyah963 <shreyab963@gmail.com>
@github-actions
Copy link
Copy Markdown
Contributor

PR Code Analyzer ❗

AI-powered 'Code-Diff-Analyzer' found issues on commit 33e4e8c.

PathLineSeverityDescription
.github/workflows/add-untriaged.yml7mediumExplicit 'issues: write' permission added to workflow. While likely needed for the label-applying job, adding write permissions to CI workflows warrants verification that the workflow cannot be triggered by untrusted input to escalate privileges or modify issue state maliciously.

The table above displays the top 10 most important findings.

Total: 1 | Critical: 0 | High: 0 | Medium: 1 | Low: 0


Pull Requests Author(s): Please update your Pull Request according to the report above.

Repository Maintainer(s): You can bypass diff analyzer by adding label skip-diff-analyzer after reviewing the changes carefully, then re-run failed actions. To re-enable the analyzer, remove the label, then re-run all actions.


⚠️ Note: The Code-Diff-Analyzer helps protect against potentially harmful code patterns. Please ensure you have thoroughly reviewed the changes beforehand.

Thanks.

@github-actions
Copy link
Copy Markdown
Contributor

PR Reviewer Guide 🔍

Here are some key observations to aid the review process:

🧪 No relevant tests
🔒 No security concerns identified
✅ No TODO sections
🔀 No multiple PR themes
⚡ No major issues detected

@codecov
Copy link
Copy Markdown

codecov Bot commented May 20, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 75.00%. Comparing base (09de157) to head (33e4e8c).
⚠️ Report is 2 commits behind head on main.

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##             main    #6153      +/-   ##
==========================================
+ Coverage   74.97%   75.00%   +0.02%     
==========================================
  Files         453      452       -1     
  Lines       29112    29106       -6     
  Branches     4386     4382       -4     
==========================================
+ Hits        21828    21831       +3     
+ Misses       5257     5247      -10     
- Partials     2027     2028       +1     

see 7 files with indirect coverage changes

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@reta reta merged commit 6e253d3 into opensearch-project:main May 20, 2026
112 of 114 checks passed
terryquigleysas pushed a commit to terryquigleysas/security that referenced this pull request May 21, 2026
…roject#6153)

Signed-off-by: shreyah963 <shreyab963@gmail.com>
Signed-off-by: Terry Quigley <terry.quigley@sas.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants