Skip to content

Commit

Permalink
Merge pull request #52062 from github/repo-sync
Browse files Browse the repository at this point in the history
Repo sync
  • Loading branch information
docs-bot authored Aug 20, 2024
2 parents 95cb45c + 2f12ab5 commit 7c4e3ec
Show file tree
Hide file tree
Showing 8 changed files with 8 additions and 8 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ The following table shows the permissions granted to the `GITHUB_TOKEN` by defau
| deployments | read/write | none | read |
| discussions | read/write | none | read |
| {% ifversion fpt or ghec %} |
| id-token | none | none | read |
| id-token | none | none | none |
| {% endif %} |
| issues | read/write | none | read |
| metadata | read | read | read |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ To update your workflows for OIDC, you will need to make two changes to your YAM

### Adding permissions settings

 {% data reusables.actions.oidc-permissions-token %}
{% data reusables.actions.oidc-permissions-token %}

### Requesting the access token

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ To update your workflows for OIDC, you will need to make two changes to your YAM

### Adding permissions settings

 {% data reusables.actions.oidc-permissions-token %}
{% data reusables.actions.oidc-permissions-token %}

### Requesting the access token

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ If your cloud provider doesn't yet offer an official action, you can update your

### Adding permissions settings

 {% data reusables.actions.oidc-permissions-token %}
{% data reusables.actions.oidc-permissions-token %}

### Using official actions

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ To update your workflows for OIDC, you will need to make two changes to your YAM

### Adding permissions settings

 {% data reusables.actions.oidc-permissions-token %}
{% data reusables.actions.oidc-permissions-token %}

### Requesting the access token

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ permissions:
checks: read|write|none
contents: read|write|none
deployments: read|write|none{% ifversion fpt or ghec %}
id-token: read|write|none{% endif %}
id-token: write|none{% endif %}
issues: read|write|none
discussions: read|write|none
packages: read|write|none
Expand Down
2 changes: 1 addition & 1 deletion data/reusables/actions/github-token-scope-descriptions.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
For each of the available permissions, shown in the table below, you can assign one of the access levels: `read`, `write`, or `none`. `write` includes `read`. If you specify the access for any of these permissions, all of those that are not specified are set to `none`.
For each of the available permissions, shown in the table below, you can assign one of the access levels: `read` (if applicable), `write`, or `none`. `write` includes `read`. If you specify the access for any of these permissions, all of those that are not specified are set to `none`.

Available permissions and details of what each allows an action to do:

Expand Down
2 changes: 1 addition & 1 deletion data/reusables/actions/oidc-permissions-token.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
The job or workflow run requires a `permissions` setting with [`id-token: write`](/actions/security-guides/automatic-token-authentication#permissions-for-the-github_token). You won't be able to request the OIDC JWT ID token if the `permissions` setting for `id-token` is set to `read` or `none`.
The job or workflow run requires a `permissions` setting with [`id-token: write`](/actions/security-guides/automatic-token-authentication#permissions-for-the-github_token) to allow {% data variables.product.prodname_dotcom %}'s OIDC provider to create a JSON Web Token for every run. You won't be able to request the OIDC JWT ID token if the `permissions` for `id-token` is not set to `write`, however this value doesn't imply granting write access to any resources, only being able to fetch and set the OIDC token for an action or step to enable authenticating with a short-lived access token. Any actual trust setting is defined using OIDC claims, for more information see "[AUTOTITLE](/actions/security-for-github-actions/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud)."

The `id-token: write` setting allows the JWT to be requested from {% data variables.product.prodname_dotcom %}'s OIDC provider using one of these approaches:

Expand Down

0 comments on commit 7c4e3ec

Please sign in to comment.