Skip to content

Commit 340f3db

Browse files
committed
ci: revert SECURITY.md, docker dependabot, and zizmor comments
- Revert SECURITY.md to original (no new sections) - Remove docker package-ecosystem from Dependabot (nightly scheduled workflow already updates base images) - Remove added comments and Astral references from zizmor.yaml https://claude.ai/code/session_01YEC8c9bU4Mory8FFoiAS5T
1 parent f1b7bf9 commit 340f3db

3 files changed

Lines changed: 0 additions & 54 deletions

File tree

.github/dependabot.yaml

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -37,21 +37,3 @@ updates:
3737
- "*"
3838
cooldown:
3939
default-days: 7
40-
# Docker base images. Astral recommends keeping the supply chain
41-
# under continuous review; Dependabot opens a PR whenever a new base
42-
# image becomes available so we never silently fall behind security
43-
# patches.
44-
- package-ecosystem: docker
45-
directories:
46-
- /
47-
- /caddy
48-
schedule:
49-
interval: weekly
50-
commit-message:
51-
prefix: chore(docker)
52-
groups:
53-
docker:
54-
patterns:
55-
- "*"
56-
cooldown:
57-
default-days: 7

SECURITY.md

Lines changed: 0 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -16,29 +16,3 @@ Please write a detailed vulnerability report and send it [through GitHub](https:
1616

1717
Only vulnerabilities directly affecting FrankenPHP should be reported to this project.
1818
Flaws affecting components used by FrankenPHP (PHP, Caddy, Go...) or using FrankenPHP (Laravel Octane, PHP Runtime...) should be reported to the relevant projects.
19-
20-
## Supply-chain hardening
21-
22-
FrankenPHP follows the open-source security practices from
23-
[Astral's security guide](https://astral.sh/blog/open-source-security-at-astral):
24-
25-
- **Workflow auditing** --
26-
[Super Linter](https://github.com/super-linter/super-linter) runs
27-
[zizmor](https://docs.zizmor.sh/) on every pull request.
28-
The `unpinned-uses` rule in `zizmor.yaml` requires a tag pin on every action.
29-
- **Least-privilege permissions** --
30-
Every workflow starts with `permissions: {}` and only grants access per job.
31-
- **Environment-scoped secrets** --
32-
Secrets for publishing (Docker Hub, website deploy, translation API)
33-
live in dedicated GitHub Environments (`dockerhub`, `website`, `translate`).
34-
- **Build provenance** --
35-
Release binaries carry
36-
[`attest-build-provenance`](https://github.com/actions/attest-build-provenance)
37-
attestations.
38-
- **Dependency updates** --
39-
Dependabot tracks Go modules, GitHub Actions, and Docker base images.
40-
- **Safe triggers** --
41-
Workflows never use `pull_request_target`.
42-
- **No persisted credentials** --
43-
All `actions/checkout` steps set `persist-credentials: false`
44-
unless the job needs to push.

zizmor.yaml

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,6 @@
11
---
2-
# zizmor static-analysis configuration.
3-
#
4-
# See https://docs.zizmor.sh/configuration/ for the full reference.
5-
#
6-
# Inspired by Astral's open-source security guidance:
7-
# https://astral.sh/blog/open-source-security-at-astral
82
rules:
93
unpinned-uses:
104
config:
115
policies:
12-
# Every action must be pinned to at least a tag (`@v6`).
13-
# Hash-pinning to a commit SHA is the long-term goal recommended
14-
# by Astral; once the migration is complete, switch this policy
15-
# to `hash-pin` so that mutable tags can no longer reach CI.
166
"*": ref-pin

0 commit comments

Comments
 (0)