Skip to content

Commit e392bb3

Browse files
llucaxstefan-brus-frequenz
authored andcommitted
Update labeler configuration
We include new files that have been added to the repository and support and match files starting with a dot when specifying patterns. Signed-off-by: Leandro Lucarella <[email protected]>
1 parent 95b4e51 commit e392bb3

File tree

2 files changed

+21
-17
lines changed

2 files changed

+21
-17
lines changed

.github/labeler.yml

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,26 +6,30 @@
66
# For more details on the configuration please see:
77
# https://github.com/marketplace/actions/labeler
88

9-
"part:docs":
9+
"part:docs":
1010
- "**/*.md"
11+
- "docs/**"
12+
- "examples/**"
1113
- LICENSE
1214

1315
"part:tests":
14-
- "tests/**"
16+
- "pytests/**"
1517

1618
"part:tooling":
19+
- "**/*.ini"
20+
- "**/*.toml"
21+
- "**/*.yaml"
22+
- "**/*.yml"
23+
- ".editorconfig"
1724
- ".git*"
1825
- ".git*/**"
19-
- "**/*.toml"
20-
- "**/*.ini"
26+
- "docs/*.py"
2127
- CODEOWNERS
2228
- MANIFEST.in
23-
- "*requirements*.txt"
24-
- setup.py
25-
- setup.cfg
29+
- noxfile.py
2630

2731
"part:protobuf":
2832
- "proto/**"
29-
33+
3034
"part:python":
3135
- "py/**"

.github/workflows/labeler.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,5 @@
11
name: Pull Request Labeler
22

3-
# XXX: !!! SECURITY WARNING !!!
4-
# pull_request_target has write access to the repo, and can read secrets. We
5-
# need to audit any external actions executed in this workflow and make sure no
6-
# checked out code is run (not even installing dependencies, as installing
7-
# dependencies usually can execute pre/post-install scripts). We should also
8-
# only use hashes to pick the action to execute (instead of tags or branches).
9-
# For more details read:
10-
# https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
113
on: [pull_request_target]
124

135
jobs:
@@ -18,7 +10,15 @@ jobs:
1810
runs-on: ubuntu-latest
1911
steps:
2012
- name: Labeler
21-
# Only use hashes, see the security comment above
13+
# XXX: !!! SECURITY WARNING !!!
14+
# pull_request_target has write access to the repo, and can read secrets. We
15+
# need to audit any external actions executed in this workflow and make sure no
16+
# checked out code is run (not even installing dependencies, as installing
17+
# dependencies usually can execute pre/post-install scripts). We should also
18+
# only use hashes to pick the action to execute (instead of tags or branches).
19+
# For more details read:
20+
# https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
2221
uses: actions/labeler@0776a679364a9a16110aac8d0f40f5e11009e327 # 4.0.4
2322
with:
2423
repo-token: "${{ secrets.GITHUB_TOKEN }}"
24+
dot: true

0 commit comments

Comments
 (0)