mirror of
https://github.com/microsoft/vscode.git
synced 2025-12-25 12:47:14 +00:00
* Initial plan for issue * Fix workflow to check file changes before user permissions Reorder workflow steps to first check if package-lock.json/Cargo.lock files are modified, then only check user permissions if lockfiles were changed. This prevents the workflow from failing when Copilot opens PRs that don't modify lockfiles. Co-authored-by: TylerLeonhardt <2644648+TylerLeonhardt@users.noreply.github.com> * Fix yarn.lock workflow to check file changes before user permissions Apply the same fix to the yarn.lock workflow that was applied to the package-lock workflow. This prevents failures when Copilot opens PRs that don't modify yarn.lock files. Co-authored-by: TylerLeonhardt <2644648+TylerLeonhardt@users.noreply.github.com> * Add explicit Copilot check to prevent lockfile modifications Co-authored-by: TylerLeonhardt <2644648+TylerLeonhardt@users.noreply.github.com> --------- Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: TylerLeonhardt <2644648+TylerLeonhardt@users.noreply.github.com>
52 lines
2.7 KiB
YAML
52 lines
2.7 KiB
YAML
name: Prevent package-lock.json changes in PRs
|
|
|
|
on: pull_request
|
|
permissions: {}
|
|
|
|
jobs:
|
|
main:
|
|
name: Prevent package-lock.json changes in PRs
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Get file changes
|
|
uses: trilom/file-changes-action@ce38c8ce2459ca3c303415eec8cb0409857b4272
|
|
id: file_changes
|
|
- name: Check if lockfiles were modified
|
|
id: lockfile_check
|
|
run: |
|
|
if cat $HOME/files.json | jq -e 'any(test("package-lock\\.json$|Cargo\\.lock$"))' > /dev/null; then
|
|
echo "lockfiles_modified=true" >> $GITHUB_OUTPUT
|
|
echo "Lockfiles were modified in this PR"
|
|
else
|
|
echo "lockfiles_modified=false" >> $GITHUB_OUTPUT
|
|
echo "No lockfiles were modified in this PR"
|
|
fi
|
|
- name: Prevent Copilot from modifying lockfiles
|
|
if: ${{ steps.lockfile_check.outputs.lockfiles_modified == 'true' && github.event.pull_request.user.login == 'Copilot' }}
|
|
run: |
|
|
echo "Copilot is not allowed to modify package-lock.json or Cargo.lock files."
|
|
echo "If you need to update dependencies, please do so manually or through authorized means."
|
|
exit 1
|
|
- uses: octokit/request-action@dad4362715b7fb2ddedf9772c8670824af564f0d # v2.4.0
|
|
id: get_permissions
|
|
if: ${{ steps.lockfile_check.outputs.lockfiles_modified == 'true' && github.event.pull_request.user.login != 'Copilot' }}
|
|
with:
|
|
route: GET /repos/microsoft/vscode/collaborators/{username}/permission
|
|
username: ${{ github.event.pull_request.user.login }}
|
|
env:
|
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
- name: Set control output variable
|
|
id: control
|
|
if: ${{ steps.lockfile_check.outputs.lockfiles_modified == 'true' && github.event.pull_request.user.login != 'Copilot' }}
|
|
run: |
|
|
echo "user: ${{ github.event.pull_request.user.login }}"
|
|
echo "role: ${{ fromJson(steps.get_permissions.outputs.data).permission }}"
|
|
echo "is dependabot: ${{ github.event.pull_request.user.login == 'dependabot[bot]' }}"
|
|
echo "should_run: ${{ !contains(fromJson('["admin", "maintain", "write"]'), fromJson(steps.get_permissions.outputs.data).permission) }}"
|
|
echo "should_run=${{ !contains(fromJson('["admin", "maintain", "write"]'), fromJson(steps.get_permissions.outputs.data).permission) && github.event.pull_request.user.login != 'dependabot[bot]' }}" >> $GITHUB_OUTPUT
|
|
- name: Check for lockfile changes
|
|
if: ${{ steps.lockfile_check.outputs.lockfiles_modified == 'true' && steps.control.outputs.should_run == 'true' }}
|
|
run: |
|
|
echo "Changes to package-lock.json/Cargo.lock files aren't allowed in PRs."
|
|
exit 1
|