Skip to content

✨ Roll out restricted GitHub Actions across Platform repos #2854

@jasonBirchall

Description

@jasonBirchall

User Need

As a platform engineer
I want to enable the new “restricted runnable actions” configuration across Platform Engineering repositories
so that only trusted actions (GitHub-owned and vetted patterns) can run, with a clear exception path.


What’s Needed

  • Opt-in restricted actions for all Platform repos using repos.yml sets introduced in PR GitHub: restrict runnable actions #2646.
  • Define trusted patterns list (documented) and an exception process (who approves, where recorded).
  • Short runbook: how teams add a needed action (pinned SHA), how to request an exception.
  • Add a CI check (scanner) to flag untrusted/unpinned actions in PRs.
  • Plan an org-level default (future ticket) via actions_organization_permissions after Platform rollout.

Acceptance Criteria

  • All Platform repos have restrict_github_actions.enabled=true with the agreed set applied.
  • CI prevents new untrusted/unpinned actions from merging.
  • Docs published and shared in Slack; teams acknowledge.

User Comms Plan (if applicable)

  • Slack announcement in #govuk-platform-engineering-team with docs.
  • 15-minute show-and-tell walking through the new feature in techfortnightly.

Assumptions (optional)

  • No breaking workflows once trusted patterns are set; outliers handled via exceptions.
  • We can iterate patterns without org-wide enforcement initially.

Risks & Mitigation (optional)


Notes

Metadata

Metadata

Assignees

No one assigned

    Labels

    After CI/CDThis task should be explored after planned CI/CD re-architecting.urgency discussedThe urgency of this item has been discussed (probably in Backlog Refinement]

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions