Skip to content

Commit 6c00147

Browse files
lpcoxCopilot
andcommitted
Fix comment: deploy key secrecy scope is policy-dependent
The comment claimed secrecy was always private:owner/repo, but policy_private_scope_label() returns a scope that depends on the cached policy scope kind (unscoped, owner-scoped, or repo-scoped). Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
1 parent a1f05df commit 6c00147

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

guards/github-guard/rust-guard/src/labels/tool_rules.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -663,7 +663,7 @@ pub fn apply_tool_labels(
663663
// === Deploy key management (SSH key with optional write access) ===
664664
"add_deploy_key" | "delete_deploy_key" => {
665665
// Manages SSH deploy keys — `add_deploy_key` may grant persistent write access.
666-
// S = private:owner/repo (deploy key secrets should be restricted)
666+
// S = at least private; scope is policy-dependent (may be unscoped, owner-scoped, or repo-scoped)
667667
// I = writer (requires admin access)
668668
secrecy = policy_private_scope_label(&owner, &repo, repo_id, ctx);
669669
integrity = writer_integrity(repo_id, ctx);

0 commit comments

Comments
 (0)