-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review current GitHub Actions #10794
Comments
I've put all actions in a nice overview table. This should make the review a bit easier. Assumptions:
build-pr.yml
build.yml
codeql-analysis.yml
label-actions.yml
lock.yml
release-npm.yml
stale-action.yml
ws_scan.yml
|
Do you think I'm being too strict? Maybe we should pin them to digests and then inspect changes each PR to be safe? |
I don't think you're too strict, I think it's a good idea to review our actions, and especially those that have the ability to write to our repository or access publishing secrets.
Pinning to digests is a good step. But that only says: "this versions' changes are good". It says nothing about if we actually checked the full code for malicious/bad stuff. We could use this pinning as an opportunity to review the full code. I suppose we could also check the following items, and see how the action scores on that:
What GitHub recommendsQuote from GitHub docs, learn GitHub Actions, Security hardening for GitHub Actions:
Does Renovate bot propose updates when pinning GitHub digests?I'm not sure if our current Renovate setup would actually propose updates to the digest though! |
Can we also reduce the scope of the GitHub token for these actions if they only need to act |
I think the repository administrator, i.e. you, can set the default scope for all actions. You can set the allowed permissions for the action directly in the workflow The GitHub docs, authentication in a workflow is a good read. It contains a table of all possible permissions, and other helpful advice. |
I think the yml permissions field was the one I was thinking of |
We have now set permissions for our third-party actions, and that worked OK, after a bit of adjustment/discussion. Do we want to set explicit permissions for our "first-party" actions as well? Also is there anything else we need to review/discuss? |
No need for first party, so I think we can close - thanks |
What would you like Renovate to be able to do?
@rarkins said in a PR that updates a third-party action:
I think this is a good idea as well. So I'm opening this issue to discuss our options/wishes/requirements.
Did you already have any implementation ideas?
The end result of this issue should probably be that we reduce our reliance on third-party actions.
The text was updated successfully, but these errors were encountered: