Skip to content

GH-36898: [CI] Hashpin Sensitive GitHub Actions#37676

Merged
assignUser merged 3 commits into
apache:mainfrom
diogoteles08:ci/hashpin-sensitive-github-actions
Oct 25, 2023
Merged

GH-36898: [CI] Hashpin Sensitive GitHub Actions#37676
assignUser merged 3 commits into
apache:mainfrom
diogoteles08:ci/hashpin-sensitive-github-actions

Conversation

@diogoteles08
Copy link
Copy Markdown
Contributor

@diogoteles08 diogoteles08 commented Sep 12, 2023

Rationale for this change

Explained on issue #36898

What changes are included in this PR?

For security reasons, it hashpins the calls for github actions that are called with sensitive permission (usually pull-requests: write) or with secrets used on the same context. I'm not hashpinning every action call because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

Are these changes tested?

Not tested, but the changes on this PR shouldn't change any comportment of the CI, as we'd still be using the exact same version, but pinned differently.

Are there any user-facing changes?

No

For security reasons, it hashpins the calls for github actions that are
called with sensitive permission (usually `pull-requests: write`) or
with secrets used on the same context. I'm not hashpinning all action calls
because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

Signed-off-by: Diogo Teles Sant'Anna <diogoteles@google.com>
@github-actions
Copy link
Copy Markdown

⚠️ GitHub issue #36898 has been automatically assigned in GitHub to PR creator.

@github-actions github-actions Bot added the awaiting review Awaiting review label Sep 12, 2023
@diogoteles08
Copy link
Copy Markdown
Contributor Author

Noticed that you have bumped some version at the time I was working on this. I'm working to resolve the conflicts

Solves the merge conflicts caused by bump of actions/checkout from
v3 to v4

Signed-off-by: Diogo Teles Sant'Anna <diogoteles@google.com>
@assignUser
Copy link
Copy Markdown
Member

Ah sorry I missed this PR... I will check it out.

Copy link
Copy Markdown
Member

@assignUser assignUser left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for your contribution 🚀
I checked the commits for each version and they match up. Some have already released new minor versions but I am intentionally not updating those as a test for dependabot.

(CI failures are unrelated)

@github-actions github-actions Bot added awaiting committer review Awaiting committer review and removed awaiting review Awaiting review labels Oct 25, 2023
@assignUser assignUser merged commit 91b642a into apache:main Oct 25, 2023
@assignUser assignUser removed the awaiting committer review Awaiting committer review label Oct 25, 2023
@conbench-apache-arrow
Copy link
Copy Markdown

After merging your PR, Conbench analyzed the 5 benchmarking runs that have been run so far on merge-commit 91b642a.

There were no benchmark performance regressions. 🎉

The full Conbench report has more details. It also includes information about 3 possible false positives for unstable benchmarks that are known to sometimes produce them.

loicalleyne pushed a commit to loicalleyne/arrow that referenced this pull request Nov 13, 2023
### Rationale for this change

Explained on issue apache#36898

### What changes are included in this PR?

For security reasons, it hashpins the calls for github actions that are called with sensitive permission (usually `pull-requests: write`) or with secrets used on the same context. I'm not hashpinning every action call because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

### Are these changes tested?

Not tested, but the changes on this PR shouldn't change any comportment of the CI, as we'd still be using the exact same version, but pinned differently.

### Are there any user-facing changes?

No
* Closes: apache#36898

Authored-by: Diogo Teles Sant'Anna <diogoteles@google.com>
Signed-off-by: Jacob Wujciak-Jens <jacob@wujciak.de>
dgreiss pushed a commit to dgreiss/arrow that referenced this pull request Feb 19, 2024
### Rationale for this change

Explained on issue apache#36898

### What changes are included in this PR?

For security reasons, it hashpins the calls for github actions that are called with sensitive permission (usually `pull-requests: write`) or with secrets used on the same context. I'm not hashpinning every action call because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

### Are these changes tested?

Not tested, but the changes on this PR shouldn't change any comportment of the CI, as we'd still be using the exact same version, but pinned differently.

### Are there any user-facing changes?

No
* Closes: apache#36898

Authored-by: Diogo Teles Sant'Anna <diogoteles@google.com>
Signed-off-by: Jacob Wujciak-Jens <jacob@wujciak.de>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[CI] Hash-pin workflow dependencies called with dangerous permissions

2 participants