Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GH-36898: [CI] Hashpin Sensitive GitHub Actions #37676

Merged

Conversation

diogoteles08
Copy link
Contributor

@diogoteles08 diogoteles08 commented Sep 12, 2023

Rationale for this change

Explained on issue #36898

What changes are included in this PR?

For security reasons, it hashpins the calls for github actions that are called with sensitive permission (usually pull-requests: write) or with secrets used on the same context. I'm not hashpinning every action call because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

Are these changes tested?

Not tested, but the changes on this PR shouldn't change any comportment of the CI, as we'd still be using the exact same version, but pinned differently.

Are there any user-facing changes?

No

For security reasons, it hashpins the calls for github actions that are
called with sensitive permission (usually `pull-requests: write`) or
with secrets used on the same context. I'm not hashpinning all action calls
because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

Signed-off-by: Diogo Teles Sant'Anna <diogoteles@google.com>
@github-actions
Copy link

⚠️ GitHub issue #36898 has been automatically assigned in GitHub to PR creator.

@github-actions github-actions bot added the awaiting review Awaiting review label Sep 12, 2023
@diogoteles08
Copy link
Contributor Author

Noticed that you have bumped some version at the time I was working on this. I'm working to resolve the conflicts

Solves the merge conflicts caused by bump of actions/checkout from
v3 to v4

Signed-off-by: Diogo Teles Sant'Anna <diogoteles@google.com>
@assignUser
Copy link
Member

Ah sorry I missed this PR... I will check it out.

Copy link
Member

@assignUser assignUser left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for your contribution 🚀
I checked the commits for each version and they match up. Some have already released new minor versions but I am intentionally not updating those as a test for dependabot.

(CI failures are unrelated)

@github-actions github-actions bot added awaiting committer review Awaiting committer review and removed awaiting review Awaiting review labels Oct 25, 2023
@assignUser assignUser merged commit 91b642a into apache:main Oct 25, 2023
57 of 61 checks passed
@assignUser assignUser removed the awaiting committer review Awaiting committer review label Oct 25, 2023
JerAguilon pushed a commit to JerAguilon/arrow that referenced this pull request Oct 25, 2023
### Rationale for this change

Explained on issue apache#36898

### What changes are included in this PR?

For security reasons, it hashpins the calls for github actions that are called with sensitive permission (usually `pull-requests: write`) or with secrets used on the same context. I'm not hashpinning every action call because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

### Are these changes tested?

Not tested, but the changes on this PR shouldn't change any comportment of the CI, as we'd still be using the exact same version, but pinned differently.

### Are there any user-facing changes?

No
* Closes: apache#36898

Authored-by: Diogo Teles Sant'Anna <diogoteles@google.com>
Signed-off-by: Jacob Wujciak-Jens <jacob@wujciak.de>
@conbench-apache-arrow
Copy link

After merging your PR, Conbench analyzed the 5 benchmarking runs that have been run so far on merge-commit 91b642a.

There were no benchmark performance regressions. 🎉

The full Conbench report has more details. It also includes information about 3 possible false positives for unstable benchmarks that are known to sometimes produce them.

loicalleyne pushed a commit to loicalleyne/arrow that referenced this pull request Nov 13, 2023
### Rationale for this change

Explained on issue apache#36898

### What changes are included in this PR?

For security reasons, it hashpins the calls for github actions that are called with sensitive permission (usually `pull-requests: write`) or with secrets used on the same context. I'm not hashpinning every action call because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

### Are these changes tested?

Not tested, but the changes on this PR shouldn't change any comportment of the CI, as we'd still be using the exact same version, but pinned differently.

### Are there any user-facing changes?

No
* Closes: apache#36898

Authored-by: Diogo Teles Sant'Anna <diogoteles@google.com>
Signed-off-by: Jacob Wujciak-Jens <jacob@wujciak.de>
dgreiss pushed a commit to dgreiss/arrow that referenced this pull request Feb 19, 2024
### Rationale for this change

Explained on issue apache#36898

### What changes are included in this PR?

For security reasons, it hashpins the calls for github actions that are called with sensitive permission (usually `pull-requests: write`) or with secrets used on the same context. I'm not hashpinning every action call because the tag-pinning flexibility can be useful if used with caution, e.g. in testing environment.

### Are these changes tested?

Not tested, but the changes on this PR shouldn't change any comportment of the CI, as we'd still be using the exact same version, but pinned differently.

### Are there any user-facing changes?

No
* Closes: apache#36898

Authored-by: Diogo Teles Sant'Anna <diogoteles@google.com>
Signed-off-by: Jacob Wujciak-Jens <jacob@wujciak.de>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[CI] Hash-pin workflow dependencies called with dangerous permissions
2 participants