Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Repository settings #540

Open
evverx opened this issue Dec 7, 2023 · 11 comments
Open

Repository settings #540

evverx opened this issue Dec 7, 2023 · 11 comments
Labels
CI continuous integration or tests

Comments

@evverx
Copy link
Member

evverx commented Dec 7, 2023

@evverx evverx added the CI continuous integration or tests label Dec 7, 2023
@lathiat
Copy link
Contributor

lathiat commented Dec 8, 2023

@evverx Since moving to an org, I seem now able to give you "Maintain" access to specifically the avahi repository, which may let you adjust these settings. Can you check and see if that works for you - and if there is anything you can't adjust but want to then document it here and we can look to adjust it.

Permissions are documented here:
https://docs.github.com/en/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/repository-roles-for-an-organization

@evverx
Copy link
Member Author

evverx commented Dec 8, 2023

All those settings can be tweaked by admins only.

The links should point to places where admins can turn them on.

https://packit.dev/docs/guide#github points to https://github.com/marketplace/packit-as-a-service where it can be installed to the avahi repository (it usually takes some time because the Packit folks have to approve the request as far as I can remember).

Coveralls would require signing in with an admin's GitHub account and picking the avahi repository there: https://docs.coveralls.io/index#integrate-coveralls-with-your-codebase (step 4 and step 5 aren't necessary because the GitHub action is already set up and only the "Go to ADD REPOS, find your repo, and toggle it ON to add it to Coveralls." step is needed to let it start publishing statuses).

COVERITY_SCAN_TOKEN can be added using https://docs.github.com/en/actions/security-guides/using-secrets-in-github-actions#creating-secrets-for-a-repository. I've just invited you to the organization to give you full access to it (to copy the token from https://scan.coverity.com/projects/avahi-daemon?tab=project_settings to COVERITY_SCAN_TOKEN).

@Neustradamus
Copy link

To follow this ticket :)

@pemensik
Copy link
Member

@lathiat We would like to have enabled Private vulnerability reporting in https://github.com/avahi/avahi/settings/security_analysis and access to such advisories. I am not able to see any now in Security tab.

I have played with it at my fork https://github.com/pemensik/avahi/security/advisories. It seems we would need multiple of advisories. They would allow private collaboration when preparing fixes, then publishing it once fixes are ready. Not sure how to define whose people are able to see reported vulnerabilities, I haven't found that in my fork. But I have no collaborators :)

@pemensik
Copy link
Member

It seems at least Admin rights are needed for Security advisory creation or reading, unless people are given collaborator rights for given advisory. Our commit (Member) rights are not enough for it. Unless Trent would take more active role, we need someone in addition to have Admin rights. Then those settings could be tuned be such person.

@lathiat
Copy link
Contributor

lathiat commented Mar 23, 2024

I will sort this out on Monday

@lathiat
Copy link
Contributor

lathiat commented Mar 26, 2024

I enabled private vulnerability reporting in both the avahi and nss-mdns repositories (just the 1-click enable).

According to https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/managing-privately-reported-security-vulnerabilities

Anyone with admin permissions to a repository can see, review, and manage privately-reported vulnerabilities for the repository.

Have added repository-level admin access for @pemensik and @evverx

The admin access may also let you do the other actions @evverx for coverity, packit, etc. Let me know if not.

@evverx
Copy link
Member Author

evverx commented Mar 26, 2024

@lathiat thanks! I set up some branch protection rules and added a secret named COVERITY_SCAN_TOKEN. I'll add the action sending data to Coverity soon.

I tried to hook up the repository to Packit and Coveralls but it seems only owners can do that. (it could be that the changes haven't propagated there yet)

evverx added a commit to evverx/avahi that referenced this issue Mar 28, 2024
with https://github.com/rhysd/actionlint?tab=readme-ov-file#actionlint
to make it easier to add/change/review GH Actions.

Mostly in preparation for an action sending data to Coverity Scan.

Related to avahi#540
evverx added a commit that referenced this issue Mar 28, 2024
with https://github.com/rhysd/actionlint?tab=readme-ov-file#actionlint
to make it easier to add/change/review GH Actions.

Mostly in preparation for an action sending data to Coverity Scan.

Related to #540
@pemensik
Copy link
Member

Thank you so much!

@pemensik
Copy link
Member

I think packit unfortunately requires more details. It works as a purchase, even though price is free. But it requires address and other identifications of a person anyway. So it is quite likely owner needs to make the "purchase" for their owned project. But let's ask our guys working with it.

@evverx
Copy link
Member Author

evverx commented Mar 29, 2024

Looks like Packit is up and running.

I can't seem to turn on Coveralls. There should be a pending access request somewhere. Once it's accepted Coveralls should fully start working (currently it accepts data from the GH Action and shows the coverage report at https://coveralls.io/github/avahi/avahi but it can't update PR statuses and says that "source not available" when specific files like https://coveralls.io/builds/66602652/source?filename=avahi-core%2Fbrowse.c are viewed).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
CI continuous integration or tests
Projects
None yet
Development

No branches or pull requests

4 participants