Bump step-security/harden-runner from 2.14.1 to 2.19.1#1
Closed
dependabot[bot] wants to merge 1 commit into
Closed
Bump step-security/harden-runner from 2.14.1 to 2.19.1#1dependabot[bot] wants to merge 1 commit into
dependabot[bot] wants to merge 1 commit into
Conversation
Bumps [step-security/harden-runner](https://github.com/step-security/harden-runner) from 2.14.1 to 2.19.1. - [Release notes](https://github.com/step-security/harden-runner/releases) - [Commits](step-security/harden-runner@e3f713f...a5ad31d) --- updated-dependencies: - dependency-name: step-security/harden-runner dependency-version: 2.19.1 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
|
PR: #1 Note: This metadata is also included in the Gerrit commit message for reconciliation. |
|
Change raised in Gerrit by GitHub2Gerrit: https://gerrit.onap.org/r/c/integration/python-onapsdk/+/144290 |
onap-github
pushed a commit
that referenced
this pull request
May 13, 2026
## Release notes Sourced from step-security/harden-runner's releases. v2.19.1 What's Changed fix: detect ubuntu-slim runners early and bail out by @devantler in step-security/harden-runner#657 What the fix changes Harden-Runner will detect ubuntu-slim runners and exit cleanly with an informational log message, instead of post harden runner step failing on chown: invalid user: 'undefined'. What the fix does not do Jobs running on ubuntu-slim will not be monitored by Harden-Runner. The agent relies on kernel-level features (that require elevated capabilities). Per GitHub's docs on single-CPU runners: "The container for ubuntu-slim runners runs in unprivileged mode. This means that some operations requiring elevated privileges such as mounting file systems, using Docker-in-Docker, or accessing low-level kernel features are not supported." Those low-level kernel features are what the agent needs, so monitoring inside the unprivileged container is not feasible today. For StepSecurity enterprise customers If your security posture requires that workflows are always monitored, you can block the use of ubuntu-slim via workflow run policies see the Runner Label Policy docs. This lets you enforce that jobs only run on monitored runner types. New Contributors @devantler made their first contribution in step-security/harden-runner#657 Full Changelog: step-security/harden-runner@v2.19.0...v2.19.1 v2.19.0 What's Changed New Runner Support Harden-Runner now supports Depot, Blacksmith, Namespace, and WarpBuild runners with the same egress monitoring, runtime monitoring, and policy enforcement available on GitHub-hosted runners. Automated Incident Response for Supply Chain Attacks Global block list: Outbound connections to known malicious domains and IPs are now blocked even in audit mode. System-defined detection rules: Harden-Runner will trigger lockdown mode when a high risk event is detected during an active supply chain attack (for example, a process reading the memory of the runner worker process, a common technique for stealing GitHub Actions secrets). Bug Fixes Windows and macOS: stability and reliability fixes Full Changelog: step-security/harden-runner@v2.18.0...v2.19.0 v2.18.0 What's Changed Global Block List: During supply chain incidents like the recent axios and trivy compromises, StepSecurity will add known malicious domains and IP addresses (IOCs) to a global block list. These will be automatically blocked, even in audit mode, providing immediate protection without requiring any workflow changes. Deploy on Self-Hosted VM: Added deploy-on-self-hosted-vm input that allows the Harden Runner agent to be installed directly on ephemeral self-hosted Linux runner VMs at workflow runtime. This is intended as an alternative when baking the agent into the VM image is not possible. Full Changelog: step-security/harden-runner@v2.17.0...v2.18.0 v2.17.0 What's Changed Policy Store Support Added use-policy-store and api-key inputs to fetch security policies directly from the StepSecurity Policy Store. Policies can be defined and attached at the workflow, repo, org, or cluster (ARC) level, with the most granular policy taking precedence. This is the preferred method over the existing policy input which requires id-token: write permission. If no policy is found in the store, the action defaults to audit mode. Full Changelog: step-security/harden-runner@v2.16.1...v2.17.0 v2.16.1 ... (truncated) ## Commits a5ad31d Merge pull request #657 from devantler/fix/ubuntu-slim-user-env 6e92856 build dist and trim ubuntu-slim message 4e0504e Merge branch 'main' into fix/ubuntu-slim-user-env 8d3c67d Release v2.19.0 (#661) 6c3c2f2 Feature/deploy on self hosted vm (#658) 376d25a fix: detect ubuntu-slim runners early and bail out f808768 Feature/policy store (#656) fe10465 v2.16.1 (#654) fa2e9d6 Release v2.16.0 (#646) 58077d3 Release v2.15.1 (#641) Additional commits viewable in compare view  Issue-ID: CIMAN-33 Signed-off-by: dependabot[bot] <support@github.com> Change-Id: Ia47c3f111339b6371b2bc9c5f8cc8f94051d0e3b GitHub-PR: #1 GitHub-Hash: 24bd715c088244b0 Signed-off-by: onap.gh2gerrit <releng+onap-gh2gerrit@linuxfoundation.org>
Contributor
Author
|
Looks like step-security/harden-runner is up-to-date now, so this is no longer needed. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps step-security/harden-runner from 2.14.1 to 2.19.1.
Release notes
Sourced from step-security/harden-runner's releases.
... (truncated)
Commits
a5ad31dMerge pull request #657 from devantler/fix/ubuntu-slim-user-env6e92856build dist and trim ubuntu-slim message4e0504eMerge branch 'main' into fix/ubuntu-slim-user-env8d3c67dRelease v2.19.0 (#661)6c3c2f2Feature/deploy on self hosted vm (#658)376d25afix: detect ubuntu-slim runners early and bail outf808768Feature/policy store (#656)fe10465v2.16.1 (#654)fa2e9d6Release v2.16.0 (#646)58077d3Release v2.15.1 (#641)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)