-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
build(deps): bump github/codeql-action from 3.26.5 to 3.26.6 #435
build(deps): bump github/codeql-action from 3.26.5 to 3.26.6 #435
Conversation
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3.26.5 to 3.26.6. - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](github/codeql-action@2c779ab...4dd1613) --- updated-dependencies: - dependency-name: github/codeql-action dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <[email protected]>
@@ -25,11 +25,11 @@ jobs: | |||
check-latest: true | |||
|
|||
- name: Initialize CodeQL | |||
uses: github/codeql-action/init@2c779ab0d087cd7fe7b826087247c2c81f27bfa6 # v3 | |||
uses: github/codeql-action/init@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mythi I'd welcome the v3
here as well to avoid changing it all the time, what do you think?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm proposing we move away from tags to sha:s for added security. "all the time" is tunable in Dependabot settings: it's no weekly but it can be monthly of course as well.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The question is whether we are checking the changes in those GH actions before updating them. TBH I have not reviewed the history between 2c77
and 4dd1
as I do trust codeql-action
organization.
We can either be paranoiac but then we need strict guidelines to update the dependencies (basically audit or at least review all the to-be-updated actions) but without such guidelines I don't see much sense in the additional overhead.
In the real-life I'd go with something in the middle meaning we can identify organizations we trust and use tags there (like action/checkout
) and start using hashes for those we don't trust and add a comment reminding us to review that action code (or at least history) before updating and mention it's for security reasons. Would that work for you?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you see problems using it like this? The frequency of the PRs is a separate topic. Dependabot prepares easy to review Changelog and Commits lists in the PR cover letter so checking the changes is easy. The automation takes care of the updates so I don't see a huge difference between a tag vs a sha.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we accommodate the shas with simple comment reminding reviewers to check the GH action log then I'm fine with using shas. Although I'd only do that where needed as every change needs to be reviewed by 2 people, CI needs to be performed (even though it won't test the change as we run on pull_request_target
) so yes, it takes time.
Anyway I'm only speaking from my point of view and I'm not maintaining any self-provisioned runners so I think this question should be raised among those who take care of them.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah I am not really convinced by the benefits of using hashes.
I've moved to use them in a few places. Not because of being paranoid but mainly because it's considered a good security practice. That practice is also checked by tools like OpenSSF Scorecard so if our repos are benchmarked using that common tooling, it shows we are "compliant".
After all, the automation takes care of the updates and we get them on a regular basis (like this PR). If the weekly cadence is too high, we can make it monthly.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One thing I haven't found in docs (maybe I'm blind) is whether by choosing hashes dependabot will offer the latest main, latest tagged or latest tagged of the version that was previously tagged sha? Or if it uses the comment
next to it as "stream" guidance?
Als I'd really like to know what is expected of us during the review. Should it be just yeah, dependabot, merge this
or let's check the changelog
or review the commit log
or look at the git diff of that action and look for potential threats
. If we decide we have different needs for different actions then I'd like the "non-default" review policy to be stated in comment, something like:
# Use `git diff` to check changes on this GH action to prevent security issues
uses: github/codeql-action/init@4dd16135b69a43b6c8efb853346f8437d92d3c93 # v3
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
latest tagged or latest tagged of the version that was previously tagged sha?
I don't know what the latter means. My experience is it picks up the sha corresponding to the latest tag. The Actions tab has logs, maybe that helps.
I'd really like to know what is expected of us during the review
this is separate from the sha conversation. I'm usually reading the changelog added in the cover letter.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks, I got the same impression (latest tagged sha).
It's actually important to know what is expected of us to be reviewed. Without that discussion there is no guideline to merge this PR (I know we merged the other PRs already but here we already have some people to discuss it with, which is why I'd like to finish this discussion first).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, that's ok. I don't have any other review guideline suggestions to add. Most of coco repos have had dependabot enabled and it's been working well. Here we probably want to enable it for Go dependencies too.
Superseded by #443. |
Bumps github/codeql-action from 3.26.5 to 3.26.6.
Changelog
Sourced from github/codeql-action's changelog.
... (truncated)
Commits
4dd1613
Merge pull request #2452 from github/update-v3.26.6-7233ec5e6dd9dd2d
Update changelog for v3.26.67233ec5
Merge pull request #2449 from github/update-bundle/codeql-bundle-v2.18.3a32c44d
Add changelog note2966897
Update default bundle to codeql-bundle-v2.18.3b8efe4d
Merge pull request #2435 from github/update-supported-enterprise-server-versionsab408a8
Merge branch 'main' into update-supported-enterprise-server-versions864b979
Merge pull request #2443 from github/dbartol/config-file-telemetryd36c7aa
Merge pull request #2448 from github/dependabot/npm_and_yarn/npm-09b7c43f6bb3bf514
Update checked-in dependenciesDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)