-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CI:DOCS] Implement secrets/credential scanning #20136
Conversation
bcbf6e5
to
61c4d0a
Compare
8c9713b
to
afc8942
Compare
This is ready for initial review. |
LGTM |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are bunch of CirrusCI
warning in changes are they relevant ?
The When the Thanks for checking. |
Flipping this back to |
Update: Concluded necessary internal discussion. Removed Assuming/once this is working, I plan to make it into a reusable workflow that can be called from Buildah and Skopeo. |
As an effort to catch potential secrets and/or credential leaks, add a github-actions workflow which is untouchable in a PR context. To additionally guard against accidents, also check recent branch history. This is especially important on newly created release-branches, which may begin with content from who-knows-where. Finally, since the new workflow bypasses PR-level changes to the scanner config and base-line. Add a Cirrus-CI invocation of the scanning tool to help catch tool-breaking changes from being merged. Signed-off-by: Chris Evich <[email protected]>
Force-push: Fixed missing recipient notification address var. Rebased on upstream. |
afc8942
to
6cb1042
Compare
LGTM |
/lgtm |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: cevich, rhatdan The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Note: Intending to merge this around Wednesday the 25th, assuming that's a good time to quickly fix any mass-PR CI breakage. |
@containers/podman-maintainers I intended to merge this last week, but got distracted. I'm going to merge this now. I'll try to watch, but also PLMK if you notice any PRs getting hung up on secret scanning so I can fix ASAP. |
Argh, of course it broke. Looks like Ubuntu hasn't updated podman to support |
Opened #20533 |
As an effort to catch potential secrets and/or credential leaks, add a github-actions workflow which is untouchable in a PR context. To additionally guard against accidents, also check recent branch history. This is especially important on newly created release-branches, which may begin with content from who-knows-where.
Finally, since the new workflow bypasses PR-level changes to the scanner config and base-line. Add a Cirrus-CI invocation of the scanning tool to help catch tool-breaking changes from being merged.
Does this PR introduce a user-facing change?