-
Notifications
You must be signed in to change notification settings - Fork 122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request]: Reference actions by commit SHA #67
Conversation
Thanks for remaking the PR! Everything looks great except can you tweak your commit messages slightly? If you could prepend "CI:" before the first line of your commit message ("Bump and ref actions...") that would be great. We like to do that to help search/filter commits by category. Also, in the first commit can you mention the reason why this change is needed? Something like the text from #65 could be enough: "Referencing actions by commit SHA in GitHub workflows guarantees you are using an immutable version. Actions referenced by tags and branches are more vulnerable to attacks, such as the tag being moved to a malicious commit or a malicious commit being pushed to the branch." Or if you want to reword it at all. |
Yes sure! Will do! |
Referencing actions by commit SHA in GitHub workflows guarantees you are using an immutable version. Actions referenced by tags and branches are more vulnerable to attacks, such as the tag being moved to a malicious commit or a malicious commit being pushed to the branch. It's important to make sure the SHA's are from the original repositories and not forks. For reference: https://github.com/actions/checkout/releases/tag/v4.1.0 actions/checkout@8ade135 https://github.com/actions/upload-artifact/releases/tag/v3.1.3 actions/upload-artifact@a8a3f3a Signed-off-by: Gabriela Gutierrez <[email protected]>
Referencing actions by commit SHA in GitHub workflows guarantees you are using an immutable version. Actions referenced by tags and branches are more vulnerable to attacks, such as the tag being moved to a malicious commit or a malicious commit being pushed to the branch. It's important to make sure the SHA's are from the original repositories and not forks. For reference: https://github.com/msys2/setup-msys2/releases/tag/v2.20.1 msys2/setup-msys2@27b3aa7 https://github.com/actions/checkout/releases/tag/v4.1.0 actions/checkout@8ade135 https://github.com/actions/upload-artifact/releases/tag/v3.1.3 actions/upload-artifact@a8a3f3a Signed-off-by: Gabriela Gutierrez <[email protected]>
See if it looks better now |
It looks great! Thanks |
Thanks for your contributions! Friendly advice for the future: It is a good practice to manually wrap the lines in commit messages. With very long lines,
Thanks! |
Thanks for the advice! I will follow that for future commit messages! |
Pull request checklist
Please check if your PR fulfills the following requirements:
Pull request type
Please check the type of change your PR introduces:
What is the current behavior?
Referencing actions by major tag (e.g.
v3
)Related Issue URL: #65
Resolves #65
What is the new behavior?
Referencing actions by commit SHA (e.g.
8ade135a41bc03ea155e62e844d188df1ea18608
)Does this introduce a breaking change?
Other information