Hash-pin action usages, minimize CI/CD permissions#309
Conversation
Signed-off-by: William Woodruff <william@yossarian.net>
Signed-off-by: William Woodruff <william@yossarian.net>
|
Thanks. We'll see how dependabot goes, I find it mostly annoying in every scenario and so it tends to manage about 5 notifications before I shut it down. Is there a way to make sure it's constrained to only complain about important stuff (such as pipelines) and not (e.g.) test data? |
Same 😅 -- what I've done here is configure Dependabot to hopefully be a bit less noisy than the defaults: the current config will only run update checks once a week, and will batch all updates into a single PR. I've also only enabled the (It's very easy to further ratchet that down as well, e.g. to only do updates every month or even every quarter. Whatever works for you, I'm happy to amend to!) |
|
Batching all updates is finally here ❤️ Let's do it. I'm in the middle of pinning other build-time dependencies, but I wouldn't have got these, so the PR is well timed. |
Hello! This addresses some findings from zizmor 🙂
TL;DR is that I've hash-pinned all actions to make them more hermetic (making it harder for an attacker who compromises an action to push code directly to you via a mutable tag or branch). I've also added a Dependabot config that'll keep actions up-to-date, with a cooldown period that'll ensure that any action changes have at least a week to bake/receive security scrutiny before they're proposed for your inclusion. Separately, I've made the permissions on your CI/CD as minimal as possible and removed a very minor source of on-disk credential persistence via
actions/checkout.With these changes, the only remaining default zizmor finding is this:
...which is pretty minor, but could be resolved by a maintainer by moving that credential into a dedicated deployment environment.
Separately, I have not included a CI integration for zizmor in this PR. But if you're interested in one LMK and I'd be happy to do a follow up PR for it!