Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(ci): properly use pull_request_target trigger type for driver api and schema version ci checks #977

Merged
merged 2 commits into from
Mar 22, 2023

Conversation

FedeDP
Copy link
Contributor

@FedeDP FedeDP commented Mar 14, 2023

What type of PR is this?

/kind cleanup

Any specific area of the project related to this PR?

/area CI

Does this PR require a change in the driver versions?

What this PR does / why we need it:

The PR switches the newly added driver API and SCHEMA version CI checks to use the pull_request_target trigger: https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#pull_request_target.
This trigger is capable of commenting on PRs coming from forks:

Warning: For workflows that are triggered by the pull_request_target event, the GITHUB_TOKEN is granted read/write repository permission unless the permissions key is specified and the workflow can access secrets, even when it is triggered from a fork. Although the workflow runs in the context of the base of the pull request, you should make sure that you do not check out, build, or run untrusted code from the pull request with this event. Additionally, any caches share the same scope as the base branch. To help prevent cache poisoning, you should not save the cache if there is a possibility that the cache contents were altered. For more information, see "Keeping your GitHub Actions and workflows secure: Preventing pwn requests" on the GitHub Security Lab website.

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?:

NONE

pull_request:
pull_request_target:
types:
- ready_for_review
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Only when PR gets ready for review ;)

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 14, 2023

/milestone 0.11.0
/hold

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 14, 2023

Mmh i cannot get the trigger to work :/ i tried pushing a commit that touches driver/event_table.c but nothing happened.

@FedeDP FedeDP marked this pull request as draft March 14, 2023 17:03
@FedeDP FedeDP marked this pull request as ready for review March 14, 2023 17:03
@poiana poiana requested a review from gnosek March 14, 2023 17:03
@FedeDP FedeDP changed the title chore(ci): properly use pull_request_target trigger type for driver api and schema version ci checks wip: chore(ci): properly use pull_request_target trigger type for driver api and schema version ci checks Mar 14, 2023
@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 15, 2023

/cc @Molter73 WDYT? You are super expert in the CI area :D
I don't get why the workflows are not triggered!

… api and schema version ci checks.

Signed-off-by: Federico Di Pierro <[email protected]>
@FedeDP FedeDP force-pushed the chore/driver_schema_api_version_checks branch from e07ed8f to 9bdd6d2 Compare March 15, 2023 11:41
@poiana poiana added size/XS and removed size/S labels Mar 15, 2023
@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 15, 2023

Was able to test it in FedeDP/plugins#1.
It worked fine; i think we need to merge this in master before seeing it in action.

@FedeDP FedeDP force-pushed the chore/driver_schema_api_version_checks branch from 9bdd6d2 to 6c17119 Compare March 15, 2023 11:43
@FedeDP FedeDP changed the title wip: chore(ci): properly use pull_request_target trigger type for driver api and schema version ci checks chore(ci): properly use pull_request_target trigger type for driver api and schema version ci checks Mar 15, 2023
@Molter73
Copy link
Contributor

I don't get why the workflows are not triggered!

Sorry I'm late for this, but my guess is that the problem was with setting the ready_for_review type as the only trigger, which would make it so the workflow only triggers when a PR is opened or goes from draft to ready. Using the default events of opened, reopened and synchronize looks like what we actually want.

Molter73
Molter73 previously approved these changes Mar 15, 2023
Copy link
Contributor

@Molter73 Molter73 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 15, 2023

Sorry I'm late for this, but my guess is that the problem was with setting the ready_for_review type as the only trigger, which would make it so the workflow only triggers when a PR is opened or goes from draft to ready. Using the default events of opened, reopened and synchronize looks like what we actually want.

Yep that is what i thought too! Thanks for reviewing :)

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 15, 2023

This is still on hold because i am not sure about the security impact of this change:

Warning: For workflows that are triggered by the pull_request_target event, the GITHUB_TOKEN is granted read/write repository permission unless the permissions key is specified and the workflow can access secrets, even when it is triggered from a fork. Although the workflow runs in the context of the base of the pull request, you should make sure that you do not check out, build, or run untrusted code from the pull request with this event. Additionally, any caches share the same scope as the base branch. To help prevent cache poisoning, you should not save the cache if there is a possibility that the cache contents were altered. For more information, see "Keeping your GitHub Actions and workflows secure: Preventing pwn requests" on the GitHub Security Lab website.

@LucaGuerra

@Andreagit97
Copy link
Member

This is still on hold because i am not sure about the security impact of this change:

yep this is my only concern here :/

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 20, 2023

Another solution would be to just make the job fail; i don't like it that much though :/

@LucaGuerra
Copy link
Contributor

I have reviewed the security properties of this.

The PR, as is, is relatively safe because nothing in the workflow actually runs anything that is supplied as code (while the GHA content itself won't run until it's merged because it's picked from the base of the PR not the head). In fact, the workflow only checks if certain files are modified and does not run or otherwise inspect the content.

HOWEVER:
The moment someone (such as @FedeDP) decides to add something smarter to this check to make the message more user-friendly, say, a custom Bash script in the repo that inspects the file contents ( 😱 @FedeDP ) the thing would become extra vulnerable because someone can change the bash script and run arbitrary code with the repository's full permission once the CI is allowed to run. That said, it is possible to implement that securely but the approach is heavier as described in the GH blog post.

I propose the following: please @FedeDP add a comment that scares anyone away from adding anything that remotely resembles custom code execution to this workflow and swear you won't do it (cc @Andreagit97 for good measure). If this is needed we'll build a more complex workflow, such as the one that is presented in the linked article https://securitylab.github.com/research/github-actions-preventing-pwn-requests .

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 22, 2023

I promise i won't add any magic to these workflows 🤣
I will add the comment, thank you very much for this in-depth research @LucaGuerra!

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 22, 2023

@LucaGuerra should be ok now :) Thank you again!

Copy link
Contributor

@LucaGuerra LucaGuerra left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you @FedeDP

Copy link
Member

@Andreagit97 Andreagit97 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@poiana
Copy link
Contributor

poiana commented Mar 22, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Andreagit97, FedeDP, LucaGuerra, Molter73

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [Andreagit97,FedeDP,LucaGuerra,Molter73]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@FedeDP
Copy link
Contributor Author

FedeDP commented Mar 22, 2023

/unhold

@poiana poiana merged commit 99583c6 into master Mar 22, 2023
@poiana poiana deleted the chore/driver_schema_api_version_checks branch March 22, 2023 09:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

5 participants