-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dependency pinning #542
Dependency pinning #542
Conversation
Dependency pinning is mentioned at https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-third-party-actions for third-party actions and makes sense in that context, so I'd be happy with the change to |
Other than GitHub's security guide, we also follow OpenSSF scorecard recommendations. Dependency pinning is a medium level check. It doesn't only apply to GitHub actions, but to Python pip or other package managers dependencies, so this PR won't get us the maximum score, but will improve the value. |
I know this is in no way your fault, but I am not impressed with the referenced https://github.com/step-security/secure-repo?tab=readme-ov-file#3-pin-actions-to-a-full-length-commit-sha which specifically says (emphasis mine)
and then gives an example - uses: actions/checkout@v3
+ uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # tag: v3 If they want to deviate from GitHub's recommendations, they should not refer to GitHub's recommendations as a justification. |
0f3c6ef
to
8368515
Compare
They have an open issue for addressing that because they have received similar feedback before, step-security/secure-repo#1606. |
2fd0a22
to
d1c8b9b
Compare
@hvdijk I just updated the branch focusing the version pinning on third party actions. |
Thanks, I see there were already GitHub actions pinned to specific commits in |
Overview
Pin external workflow actions to the commit hash. Also fix Scorecard badge.
Reason for change
Pinning external workflow actions to the hashed version is a good practice to help against supply chain attacks. This change will raise the OpenSSF score too.
Description of change
External workflow actions have been pinned to the commit hash. The only actions not pinned are
llvm/actions/install-ninja
andllvm/actions/setup-windows
as they don't have releases.Dependabot will open PRs in the future, whenever pinned actions need update.
Anything else we should know?
By default, PRs open by dependabot to update dependencies will be tagged to be reviewed by @codeplaysoftware/security-managers and @codeplaysoftware/ock-workflow-reviewers as the code owners.
Checklist