-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Separate out security checks from test:static #112
Comments
Whilst Renovate/Dependabot will pick up a security issue in the main branch, it doesn't tell you if the package you've just added to your PR contains a security issue (which has happened to me many times with node packages). I can understand it might be annoying for scenario #2 where time is of the essence, but isn't that more an issue of the required status checks you've enabled that's preventing it from being merged? Maybe a compromise here would be having a file of known security issues that can be skipped (as we've done in a previous project we both worked on 😄 ) |
I think a file of known issues to skip is good. It would be a small bump in development on open PRs ("why did my PR all of a sudden start failing"), but also one that's easy enough to fix. |
Do you have any particular format in mind (json?) or example for what the "file of known issues" would look like? Thanks! 🙏🏻 |
Here's an example pulled from a project, but open to other suggestions!
|
Things I like:
I wonder:
|
We tried to bundle "checking security along with linting" on a previous project and found it was really undesirable. Ideally, security checks are a separate workflow so that it can be marked as not required and won't block existing PRs until the security issue is resolved. Things like composer audit failing on unsupported packages like happened on #478 would be nice to cause failures everywhere while it gets solved upstream. |
Do we have a direction on where we'd like to continue with this discussed on Monday? |
Dave and I had a chance to discuss this today. We would like to separate out the security jobs and recommend they run on a daily schedule. In the future, it would be OK if we added a job that looked specifically at changed dependencies in the lock file and then failed a PR, but that's certainly more work and this issue has come up on multiple projects. So, let's get the easy thing done first! |
Getting started on this afternoon after getting the Composer Lock Diff changes ready for review today. |
Continuing work on this and expect to have at least a draft PR ready for initial review today. |
Hmm, I thought there would be more to this but there doesn't seem to be a generic scaffolded workflow for static tests that Drainpipe provides. For example, https://github.com/Lullabot/lullabot.com-d8/blob/main/.github/workflows/TestStatic.yml seems to exist by itself. |
PR ready for review at #558 |
We discussed the issues with the various solutions today:
We decided to go with the solution further up in the comments and make that work for composer #112 (comment) |
There can be good reasons to merge PRs that have open security issues:
Let's remove test:security from test:static. On the one hand, I think it could be good to add test:security as a nightly CI job. However, with dependabot or renovate, that may not be useful.
The text was updated successfully, but these errors were encountered: