-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Require approval for PR trigerred jobs #1977
Comments
Hi @LecrisUT ! Thanks for the detailed description. We will discuss this with a team tomorrow, but a bit of context in the meantime:
But, for this specific issue, I would try to find a solution to make it harder to misuse Packit without bringing complications to the real contributors. A few ideas I have in mind or we've discussed:
We don't get any messages for such events so we don't react to those.
Not 100% sure what you mean by that, but we are GitHub application (not GitHub action) and don't have any UI settings. But we can think about loading some info from the already-merged state of the Packit config file. |
Technical note: I am going to transfer this issue to the service repo where the permissions are handled... |
And one last thing. @LecrisUT Are you more afraid of misusing/spamming your repository or about the waste of resources on our side (with spam/DOS/mining possibility)? |
Luckily, we run actions/builds inside a sandboxed environment (no secrets available) so it's more about the waste of resources. The Testing Farm should have some auto-detection of malicious execution but I don't know the details... But I agree that we should do something about that!
Since this is just for GitHub actions (!= GitHub applications), we are not affected by that and I am unable to find it in the API documentation... So, if we want to have it configurable, we should find another way to set this (e.g. merged state of the config). But still, this will not stop people from creating a new project and running the jobs there. |
Quick update after today's discussion at team architecture meeting:
|
The outcome of today's discussion is to fix this problem by these two actions items:
With that, I am going to close this issue. Please, subscribe to the link issues to follow the progress... |
As far as I can see in the documentation, there is no prior authorization of the PR author to approve to run the CI jobs or not. It was pointed out that there was an exploit attempt, e.g. here, which can affect the jobs that enable
enable_net
option forcopr_build
. We should patch these vulnerabilities and check a few common security aspects:/packit build
by non-authorized users. Maybe also already implementedThe text was updated successfully, but these errors were encountered: