-
-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: unsecure-commands-allowed audit #176
Conversation
Testing this PR :
cargo run -- tests/test-data/unsecure-commands-allowed.yml |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @ubiratansoares, this looks fantastic! A couple of small comments/nitpicks.
(Could you also add a docs section for this new audit, under the pre-existing audit.md
? The other documentation there should be a good reference!)
@woodruffw Added some docs here. Hope everything looks fine 🚀 |
Thanks a ton @ubiratansoares, this looks great! I'll take over the PR to do a bit of small polishing, and then merge it. |
Signed-off-by: William Woodruff <[email protected]>
Signed-off-by: William Woodruff <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks again @ubiratansoares!
Adds a new
unsecure-commands-allowed
, as per described in #171We should be able to detect opt-in for
ACTIONS_ALLOW_UNSECURE_COMMANDS
in all possible contexts, namelyworkflow.env
,job.env
andstep.env
. I covered both reusable and normal jobs, hope I did not miss anything. Added some integration tests as well.Closes #171