-
-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: build and push the docker image to ghcr #55
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I want to warn you. Publishing a Docker image and using it from a user repository is not acceptable from a security perspective.
Imagine that I use this action in a closed company repository. Running an opaque container can be used to access closed source code and compromise it.
Community tools should be as transparent as possible from a security point of view.
In this case, an opaque chain with the Docker image is added, which can fall under the control of an attacker.
Yes, I understand there is a risk in the software supply chain. This is why I didn't update the README in this PR. If somebody want to skip the action build step ( 50s -> 9s), he can check the GHCR to use the prebuilt image after inspecting whole the built process (all available in open source, no hidden part) rather than build and push by himself, also just like here https://github.com/reviewdog/action-actionlint uses GHCR. If somebody is still concerned about the integrity of the docker image, he just used the current way, that is, building the docker image when using the action. Do you think it is okay for you to accept the PR , and I'll create a follow-up PR to resolve your concern? My plan is
About the
|
@shogo82148 Can you help to approve the workflow to run? |
In other python based actions like action-yamllint we are using alpine. I use this action and action-yamllint in many repos together. While I've noticed the slowdown, could we not just use the alpine version here too as suggested? I believe that would help. I think that would be safer too. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's remove this file for now. We don't need to do this to improve the action run time.
&& wget -O - -q https://raw.githubusercontent.com/reviewdog/reviewdog/master/install.sh| sh -s -- -b /usr/local/bin/ ${REVIEWDOG_VERSION} \ | ||
&& pip install detect-secrets[word_list] | ||
&& pip install detect-secrets[word_list] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Avoid unnecessary changes. This space was added here.
&& pip install detect-secrets[word_list] | |
&& pip install detect-secrets[word_list] |
&& apt-get install -y --no-install-recommends \ | ||
git \ | ||
wget \ | ||
RUN apk --no-cache add git gcc musl-dev \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Was gcc and musl-dev only added for the docker push workflow? If so, then let's make sure to remove these, please.
RUN apk --no-cache add git gcc musl-dev \ | |
RUN apk --no-cache add git \ |
Can somebody create a pr to change the image to alpine or slim? |
Yes, a new PR was created in #71 which looks good. |
close #54