Skip to content

Conversation

@elvism-lullabot
Copy link
Collaborator

See #771

@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev July 9, 2025 22:14 Inactive
@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev July 9, 2025 22:21 Inactive
@elvism-lullabot elvism-lullabot marked this pull request as ready for review July 9, 2025 22:34
@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev July 9, 2025 23:07 Inactive
jobs:
zizmor:
name: Run Zizmor Security Analysis
runs-on: ubuntu-latest
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pin the ubuntu version, so 26 doesn't break things later?

Suggested change
runs-on: ubuntu-latest
runs-on: ubuntu-24.04

@mrdavidburns
Copy link
Member

Note from today's sync.

Let's add this workflow directly to this Drainpipe project as a way to test it out. Then we can decide if this is something we want to include with Drainpipe.

@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev July 16, 2025 16:03 Inactive
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev July 16, 2025 16:43 Inactive
@elvism-lullabot
Copy link
Collaborator Author

I added the testZizmor.yml to the GitHub workflows, and it ran successfully. However, github-advanced-security encountered an error here. Could you please review the error? The usage follows the instructions from the README in fabasoad/setup-zizmor-action.

@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev July 25, 2025 19:58 Inactive
@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev July 31, 2025 21:15 Inactive
@elvism-lullabot
Copy link
Collaborator Author

I’ve resolved several Zizmor issues. You can see that the Zizmor alerts have been closed here

@github-actions github-actions bot requested a deployment to lullabotsandbox.dev August 7, 2025 20:59 In progress
@mrdavidburns
Copy link
Member

@elvism-lullabot Let's update this pull request so that it only scaffolds this file when Drainpipe is configured to run security checks.

see: https://github.com/Lullabot/drainpipe?tab=readme-ov-file#security

Also, we need to make sure all checks are passing before this can be merged.
image

@github-actions github-actions bot requested a deployment to lullabotsandbox.dev August 21, 2025 17:21 In progress
@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev August 21, 2025 21:22 Inactive
@elvism-lullabot
Copy link
Collaborator Author

@mrdavidburns Do we need to move the Zizmor check into the scaffold folder and remove it from the GitHub workflows, or should we keep it there for this project?

@mrdavidburns
Copy link
Member

mrdavidburns commented Aug 21, 2025

I'm still not 100% this should be shipped w/ Drainpipe. If we do it would need to be configurable and something we can turn on with configuration. cc @deviantintegral

@github-actions github-actions bot temporarily deployed to lullabotsandbox.dev August 22, 2025 20:16 Inactive
@elvism-lullabot
Copy link
Collaborator Author

For the Zizmor configuration rules, we can use a zizmor.yml file to add or ignore specific rules (see: https://docs.zizmor.sh/configuration/).

I also added a rule with a path under the ignore section:

ignore:
  - ./scaffold/github/actions/common/set-env/action.yml

However, it seems this only works when using the file name (e.g., TestFunctional.yml ). In that case, the errors related to the rule in that file was marked as fixed after adding it to the ignore list.

For enabling the configuration, we could consider using Security:Zizmor, which copies the configuration files from both security and zizmor, while keeping the Security configuration unchanged.

cc @mrdavidburns

@deviantintegral
Copy link
Member

Let's talk about this on the call tomorrow.

@deviantintegral
Copy link
Member

@elvism-lullabot can you file a separate PR just to do the bit around pinning remote workflows? Like these lines:

webfactory/ssh-agent@a6f90b1f127823b31d4d4a8d96047790581349bd #v0.9.1

runs-on: ubuntu-24.04
steps:
- name: Checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4

Check warning

Code scanning / zizmor

detects commit SHAs that don't match their version comment tags Warning

detects commit SHAs that don't match their version comment tags
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants