-
Notifications
You must be signed in to change notification settings - Fork 1
Refactor: Workflow security and trigger updates #133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
2abc090
17d7162
c6644ba
b3721f7
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||
|---|---|---|---|---|---|---|---|---|
|
|
@@ -8,6 +8,12 @@ name: 'Python Build/Test' | |||||||
| # yamllint disable-line rule:truthy | ||||||||
| on: | ||||||||
| workflow_dispatch: | ||||||||
| inputs: | ||||||||
| clear_cache: | ||||||||
| description: 'Clear all Python dependency caches' | ||||||||
| type: boolean | ||||||||
| default: false | ||||||||
| required: false | ||||||||
| pull_request: | ||||||||
| types: [opened, reopened, edited, synchronize] | ||||||||
| branches: | ||||||||
|
|
@@ -23,9 +29,39 @@ concurrency: | |||||||
| group: "${{ github.workflow }}-${{ github.ref }}" | ||||||||
| cancel-in-progress: true | ||||||||
|
|
||||||||
| permissions: {} | ||||||||
| permissions: | ||||||||
| actions: write # Required for cache deletion when clear_cache is true | ||||||||
|
Comment on lines
+32
to
+33
|
||||||||
| permissions: | |
| actions: write # Required for cache deletion when clear_cache is true | |
| permissions: {} |
Copilot
AI
Feb 25, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
python-audit no longer sets permit_fail: true for lfreleng-actions/python-audit-action. This is a behavior change from the previous configuration (which explicitly allowed audit failures for dev/non-PyPI packages) and may cause CI to start failing on projects that previously passed. If the intent is still to allow non-blocking audits in this workflow, reintroduce permit_fail: true (or the action’s current equivalent).
| python_version: "${{ matrix.python-version }}" | |
| python_version: "${{ matrix.python-version }}" | |
| permit_fail: true |
ModeSevenIndustrialSolutions marked this conversation as resolved.
Show resolved
Hide resolved
Copilot
AI
Feb 18, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The Grype scan no longer fails the workflow on vulnerabilities: the SARIF scan sets fail-build: "true" but also continue-on-error: true, and the follow-up table scan sets fail-build: "false". As written, this job will always succeed even when Grype finds findings, which is a security regression vs a blocking scan. Either remove continue-on-error from the blocking scan, or add an explicit failing step based on steps.grype-sarif.outcome/exit code (and keep SARIF upload non-blocking separately).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This has been addressed. The current PR now includes a "Check Grype scan results" step that checks steps.grype-sarif.outcome == 'failure' and exits with error code 1. The continue-on-error: true on the SARIF step allows subsequent steps (table output, artifact upload, summary) to complete before the explicit failure step fires. This is the intended pattern.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The comments state the table scan is set to not block releases, but the workflow still fails the
sbomjob whensteps.grype-sarif.outcome == 'failure'(and the SARIF scan hasfail-build: "true"). As written, vulnerability findings will block tag-based releases. Either remove/relax this check in the release workflow, or set the SARIF scan to not fail the step (e.g.,fail-build: "false") if releases should proceed.