Skip to content

Update action versions#6848

Merged
jonmeow merged 1 commit into
trunkfrom
action-test
Mar 6, 2026
Merged

Update action versions#6848
jonmeow merged 1 commit into
trunkfrom
action-test

Conversation

@jonmeow
Copy link
Copy Markdown
Contributor

@jonmeow jonmeow commented Mar 6, 2026

In addition to the general updates, this switches to a required python 3.10 for pre-commit (3.9 is losing support from black).

Note endpoints for build actions are expanding significantly: see https://app.stepsecurity.io/github/carbon-language/carbon-lang/actions/runs/22779388360?tab=recommendations&jobId=66080970460 for example, I think just the sources are being increased as a side-effect of updates (and possibly also things not performing as well as they should have before).

Similarly allowing sudo in pre-commit because it was actually causing errors in part of build setup, which used sudo to remove files.

Assisted-by: Google Antigravity with Gemini

@jonmeow jonmeow force-pushed the action-test branch 4 times, most recently from f853968 to 82f1e5e Compare March 6, 2026 21:16
@jonmeow jonmeow mentioned this pull request Mar 6, 2026
@jonmeow jonmeow marked this pull request as ready for review March 6, 2026 21:33
@jonmeow jonmeow requested a review from a team as a code owner March 6, 2026 21:33
@jonmeow jonmeow requested review from danakj and removed request for a team March 6, 2026 21:33
@github-actions github-actions Bot added the documentation An issue or proposed change to our documentation label Mar 6, 2026
Comment on lines +46 to +63
*.blob.storage.azure.net:443
*.githubapp.com:443
*.sourceforge.net:443
api.github.com:443
api.ipify.org:443
bcr.bazel.build:443
downloads.sourceforge.net:443
files.pythonhosted.org:443
github.com:443
go.dev:443
mirror.bazel.build:443
mirrors.kernel.org:443
nodejs.org:443
oauth2.googleapis.com:443
objects.githubusercontent.com:443
pypi.org:443
registry.npmjs.org:443
release-assets.githubusercontent.com:443
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's a lot of new endpoints, with one being pretty much "the internet" when it's pointing at azure storage, I think. Could we at least say something about this in the PR description?

Copy link
Copy Markdown
Contributor Author

@jonmeow jonmeow Mar 6, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added notes and link (README.md already had relevant info)

Copy link
Copy Markdown
Contributor

@danakj danakj Mar 6, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Alright, thanks. This doesn't seem like a particularly hardened configuration. I am not sure what exactly the threat model is, but this seems to open up a lot more access for the CI bots.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a bit circular -- we'd been nudged to add some checks, so I did, but it's hard to actually restrict bazel given how it downloads.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Other, non-bazel executions are stricter.

Copy link
Copy Markdown
Contributor

@danakj danakj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Comment on lines +46 to +63
*.blob.storage.azure.net:443
*.githubapp.com:443
*.sourceforge.net:443
api.github.com:443
api.ipify.org:443
bcr.bazel.build:443
downloads.sourceforge.net:443
files.pythonhosted.org:443
github.com:443
go.dev:443
mirror.bazel.build:443
mirrors.kernel.org:443
nodejs.org:443
oauth2.googleapis.com:443
objects.githubusercontent.com:443
pypi.org:443
registry.npmjs.org:443
release-assets.githubusercontent.com:443
Copy link
Copy Markdown
Contributor

@danakj danakj Mar 6, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Alright, thanks. This doesn't seem like a particularly hardened configuration. I am not sure what exactly the threat model is, but this seems to open up a lot more access for the CI bots.

@jonmeow jonmeow added this pull request to the merge queue Mar 6, 2026
Merged via the queue into trunk with commit 6786edd Mar 6, 2026
24 checks passed
@jonmeow jonmeow deleted the action-test branch March 6, 2026 22:26
github-merge-queue Bot pushed a commit that referenced this pull request Mar 9, 2026
Missed in #6848 (had it sitting in my workspace uncommitted, apparently
have gotten too used to jj; using git here)

Assisted-by: Google Antigravity with Gemini
Copy link
Copy Markdown
Contributor

@danakj danakj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

releases.bazel.build:443
sourceforge.net:443
storage.googleapis.com:443
uploads.github.com:443
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Removing uploads.github.com looks to have broken the upload of our nightly releases: https://github.com/carbon-language/carbon-lang/actions/runs/22836672563

Copy link
Copy Markdown
Contributor Author

@jonmeow jonmeow Mar 9, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! I responded to your thread on #infra.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation An issue or proposed change to our documentation infrastructure

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants