Skip to content

Conversation

@thpierce
Copy link
Contributor

@thpierce thpierce commented Sep 22, 2025

Add validation step to require commit SHAs instead of version tags for third-party GitHub actions in workflow files. Also fix the one we missed: aquasecurity/trivy-action - depending on master is pretty unusual and not trivial to catch, ultimately the Repo config Require actions to be pinned to a full-length commit SHA will protect against this if we missed any others.

Testing done

Found versioned GitHub actions. Use commit SHAs instead:
.github/actions/lambda_artifacts_build/action.yml:30:    - uses: actions/checkout@v4
.github/actions/lambda_artifacts_build/action.yml:42:    - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:54:      - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:106:      - uses: actions/checkout@v4

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

Add validation step to require commit SHAs instead of version tags
for third-party GitHub actions in workflow files.
@thpierce thpierce requested a review from a team as a code owner September 22, 2025 18:09
@thpierce thpierce added the skip changelog doesn't need a CHANGELOG entry label Sep 22, 2025
Copy link
Contributor

@vastin vastin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@thpierce thpierce merged commit 3f93378 into main Sep 22, 2025
23 of 24 checks passed
@thpierce thpierce deleted the no-versions branch September 22, 2025 20:13
thpierce added a commit to aws-observability/aws-otel-dotnet-instrumentation that referenced this pull request Sep 22, 2025
Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* See:
aws-observability/aws-otel-python-instrumentation#475

By submitting this pull request, I confirm that you can use, modify,
copy, and redistribute this contribution, under the terms of your
choice.
thpierce added a commit to aws-observability/aws-otel-js-instrumentation that referenced this pull request Sep 22, 2025
Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* See:
aws-observability/aws-otel-python-instrumentation#475

By submitting this pull request, I confirm that you can use, modify,
copy, and redistribute this contribution, under the terms of your
choice.
thpierce added a commit to aws-observability/aws-application-signals-test-framework that referenced this pull request Sep 23, 2025
Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* See:
aws-observability/aws-otel-python-instrumentation#475

*Rollback procedure:*

Git revert - no risk

*Ensure you've run the following tests on your changes and include the
link below:*

pr workflow sufficient

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license.
thpierce added a commit to aws-observability/aws-otel-java-instrumentation that referenced this pull request Sep 23, 2025
Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* See:
aws-observability/aws-otel-python-instrumentation#475

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license.
ezhang6811 pushed a commit to ezhang6811/aws-otel-python-instrumentation that referenced this pull request Oct 22, 2025
…lity#475)

Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Also fix the one we
missed: `aquasecurity/trivy-action` - depending on `master` is pretty
unusual and not trivial to catch, ultimately the Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

* `Python Instrumentation PR Build / static-code-checks (pull_request)`
passes
* `Check CHANGELOG` fails, causing PR-build to fail, but `Check for
versioned GitHub action` passes:
https://github.com/aws-observability/aws-otel-python-instrumentation/actions/runs/17924516041/job/50967250100?pr=475
* Added various [`@v` in
code](aws-observability@f2f0523),
only finds uncommented ones:
https://github.com/aws-observability/aws-otel-python-instrumentation/actions/runs/17925754982/job/50971348934?pr=475
```
Found versioned GitHub actions. Use commit SHAs instead:
.github/actions/lambda_artifacts_build/action.yml:30:    - uses: actions/checkout@v4
.github/actions/lambda_artifacts_build/action.yml:42:    - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:54:      - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:106:      - uses: actions/checkout@v4
```

By submitting this pull request, I confirm that you can use, modify,
copy, and redistribute this contribution, under the terms of your
choice.
jj22ee pushed a commit to jj22ee/aws-otel-python-instrumentation that referenced this pull request Oct 22, 2025
…lity#475)

Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Also fix the one we
missed: `aquasecurity/trivy-action` - depending on `master` is pretty
unusual and not trivial to catch, ultimately the Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

* `Python Instrumentation PR Build / static-code-checks (pull_request)`
passes
* `Check CHANGELOG` fails, causing PR-build to fail, but `Check for
versioned GitHub action` passes:
https://github.com/aws-observability/aws-otel-python-instrumentation/actions/runs/17924516041/job/50967250100?pr=475
* Added various [`@v` in
code](aws-observability@f2f0523),
only finds uncommented ones:
https://github.com/aws-observability/aws-otel-python-instrumentation/actions/runs/17925754982/job/50971348934?pr=475
```
Found versioned GitHub actions. Use commit SHAs instead:
.github/actions/lambda_artifacts_build/action.yml:30:    - uses: actions/checkout@v4
.github/actions/lambda_artifacts_build/action.yml:42:    - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:54:      - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:106:      - uses: actions/checkout@v4
```

By submitting this pull request, I confirm that you can use, modify,
copy, and redistribute this contribution, under the terms of your
choice.
ezhang6811 added a commit to ezhang6811/aws-otel-python-instrumentation that referenced this pull request Oct 22, 2025
jj22ee pushed a commit to jj22ee/aws-otel-python-instrumentation that referenced this pull request Oct 22, 2025
…lity#475)

Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Also fix the one we
missed: `aquasecurity/trivy-action` - depending on `master` is pretty
unusual and not trivial to catch, ultimately the Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* `Python Instrumentation PR Build / static-code-checks (pull_request)`
passes
* `Check CHANGELOG` fails, causing PR-build to fail, but `Check for
versioned GitHub action` passes:
https://github.com/aws-observability/aws-otel-python-instrumentation/actions/runs/17924516041/job/50967250100?pr=475
* Added various [`@v` in
code](aws-observability@f2f0523),
only finds uncommented ones:
https://github.com/aws-observability/aws-otel-python-instrumentation/actions/runs/17925754982/job/50971348934?pr=475
```
Found versioned GitHub actions. Use commit SHAs instead:
.github/actions/lambda_artifacts_build/action.yml:30:    - uses: actions/checkout@v4
.github/actions/lambda_artifacts_build/action.yml:42:    - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:54:      - uses: actions/checkout@v4 #v4
.github/workflows/daily-scan.yml:106:      - uses: actions/checkout@v4
```

By submitting this pull request, I confirm that you can use, modify,
copy, and redistribute this contribution, under the terms of your
choice.
jj22ee pushed a commit to aws-observability/aws-otel-java-instrumentation that referenced this pull request Oct 24, 2025
Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* See:
aws-observability/aws-otel-python-instrumentation#475

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license.
jj22ee pushed a commit to aws-observability/aws-otel-java-instrumentation that referenced this pull request Oct 24, 2025
Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* See:
aws-observability/aws-otel-python-instrumentation#475

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license.
jj22ee pushed a commit to aws-observability/aws-otel-java-instrumentation that referenced this pull request Oct 27, 2025
Add validation step to require commit SHAs instead of version tags for
third-party GitHub actions in workflow files. Repo config `Require
actions to be pinned to a full-length commit SHA` will protect against
this if we missed any others.

### Testing done
* See:
aws-observability/aws-otel-python-instrumentation#475

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

skip changelog doesn't need a CHANGELOG entry

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants