refactor(ci): switch to Gitea Actions #20
Loading…
x
Reference in New Issue
Block a user
No description provided.
Delete Branch "gitea"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Gitea Actionsto refactor(ci): switch to Gitea ActionsDecision: Reject
Change Score: 50%
I am rejecting this pull request for the following reasons:
Unacceptable dependency: The workflow uses a third-party action
https://git.tainton.uk/actions/conventional-commits-check-action@v1.2.4
. Directly using a URL for a GitHub Action is highly discouraged because it lacks version immutability and poses a significant security risk. The action could be modified maliciously without your knowledge.Recommendation: Use the standard
uses: <owner>/<repo>@<version>
format to specify the action. Find the corresponding GitHub repository forhttps://git.tainton.uk/actions/conventional-commits-check-action
and use a specific tag or commit SHA for versioning. This ensures that you are using a known and trusted version of the action. For example, if the repository wastainton-uk/conventional-commits-check-action
and you wanted to use tagv1.2.4
, theuses
line would becomeuses: tainton-uk/conventional-commits-check-action@v1.2.4
. If you want to use a specific commit SHA, which is even more secure, find the SHA on the repository, and use that. For example,uses: tainton-uk/conventional-commits-check-action@a1b2c3d4e5f6...
.Missing
pull_request_target
: The workflow is currently configured to trigger onpull_request
events, which, by default, have restricted access to the repository's secrets and Gitea token. This can prevent the action from properly validating the pull request title, especially if the action needs write access (e.g., to add labels or comments).Recommendation: If the action needs access to the repository's secrets or the Gitea token with write permissions, you should consider using the
pull_request_target
event instead. Be aware thatpull_request_target
carries security implications because it runs in the context of the base branch. Ensure that the action you're using is trustworthy and that you understand the potential risks.CODEOWNERS file: The CODEOWNERS file simply assigns
@luke
as the owner for everything. This is not inherently wrong, but it's not helpful. Consider being more specific about what@luke
owns, or consider if other code owners are needed.Correct these issues and resubmit.