Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix celo-compliance Github Action #7

Open
5 of 8 tasks
arthurgousset opened this issue Jan 16, 2024 · 9 comments
Open
5 of 8 tasks

Fix celo-compliance Github Action #7

arthurgousset opened this issue Jan 16, 2024 · 9 comments

Comments

@arthurgousset
Copy link
Contributor

arthurgousset commented Jan 16, 2024

Context in this Slack thread.

Error in Github Action is:

remote: error: GH006: Protected branch update failed for refs/heads/main.       
remote: error: Changes must be made through a pull request.

Source: Github action

Github Action seems to fail because direct git push to main branch is forbidden according to branch protection policies.
A GitHub owner or repo admin should be able to update that config

Tasks

  1. 4 of 4
    arthurgousset
@arthurgousset
Copy link
Contributor Author

arthurgousset commented Jan 16, 2024

Looks like this stopped working due to a change in branch permissions between Thu, Jan 11 and Fri, Jan 12.

Image

@arthurgousset
Copy link
Contributor Author

arthurgousset commented Jan 16, 2024

Added a todo above

Check the Github Action updates the list correctly (follow up todo)

It looks like the NPM release flow wasn't triggered in the past 3 months. Check this matches with expected updates shared in OFAC feed.

Image

@lvpeschke
Copy link
Contributor

The branch protection, which now requires a PR + approval before committing to the main branch, is probably my edit. Last week, I changed security settings across a few repositories working off the premise that additional restrictions, if painful, would be raised.

Ideally, we would keep branch protection going forward, since ensuring all changes to default branches go through PRs adds layers of security (most notably: org-wide workflows such as Socket). This could still get automatically merged, provided all checks pass.

@arthurgousset
Copy link
Contributor Author

arthurgousset commented Jan 17, 2024

Understood, thanks for the heads-up @lvpeschke.

We'll do two things here:

  • update the workflow to use PR + auto-approval, so the main branch protection can stay on
  • double-check we get notified when the GitHub Action fails

In this case, we coincidentally checked the GitHub Actions on the day the workflow broke, because Subha manually notified us of an OFAC update.

@arthurgousset arthurgousset self-assigned this Jan 19, 2024
@arthurgousset
Copy link
Contributor Author

Idea:

a slack message that goes to the channel with addreses that were added or if it fails that

@arthurgousset
Copy link
Contributor Author

Idea:

  • even update if succeeded but not address was added

@arthurgousset
Copy link
Contributor Author

Note: @shazarre and I will be pairing on this. Leszek is interested in learning more about Github Actions too

@arthurgousset
Copy link
Contributor Author

From Slack:

The compliance workflows are broken again, because branch protection rules were enabled.
Just noting this here, so there is a log that this didn't work for the last 2 weeks.

image

@arthurgousset arthurgousset removed their assignment Feb 5, 2024
@arthurgousset
Copy link
Contributor Author

Unassigning myself because this is something @shazarre has taken on (based on Slack convo).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants