community
community copied to clipboard
Proposal: Use harden-runner in jobs using OPENTELEMETRYBOT_GITHUB_TOKEN
We can consider using https://github.com/step-security/harden-runner in places where OPENTELEMETRYBOT_GITHUB_TOKEN is used.
Proposal:
- Try using in one repository (e.g. in https://github.com/open-telemetry/opentelemetry-go/blob/main/.github/workflows/create-dependabot-pr.yml)
- Propose a PR for https://github.com/open-telemetry/community/blob/main/assets.md#opentelemetry-bot to recommend using https://github.com/step-security/harden-runner
- Create issues for repos which are using
OPENTELEMETRYBOT_GITHUB_TOKENso that they add https://github.com/step-security/harden-runner
CC @trask
We can consider using https://github.com/step-security/harden-runner in places where
OPENTELEMETRYBOT_GITHUB_TOKENis used.
the OPENTELEMETRYBOT_GITHUB_TOKEN fine-grained PAT org secret will have very limited permissions once #1549 is implemented
do you mean specifically for the additional fine-grained PATs with write access to a single repo for those who want to grant write permission to @opentelemetrybot? (https://github.com/open-telemetry/community/issues/1503#issuecomment-1588193654)
do you mean specifically for the additional fine-grained PATs with write access to a single repo for those who want to grant write permission to @opentelemetrybot?
Yup. However, it may be safer to use it everywhere where OPENTELEMETRYBOT_GITHUB_TOKEN is used as the permissions of the PAT may change and the contributor may not know what are the permissions.
@pellared this fell through the cracks. Is it is still actual?
@tigrannajaryan, yes it is. I think that the proposal should be reviewed by Security SIG.
cc @open-telemetry/sig-security-maintainers