-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add silent option #526
Add silent option #526
Conversation
for more information, see https://pre-commit.ci
for more information, see https://pre-commit.ci
code is good for review - but I'm testing it against https://github.com/fcollonval/dummy-again to check it works properly |
68c4200
to
6dc07a2
Compare
From the test repo:
|
for more information, see https://pre-commit.ci
I updated the documentation
|
I have no objections to this, but IIUC to do the release the GH-advisories need to be merged and are public anyway, am I misunderstanding ? If that's the case I don't think hiding the changelog is going to change things much. Also one thing it is always save to publish is CVE-number. It is ok to publish them before the CVE/patches are public as it allows users to track wether they might be vulnerable or will need to upgrade once a patch is published. |
Those have |
That was also my initial understanding but thought the process had changed in the meantime. |
This is a good point that I cannot answer. @blink1073 would you mind sharing your experience on that? |
Drafts are only visible to repo/organization maintainers, but I think that logs are visible to all logged in users: |
From reading GitHub docs, I do not believe that this is the case; they imply that you can merge the pull request from private fork without making the advisory public. Also, you need to provide information on versions affected and version fixed to publish advisory (which you can fake before making the actual release). I think that ideal the order is:
This is what the GitHub docs says https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/collaborating-in-a-temporary-private-fork-to-resolve-a-repository-security-vulnerability:
And the fragment which explains that the "patched version" should be populated: https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/publishing-a-repository-security-advisory#about-publishing-a-security-advisory
|
The silent option comes in handy because between merging and backporting there can be a delay of between minutes to hours if something goes wrong (and we had recent experience where GitHub outages would delay the release pipeline by several hours). IMO, whether it is worth a hassle depends on how high severity are the vulnerabilities. |
I agree with @krassowski's assessment |
See also #333 |
18471a4 hide the new changelog entry in the job log if the silent option is checked. |
@jtpio @krassowski I would like to move forward with this one. There is a hanging question about the example workflow. What are your opinions on that? |
for more information, see https://pre-commit.ci
Hey @blink1073 would you mind reviewing this PR? |
Yep, I reviewed half the files today, will finish tomorrow. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thank you!
Thanks @blink1073 for the review |
This adds the ability to do a silent release; i.e. a release that will have a placeholder in the changelog and that will keep the release in draft mode.
One question raised by this proposal is that the audience able to see draft release is broader than the one seeing security advisories