-
Notifications
You must be signed in to change notification settings - Fork 276
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: Dependency Review Action #1974
chore: Dependency Review Action #1974
Conversation
Dependency review is a tool that helps you identify and fix vulnerabilities in your dependencies. By checking the dependency reviews in a pull request and changing any dependencies that are flagged as vulnerable, the project can avoid vulnerabilities being added to your project. https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement Signed-off-by: naveensrinivasan <[email protected]>
d23ea6a
to
0c0206d
Compare
Pull Request Test Coverage Report for Build 2216716231Warning: This coverage report may be inaccurate.This pull request's base commit is no longer the HEAD commit of its target branch. This means it includes changes from outside the original pull request, including, potentially, unrelated coverage changes.
Details
💛 - Coveralls |
The feature referenced here does not come with The /=dependency-review-action basically makes any vulnerabilities shown in that diff more visible by displaying them in the checks box on the front page of a PR, with the option to block merge if the action fails. I agree with @jku that it probably does not add much value since we already use
OTOH, there is probably not much harm in enabling the action (it is hosted by GitHub, only needs read permission), other than probably making builds take slightly longer and adding another config file that we need to maintain. Furthermore, the Dependabot alerts docs cited above further say:
I have no strong preference about this, but lean a bit towards merging and see how it goes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have no strong preference about this, but lean a bit towards merging and see how it goes.
Works for me, let's try it out. I have one change request, will leave comment about that.
Signed-off-by: naveensrinivasan <[email protected]>
- name: 'Dependency Review' | ||
uses: actions/dependency-review-action@v1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
wow: I think your changes are correct and I'll approve but... look at where "v1" actually points to: the initial commit event though there are several 1.0.x releases after that! Further proof that actions versioning is really not well thought out.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
they fixed this now... apparently the project had 1600 users and no-one had noticed they were all running the initial commit
Dependency review is a tool that helps you identify and fix vulnerabilities in your dependencies. By checking the dependency reviews in a pull request and changing any dependencies that are flagged as vulnerable, the project can avoid vulnerabilities being added to your project. https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement