Git safe.directory
— next steps
#984
Labels
ci-github
cml-ci
Subcommand
icebox
p2-nice-to-have
Low priority
technical-debt
Refactoring, linting & tidying
This issue is a follow–up of #974 (review) and some of the surrounding comments.
Security
TL;DR CVE-2022-24765 — the vulnerability
safe.directory
prevents — doesn't quite apply to GitHub Actions workflows. I still have to edit this section and include an extended explanation, but I'm too lazy and have more important things in the backlog.Tests
We may want to add some tests for this, although our current test suite is not versatile enough to do it cleanly.
Improvements
~/.gitconfig
for everycml
run and delete it afterwards, instead of permanently modifying the user's global configuration. See Enforce safe directory actions/checkout#762 for an implementation example.cml ci
(similar to what we do now)Resolution
GitHub acknowledges that
git
operations other thanactions/checkout
are still broken. There is still hope of this issue being fixed upstream in the mid term.References
Issue and fix on
iterative/cml
safe.directory
withcml ci
#974Issue and fix on
actions/checkout
fatal: unsafe repository (REPO is owned by someone else)
with ubuntu 20.04 container actions/checkout#760Git release highlights
Vulnerability
The text was updated successfully, but these errors were encountered: