Automatically adding comments to GitHub PRs, safely and reliably
Using GitHub Actions offers a lot of possibilities to automate your development processes. Imagine you would like to get a coverage report for any PR that gets created for your repository and add a coverage summary directly to the PR as a comments to make allow reviewers to immediately see if this PR meets the requirements wrt code coverage.
There are a lot of convenient actions available in the GitHub Marketplace that perform some action and add a comment to the PR. That usually works perfectly unless you come across the notorious error:
HttpError: Resource not accessible by integration
and your perfectly working workflow failed to add a comment to the PR that you just created. After some initial investigation you find out
that it is due to a PR created from a fork. Further digging reveals that GitHub treats PRs from forks differently for security reasons, namely
that in such case any workflow triggered by a pull_request
trigger will not have access to any secrets
or write tokens.
Trying to be smart
GitHub takes “secure by default” seriously, so you don’t easily get pwned by a malicious actor, however there are still ways to shoot yourself in the foot. There is an additional workflow trigger pull_request_target that will run a workflow from a PR in the context of the target repository, and as a consequence, have access to secrets and write tokens.
There are cases where doing something like that is acceptable and can be considered safe (see Keeping your GitHub Actions safe):
Generally speaking, when the PR contents are treated as passive data, i.e. not in a position of influence over the build/testing process, it is safe.
A very nice writeup about utilizing the pull_request_target
trigger with some additional user permission checks can be found in this blog entry.
However, the downside of that approach is that you need to think hard about the attack surface of your workflows to prevent any unexpected side effects, something we ultimately want to avoid.
Git (sic!) better
Some investigation of available workflow triggers reveals the workflow_run
trigger, that allows to react once a workflow has completed, and workflows triggered by that run in the context of the repository itself. That would allow us to do the following:
- run a workflow with
pull_request
trigger to perform some action, e.g. calculate the code coverage of the code in a PR - store the result of this workflow as an artifact attached to the workflow run
- trigger another workflow upon completion of the first workflow using the
workflow_run
trigger with actioncompleted
- download the artifact attached to the completed workflow run
- add a comment to the associated PR based on the artifact data
We have implemented this in a real-world example for the up-java repo of the Eclipse uProtocol project.
Gen(-AI+Mundane)
The first workflow will generate the relevant data for the PR, and upload the generated data as an artifact. See the snippet below for the relevant steps:
The comment that shall be added to the PR is stored in a file body.txt while the associated PR number is stored in a file pr-number.txt to know to which PR that comment should be added in the second workflow.
Any comment?
Now that we have a workflow to calculate the code coverage of the PR and generate a comment that we would like to add to it, we just need a workflow that gets triggered when the first workflow (filtered by its name) is completed:
The workflow will download the artifact attached to the workflow run that triggered it and add a comment to the associated PR with the attached content.
NOTE: There are pre-made 3rd party actions to download artifacts from previous workflow runs that could be used to further simplify such a workflow.
Closing words
GitHub.com is a very powerful platform to host open-source projects, but you need to be aware that its open and collaborative model also attracts malicious actors to attack or infiltrate (popular) repositories. Keep your repositories and workflows safe by following secure development best practices.
More information can be found in the Security Handbook @ Eclipse Foundation.
Comments
No comments found for this article.
Join the discussion for this article on this ticket. Comments appear on this page instantly.