Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ci: Updaiting workflow permissions and adding hardend runner per step-security. #3124

Conversation

san-est
Copy link
Contributor

@san-est san-est commented Oct 18, 2024

Description:
Updating several workflows and their permissions per step-security requirements and adding hardend runner to one of the workflows.

Related issue(s):

Fixes #3121

Notes for reviewer:

Checklist

  • Documented (Code comments, README, etc.)
  • Tested (unit, integration, etc.)

@san-est san-est added this to the 0.59.0 milestone Oct 18, 2024
@san-est san-est self-assigned this Oct 18, 2024
@san-est san-est requested review from AlfredoG87, ebadiere, Nana-EC and a team as code owners October 18, 2024 12:28
@san-est san-est requested a review from leninmehedy October 18, 2024 12:28
Copy link

github-actions bot commented Oct 18, 2024

🚨 Memory Leak Detected 🚨

A potential memory leak has been detected in the test titled validates enforcement of request id. This may impact the application's performance and stability.

Details

📊 Memory Leak Detection Report 📊

GC Type: MarkSweepCompact
Cost: 27,265.5 ms

Heap Statistics (before vs after executing the test):

  • Total Heap Size: increased with 1.46 MB
  • Total Heap Size Executable: no changes
  • Total Physical Size: decreased with 348.16 KB
  • Total Available Size: decreased with 5.88 MB
  • Total Global Handles Size: no changes
  • Used Global Handles Size: decreased with 64.00 bytes
  • Used Heap Size: decreased with 3.44 MB
  • Heap Size Limit: no changes
  • Malloced Memory: no changes
  • External Memory: no changes
  • Peak Malloced Memory: no changes

Heap Space Statistics (before vs after executing the test):

  • Old Space:

    • Space Size: increased with 1.84 MB
    • Space Used Size: increased with 2.08 MB
    • Space Available Size: decreased with 8.72 MB
    • Physical Space Size: increased with 1.84 MB
  • Large Object Space:

    • Space Size: increased with 835.58 KB
    • Space Used Size: increased with 813.50 KB
    • Space Available Size: no changes
    • Physical Space Size: increased with 835.58 KB

Recommendations

Please investigate the memory allocations in this test, focusing on objects that are not being properly deallocated.

Copy link

github-actions bot commented Oct 18, 2024

Tests

       3 files     399 suites   18s ⏱️
1 433 tests 1 432 ✔️ 1 💤 0
1 442 runs  1 441 ✔️ 1 💤 0

Results for commit b89ff2d.

♻️ This comment has been updated with latest results.

Nana-EC
Nana-EC previously approved these changes Oct 18, 2024
Copy link

github-actions bot commented Oct 18, 2024

Acceptance Tests

  17 files  245 suites   28m 2s ⏱️
599 tests 593 ✔️ 4 💤 2
728 runs  722 ✔️ 4 💤 2

Results for commit b89ff2d.

♻️ This comment has been updated with latest results.

.github/workflows/pr-label-milestone-check.yml Outdated Show resolved Hide resolved
.github/workflows/conformity-workflow.yml Outdated Show resolved Hide resolved
.github/workflows/release-acceptance.yml Outdated Show resolved Hide resolved
@san-est san-est requested a review from a team as a code owner October 21, 2024 08:44
@Nana-EC
Copy link
Collaborator

Nana-EC commented Oct 25, 2024

@san-est need to fix DCO then you can check in

san-est and others added 3 commits October 28, 2024 14:55
…-security.

Signed-off-by: Vasil Boyadzhiev <vasil.boyadzhiev@limechain.tech>
Co-authored-by: Roger Barker <roger.barker@swirldslabs.com>
Signed-off-by: Vasil Boyadzhiev <vasil.boiadzhiev@gmail.com>
Signed-off-by: Vasil Boyadzhiev <vasil.boyadzhiev@limechain.tech>
Signed-off-by: Vasil Boyadzhiev <vasil.boyadzhiev@limechain.tech>
@san-est san-est force-pushed the 3121-update-default-github_token-permissions-per-step-security-recommendations branch from b89ff2d to 58c9f9e Compare October 28, 2024 12:55
Copy link

Copy link

github-actions bot commented Oct 28, 2024

Test Results

 20 files  ± 0  287 suites  +4   35m 8s ⏱️ +33s
607 tests + 2  588 ✅  -  3  4 💤 ±0  15 ❌ +5 
768 runs   - 26  747 ✅  - 33  6 💤 +2  15 ❌ +5 

For more details on these failures, see this check.

Results for commit 58c9f9e. ± Comparison against base commit 9afe7c2.

This pull request removes 1 and adds 3 tests. Note that renamed tests count towards both.
"before all" hook in "@tokenmanagement HTS Precompile Token Management Acceptance Tests" ‑ RPC Server Acceptance Tests Acceptance tests @tokenmanagement HTS Precompile Token Management Acceptance Tests "before all" hook in "@tokenmanagement HTS Precompile Token Management Acceptance Tests"
"before all" hook in "Debug API Test Suite" ‑ RPC Server Acceptance Tests Acceptance tests @api-batch-3 RPC Server Acceptance Tests Debug API Test Suite "before all" hook in "Debug API Test Suite"
"before each" hook for "Should eventually exhaust the hbar limit for EXTENDED user" ‑ RPC Server Acceptance Tests Acceptance tests @hbarlimiter HBAR Limiter Acceptance Tests HBAR Rate Limit Tests HBAR Rate Limit For Different Spending Plan Tiers Preconfigured Tiers EXTENDED Tier "before each" hook for "Should eventually exhaust the hbar limit for EXTENDED user"
"before each" hook for "Should increase the amount spent of the spending plan by the transaction cost" ‑ RPC Server Acceptance Tests Acceptance tests @hbarlimiter HBAR Limiter Acceptance Tests HBAR Rate Limit Tests HBAR Rate Limit For Different Spending Plan Tiers Preconfigured Tiers PRIVILEGED Tier "before each" hook for "Should increase the amount spent of the spending plan by the transaction cost"

♻️ This comment has been updated with latest results.

@san-est san-est merged commit 592b92f into main Oct 29, 2024
43 of 44 checks passed
@san-est san-est deleted the 3121-update-default-github_token-permissions-per-step-security-recommendations branch October 29, 2024 10:51
Copy link

codecov bot commented Oct 29, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 83.26%. Comparing base (daf2aef) to head (58c9f9e).
Report is 20 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #3124      +/-   ##
==========================================
+ Coverage   83.19%   83.26%   +0.07%     
==========================================
  Files          63       66       +3     
  Lines        4242     4254      +12     
  Branches      830      829       -1     
==========================================
+ Hits         3529     3542      +13     
- Misses        470      471       +1     
+ Partials      243      241       -2     
Flag Coverage Δ
config-service 98.14% <ø> (?)
relay 85.45% <ø> (-0.14%) ⬇️
server 83.52% <ø> (+0.04%) ⬆️
ws-server 36.87% <ø> (+0.71%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

see 32 files with indirect coverage changes

rbarkerSL added a commit that referenced this pull request Oct 30, 2024
**Description**:
Added `packages: write` permission per
https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#authenticating-with-a-personal-access-token-classic
May need to modify other files modified by #3124

**Related Issue(s)**:
Relates to #3124
Relates to #3182

Signed-off-by: Roger Barker <roger.barker@swirldslabs.com>
quiet-node pushed a commit that referenced this pull request Oct 30, 2024
**Description**:
Added `packages: write` permission per
https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#authenticating-with-a-personal-access-token-classic
May need to modify other files modified by #3124

**Related Issue(s)**:
Relates to #3124
Relates to #3182

Signed-off-by: Roger Barker <roger.barker@swirldslabs.com>
ebadiere pushed a commit that referenced this pull request Oct 30, 2024
**Description**:
Added `packages: write` permission per
https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#authenticating-with-a-personal-access-token-classic
May need to modify other files modified by #3124

**Related Issue(s)**:
Relates to #3124
Relates to #3182

Signed-off-by: Roger Barker <roger.barker@swirldslabs.com>
ebadiere pushed a commit that referenced this pull request Oct 30, 2024
**Description**:
Added `packages: write` permission per
https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#authenticating-with-a-personal-access-token-classic
May need to modify other files modified by #3124

**Related Issue(s)**:
Relates to #3124
Relates to #3182

Signed-off-by: Roger Barker <roger.barker@swirldslabs.com>
ebadiere added a commit that referenced this pull request Oct 31, 2024
#3186)

* ci(bug): Update permissions in JSON rpc relay for GITHUB_TOKEN (#3183)

**Description**:
Added `packages: write` permission per
https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#authenticating-with-a-personal-access-token-classic
May need to modify other files modified by #3124

**Related Issue(s)**:
Relates to #3124
Relates to #3182

Signed-off-by: Roger Barker <roger.barker@swirldslabs.com>

* chore: divided hbar limtier tests into different batches (#3181)

* chore: divided hbar limtier tests into different batches

Signed-off-by: Logan Nguyen <logan.nguyen@swirldslabs.com>

* fix: fixed acceptance.yml

Signed-off-by: Logan Nguyen <logan.nguyen@swirldslabs.com>

---------

Signed-off-by: Logan Nguyen <logan.nguyen@swirldslabs.com>

---------

Signed-off-by: Roger Barker <roger.barker@swirldslabs.com>
Signed-off-by: Logan Nguyen <logan.nguyen@swirldslabs.com>
Co-authored-by: Roger Barker <roger.barker@swirldslabs.com>
Co-authored-by: Logan Nguyen <logan.nguyen@swirldslabs.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update default GITHUB_TOKEN permissions per step-security recommendations
4 participants