4 comments

  • Normal_gaussian 54 minutes ago
    GHA have always been a PITA for any serious DevOps; it's quite clear they were designed to integrate in 7 lines of code and then tell everyone who complains that they're doing it wrong.

    This does not surprise me.

    • datadrivenangel 7 minutes ago
      You've perfectly described how microsoft operates and how github actions is apparently based on AzureDevOps pipelines.
    • freedomben 16 minutes ago
      It is a PITA, but that can be significantly improved IMHO if you just write shell script wrappers for your tasks. Not only does it make it easier to run CI locally, but it also makes it so much easier to move platforms in the future.

      When the GH action YAML is just invoking shell scripts, I find it quite pleasant to use

  • euph0ria 15 minutes ago
    What is the security implication for private repos?
  • damienwebdev 8 hours ago
    I was the reporter on this one. If you have Github Actions in your organization, disable them immediately if you're unsure which version of composer your Github Actions run.
    • ammar2 26 minutes ago
      Could you elaborate on this bit on why Github's secret masking doesn't work here:

      > GitHub Actions' built-in secret masker matches registered values as exact substrings. When the exception message is rendered by Symfony Console it may wrap, embed in In BaseIO.php line N: framing, or interleave with ANSI control sequences. So the masker does not redact, and the plaintext token reaches the log.

      What does this log rendering look like such that the token from that code snippet becomes interleaved enough to not be a substring match?

      I'm not familiar with composer/Symfony but I would expect something like:

        Line 34: Foo bar
        Line 34: <red>Foo bar</red>
      • jacobrussell 11 minutes ago
        From what I can tell Symfony wraps these errors in a styled error block so it messes with GitHub's masking. For example, newlines breaking up the token are apparently enough to trick the masker since it's not a substring anymore.

        For your example:

        Line 34: <red>ghs_fdsafdsarewqfdsa...</red>

        Is probably long enough in most cases to break to a new line.

        Also, those blocks get "interleaved" like this:

        <red>ghs_fdsafdsarewqfdsafdsa</red>

        <red>fdsardsardsafdsafs......</red>

        So there are now </red>'s within the token, also breaking the substring matching.

        This is kind of eye-opening for me -- I have never thought about how styled output like this could cause logging leakages.

        • ammar2 5 minutes ago
          Aah, the newlines were the thing I was missing. That makes sense then.
    • semi-extrinsic 31 minutes ago
      Not immediately clear to me, is this limited to ghu_xxx type OAUTH tokens? And it's only relevant for PHP projects that use composer in GHA?
      • jacobrussell 21 minutes ago
        That's my understanding. This seems to only effect PHP projects that use Composer in GitHub actions. Examples being usage of shivammathur/setup-php and or php-actions/composer.
  • esafak 48 minutes ago
    The title suggests it is a Github issue but really it is https://github.com/composer/composer no? I would edit the title for clarity.
    • darkwater 13 minutes ago
      Yes, it's a Composer issue (which is a PHP dependencies manager) with the new format of GITHUB_TOKEN.

      It's not an issue in GHA itself, this time. But if you are a composer user in GH, you should definitely be warned (and worried).

    • incomplete 28 minutes ago
      it's not super clear, but that's my read as well... i think i can start lowering my panic levels now.