Skip to content

gitea actions: update / clarify maintenance on them or can we just use github actions instead ? #29406

Closed
@tobhv

Description

@tobhv

gitea actions update clarification

Hi,

not sure whether this is a good feature request but will try anyway (it is more of a proposal).

problem / context:
gitea.com uses github compatible actions fot pipelines. but some / most of the actions offered on gitea.com are outdated and contain vulnerabilities.
example: see below trivy scanning reports on the actions/checkout repo.
i think pulling in some software as part of running a pipeline is ok as long as there is trust on that the code is maintained / safe.

questions:
from what i see each gitea actions repo is a plain mirror of github, but simply not updated ?

suggestions:
can you share some light on whether it's recommeneded to use github actions straight away or share wether there is intention to update the gitea actions ?
or it's perhaps to early to tell (since gitea actions are still work in progress?

other than that: documentation looks great, speed of gitea is excellent so thanks already for that.

Screenshots

~$ trivy repository https://gitea.com/actions/checkout
2024-02-25T22:14:58.929+0100    INFO    Need to update DB
2024-02-25T22:14:58.929+0100    INFO    DB Repository: ghcr.io/aquasecurity/trivy-db
2024-02-25T22:14:58.929+0100    INFO    Downloading DB...
43.24 MiB / 43.24 MiB [------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------] 100.00% 18.83 MiB p/s 2.5s
2024-02-25T22:15:02.173+0100    INFO    Vulnerability scanning is enabled
2024-02-25T22:15:02.173+0100    INFO    Secret scanning is enabled
2024-02-25T22:15:02.173+0100    INFO    If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-02-25T22:15:02.173+0100    INFO    Please see also https://aquasecurity.github.io/trivy/v0.49/docs/scanner/secret/#recommendation for faster secret detection
Enumerating objects: 450, done.
Counting objects: 100% (450/450), done.
Compressing objects: 100% (259/259), done.
Total 450 (delta 275), reused 279 (delta 152), pack-reused 0
2024-02-25T22:15:05.552+0100    INFO    To collect the license information of packages in "package-lock.json", "npm install" needs to be performed beforehand
2024-02-25T22:15:05.647+0100    INFO    Number of language-specific files: 1
2024-02-25T22:15:05.647+0100    INFO    Detecting npm vulnerabilities...

package-lock.json (npm)

Total: 5 (UNKNOWN: 0, LOW: 0, MEDIUM: 3, HIGH: 2, CRITICAL: 0)

┌───────────────┬────────────────┬──────────┬──────────┬───────────────────┬──────────────────────────────────────────────────────────┬──────────────────────────────────────────────────────────────┐
│    Library    │ Vulnerability  │ Severity │  Status  │ Installed Version │                      Fixed Version                       │                            Title                             │
├───────────────┼────────────────┼──────────┼──────────┼───────────────────┼──────────────────────────────────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ @actions/core │ CVE-2022-35954 │ MEDIUM   │ fixed    │ 1.2.6             │ 1.9.1                                                    │ @actions/core has Delimiter Injection Vulnerability in       │
│               │                │          │          │                   │                                                          │ exportVariable                                               │
│               │                │          │          │                   │                                                          │ https://avd.aquasec.com/nvd/cve-2022-35954                   │
├───────────────┼────────────────┼──────────┼──────────┼───────────────────┼──────────────────────────────────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ lodash.set    │ CVE-2020-8203  │ HIGH     │ affected │ 4.3.2             │                                                          │ nodejs-lodash: prototype pollution in zipObjectDeep function │
│               │                │          │          │                   │                                                          │ https://avd.aquasec.com/nvd/cve-2020-8203                    │
├───────────────┼────────────────┤          ├──────────┼───────────────────┼──────────────────────────────────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ qs            │ CVE-2022-24999 │          │ fixed    │ 6.10.1            │ 6.10.3, 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, │ express: "qs" prototype poisoning causes the hang of the     │
│               │                │          │          │                   │ 6.2.4                                                    │ node process                                                 │
│               │                │          │          │                   │                                                          │ https://avd.aquasec.com/nvd/cve-2022-24999                   │
├───────────────┼────────────────┼──────────┤          ├───────────────────┼──────────────────────────────────────────────────────────┼──────────────────────────────────────────────────────────────┤
│ semver        │ CVE-2022-25883 │ MEDIUM   │          │ 5.7.1             │ 7.5.2, 6.3.1, 5.7.2                                      │ nodejs-semver: Regular expression denial of service          │
│               │                │          │          │                   │                                                          │ https://avd.aquasec.com/nvd/cve-2022-25883                   │
│               │                │          │          ├───────────────────┤                                                          │                                                              │
│               │                │          │          │ 6.3.0             │                                                          │                                                              │
│               │                │          │          │                   │                                                          │                                                              │
└───────────────┴────────────────┴──────────┴──────────┴───────────────────┴──────────────────────────────────────────────────────────┴──────────────────────────────────────────────────────────────┘
:~$ trivy repository https://github.com/actions/checkout
2024-02-25T22:16:18.054+0100    INFO    Vulnerability scanning is enabled
2024-02-25T22:16:18.054+0100    INFO    Secret scanning is enabled
2024-02-25T22:16:18.054+0100    INFO    If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-02-25T22:16:18.054+0100    INFO    Please see also https://aquasecurity.github.io/trivy/v0.49/docs/scanner/secret/#recommendation for faster secret detection
Enumerating objects: 964, done.
Counting objects: 100% (964/964), done.
Compressing objects: 100% (495/495), done.
Total 964 (delta 610), reused 720 (delta 395), pack-reused 0
2024-02-25T22:16:20.797+0100    INFO    To collect the license information of packages in "package-lock.json", "npm install" needs to be performed beforehand
2024-02-25T22:16:20.869+0100    INFO    Number of language-specific files: 1
2024-02-25T22:16:20.869+0100    INFO    Detecting npm vulnerabilities...

Metadata

Metadata

Assignees

No one assigned

    Labels

    issue/needs-feedbackFor bugs, we need more details. For features, the feature must be described in more detailtype/proposalThe new feature has not been accepted yet but needs to be discussed first.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions