Skip to content

CI: Add workflow for SM security bumps#711

Merged
sagudev merged 3 commits intoservo:mainfrom
sagudev:sm-bump-pr
Feb 25, 2026
Merged

CI: Add workflow for SM security bumps#711
sagudev merged 3 commits intoservo:mainfrom
sagudev:sm-bump-pr

Conversation

@sagudev
Copy link
Copy Markdown
Member

@sagudev sagudev commented Feb 25, 2026

No description provided.

Signed-off-by: sagudev <16504129+sagudev@users.noreply.github.com>
@sagudev
Copy link
Copy Markdown
Member Author

sagudev commented Feb 25, 2026

attestations is only for artifacts so we cannot use them here easily

Comment thread .github/workflows/security-bump.yml Outdated
- run: pip install requests
- run: python3 ./mozjs-sys/etc/sm-security-bump.py
- name: Create Pull Request
uses: peter-evans/create-pull-request@v8
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why not use gh pr create instead of a third party action?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Interesting. That does sound useful. Could we pin the action to a hash instead, to make updates explicit even if the tag moves on?

f
Signed-off-by: sagudev <16504129+sagudev@users.noreply.github.com>
@jschwe
Copy link
Copy Markdown
Member

jschwe commented Feb 25, 2026

attestations is only for artifacts so we cannot use them here easily

sm-security-bump creates a release with artifacts (the source code archives), so we should be able to attest those, right? It's mainly about showing that the source code artifact we uploaded was done by CI, and can't have been modified by a human maintainer before uploading.

@sagudev
Copy link
Copy Markdown
Member Author

sagudev commented Feb 25, 2026

attestations is only for artifacts so we cannot use them here easily

sm-security-bump creates a release with artifacts (the source code archives), so we should be able to attest those, right? It's mainly about showing that the source code artifact we uploaded was done by CI, and can't have been modified by a human maintainer before uploading.

I get error when quickly trying this in personal fork, so I would defer this for later. Until we land basic workflow on main I cannot do test runs here :(

.
Signed-off-by: sagudev <16504129+sagudev@users.noreply.github.com>
@sagudev sagudev enabled auto-merge February 25, 2026 11:09
@sagudev sagudev added this pull request to the merge queue Feb 25, 2026
Merged via the queue into servo:main with commit c7df022 Feb 25, 2026
42 checks passed
github-merge-queue Bot pushed a commit that referenced this pull request Mar 7, 2026
Some fixups for #711

---------

Signed-off-by: sagudev <16504129+sagudev@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants