-
Notifications
You must be signed in to change notification settings - Fork 832
ci: automate protobuf source generation for Renovate updates #1920
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
c502a66
68a0d20
87f97d4
b1b5559
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,64 @@ | ||
| --- | ||
| name: Generate Protobuf | ||
|
|
||
| on: | ||
| push: | ||
| branches: | ||
| - "renovate/protobuf" | ||
|
|
||
| permissions: {} | ||
|
|
||
| jobs: | ||
| generate: | ||
| runs-on: ubuntu-24.04 | ||
| permissions: | ||
| contents: write | ||
| steps: | ||
| - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6 | ||
| with: | ||
| ref: ${{ github.ref }} | ||
| # zizmor: ignore[artipacked] -- needs credentials to push | ||
| persist-credentials: true | ||
| - uses: jdx/mise-action@6d1e696aa24c1aa1bcc1adea0212707c71ab78a8 # v3.6.1 | ||
| with: | ||
| version: v2026.2.11 | ||
| sha256: 3e1baedb9284124b770d2d561a04a98c343d05967c83deb8b35c7c941f8d9c9a | ||
| - name: Cache local Maven repository | ||
| uses: actions/cache@cdf6c1fa76f9f475f3d7449005a359c84ca0f306 # v5.0.3 | ||
| with: | ||
| path: ~/.m2/repository | ||
| key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }} | ||
| restore-keys: | | ||
| ${{ runner.os }}-maven- | ||
| - name: Verify both protobuf deps are updated | ||
| run: | | ||
| git fetch origin main | ||
| DIFF_POM=$(git diff origin/main -- pom.xml) | ||
| DIFF_MISE=$(git diff origin/main -- mise.toml) | ||
| if ! echo "$DIFF_POM" | grep -q 'protobuf-java.version'; then | ||
| echo "::error::protobuf-java not updated in pom.xml" | ||
| exit 1 | ||
| fi | ||
| if ! echo "$DIFF_MISE" | grep -q 'protoc'; then | ||
| echo "::error::protoc not updated in mise.toml" | ||
| exit 1 | ||
| fi | ||
| - name: Generate protobuf sources | ||
| run: mise run generate | ||
| - name: Commit and push generated sources | ||
| run: | | ||
| git diff --quiet && exit 0 | ||
| UNEXPECTED=$(git diff --name-only | grep -v '\.java$' || true) | ||
| if [[ -n "$UNEXPECTED" ]]; then | ||
| echo "::error::Unexpected files changed:" | ||
| echo "$UNEXPECTED" | ||
| exit 1 | ||
| fi | ||
| # Note: GITHUB_TOKEN pushes don't trigger CI re-runs. | ||
| # Close and reopen the PR to trigger CI after this commit. | ||
| # TODO: switch to PROMBOT_GITHUB_TOKEN once it's added to this repo. | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. If
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Good point — |
||
| git config user.name "github-actions[bot]" | ||
| git config user.email "41898282+github-actions[bot]@users.noreply.github.com" | ||
| git add '*.java' | ||
| git commit -m "chore: regenerate protobuf sources" | ||
| git push | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note that a push for this from renovate could still theoretically contain untrusted code if the dependency being updated was compromised and a malicious version published.
If the update contained malicious code that tried to steal
GITHUB_TOKEN(or whatever secret is used), it would able to perform arbitrary write operations on the repository, or whatever permissions that token had.It's risky performing automated writes to the repository with elevated permissions in this context.
It's not something I've tried to do myself, but a safer approach could be to have this job only generate a Git patch for the changes as a build artifact, and then have another job/workflow take that artifact and apply it after applying some sanity checks (e.g. the diff only updates the expected files). Then any compromised code isn't able to actually execute with access to the secrets but the protobuf files can still be regenerated.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The attack vector here is a compromised
protocbinary orprotobuf-javalibrary. The mitigations are:.javafiles can be committed — anything else fails the workflowprotocis downloaded from Google's official GitHub releases via misecontents: write— no admin, no secrets beyondGITHUB_TOKENThis is the same trust model as running
protoclocally — we're trusting Google's releases. If protoc itself were compromised, we'd have bigger problems regardless of automation.