Update qcom-preflight-checks.yml#7
Update qcom-preflight-checks.yml#7Sandhya1236 wants to merge 1 commit intoqualcomm-linux:camera-kernel.qclinux.0.0from
Conversation
|
You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool. What Enabling Code Scanning Means:
For more information about GitHub Code Scanning, check out the documentation. |
pull_request_target can be a security vulnerability and should be avoided and also aligned with latest pre-flight check workflow. Signed-off-by: Sandhya Adavikolanu <sadaviko@qti.qualcomm.com>
e494e34 to
f3490d7
Compare
|
CI failure is expected on fork PRs with pull_request This job is failing at actions/checkout (before QC Preflight runs). The workflow is attempting to fetch the PR head repo (fork) and checkout fails with “Repository not found” / exit code 128 because the workflow token can’t access the fork in our internal/private setup. This matches OSDO guidance in “OSS Ops Guidance: https://github.qualcomm.com/OSDO/osdo.github.qualcomm.com/pull/212/files Prefer splitting untrusted and trusted workflows: |
|
Changes look good, but the Repolinter and Copyright and License checks are failing. |
This PR should not fail copyright check based on the PR changes alone. I see that both the pull_request and pull_request_target events ran and both failed, and the pull_request one is running the latest version of copyright license checker. @targoy-qti @njjetha is this related to the way the diff is calculated? The repolinter check was already failing on 3 files: @gkhose-qipl FYI are these QC-authored files? |
@mynameistechno diff should only take the file changes which are in PR. qualcomm/qcom-reusable-workflows#25 calculate the correct diff. |
@targoy-qti do we need this fix qualcomm/qcom-reusable-workflows#25 then? I.e. why is copyright license checker complaining about these files if this PR only touches |
Yes, this needs to be fixed. It’s a bit odd that the issue showed up after a year of deployment, but thanks to Neeraj for already picking it up |


Running untrusted code on the pull_request_target trigger may lead to security vulnerabilities. These vulnerabilities include cache poisoning and granting unintended access to write privileges or secrets.
https://docs.github.com/en/actions/reference/workflows-and-actions/events-that-trigger-workflows#pull_request_target
We should update all usage of pull_request_target in all workflow files and also update qualcomm-preflight-check to the latest.