mirror of
https://github.com/tokio-rs/tracing.git
synced 2025-10-02 15:24:47 +00:00
chore(CI): change cargo audit
to run on a schedule (#1658)
## Motivation Currently, `cargo audit` checks are run on every push that modifies `Cargo.toml` or lockfiles. The intention behind this was to fail changes that introduce dependencies that have security advisories. However, it turns out that this is not actually the primary use-case for `cargo audit` runs. Typically, when a dependency of a `tracing` crate has a security advisory, this isn't newly introduced by a PR, but a new *advisory* that was just announced for a library we *already* depended on. In this case, this isn't a failure that should block any particular branch from merging; instead, it's a *new issue* that should block effected crates from being *released*. ## Solution This branch changes the audit workflow from running on pushes to running on a schedule (nightly). When using `actions-rs/audit-check` in a scheduled mode, it will automatically open new issues if any dependencies have security advisories (see https://github.com/actions-rs/audit-check#scheduled-audit for details). This means those advisories can be fixed separately while still allowing unrelated branches to pass CI. This is, IMO, a better workflow for handling security advisories. If we introduce release automation in the future, we should ensure that the release automation process checks that the crate being released has no open security advisory issues, and fails the *release* if any such issues are still open.
This commit is contained in:
parent
e82596842c
commit
abe2b6a9f4
6
.github/workflows/audit.yml
vendored
6
.github/workflows/audit.yml
vendored
@ -1,9 +1,7 @@
|
||||
name: Security audit
|
||||
on:
|
||||
push:
|
||||
paths:
|
||||
- '**/Cargo.toml'
|
||||
- '**/Cargo.lock'
|
||||
schedule:
|
||||
- cron: '0 0 * * *'
|
||||
jobs:
|
||||
security_audit:
|
||||
runs-on: ubuntu-latest
|
||||
|
Loading…
x
Reference in New Issue
Block a user