fix: do not allow builds for prs#4374
fix: do not allow builds for prs#4374howenyap wants to merge 2 commits intonusmodifications:masterfrom
Conversation
|
PR author is not in the allowed authors list. |
|
@howenyap is attempting to deploy a commit to the modsbot's projects Team on Vercel. A member of the Team first needs to authorize it. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #4374 +/- ##
==========================================
+ Coverage 54.52% 56.42% +1.90%
==========================================
Files 274 308 +34
Lines 6076 6963 +887
Branches 1455 1680 +225
==========================================
+ Hits 3313 3929 +616
- Misses 2763 3034 +271 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
@howenyap @ravern cmiiw but when we deploy with changes to the .sh, vercel warns us and let's us know of changes? how else might these secrets be leaked? if we ignore these by default, then we can merge PRs from forks without any preview which is unintended?
@nusmodifications/nusmods-developers maintainers please lmk your thoughts too, but if we merge this means CI passes without any previous by default |
cmiiw but secrets can be leaked via changes in any code, not just in there is also the second gate where you have to authorise vercel for the build to actually happen, but the concern was that it could be a large PR and the review might've missed something but at the end of the day you guys are the maintainers so I'll just leave it to you to decide, I raised this to ravern and sent a patch just for disclosure |
|
hmm that's a good point and it's true. that's a natural drawback of the preview environment. will discuss with the other maintainers on this. thanks for bringing it up! |

Context
Build environment secrets can be leaked via malicious code on PRs
Implementation
Update
vercel_ignore_build.shto not build for PRs by defaultOther Information
Aligned with @ravern