Skip to content

Conversation

@potiuk
Copy link
Member

@potiuk potiuk commented Nov 11, 2024

There is an extra layer of protection that code provided by PR should not be executed in the context of pull_request_target by running the code only inside docker container. However the container is build from local sources, so it could contain other code. We do not allow that by .dockerignore, but the .dockerignore should not be overrideable from the incoming PR.


^ Add meaningful description above
Read the Pull Request Guidelines for more information.
In case of fundamental code changes, an Airflow Improvement Proposal (AIP) is needed.
In case of a new dependency, check compliance with the ASF 3rd Party License Policy.
In case of backwards incompatible changes please leave a note in a newsfragment file, named {pr_number}.significant.rst or {issue_number}.significant.rst, in newsfragments.

@potiuk potiuk requested review from ashb and gopidesupavan November 11, 2024 14:54
@potiuk potiuk force-pushed the add-dockerignore-to-target-workflow-override branch from 79c02cd to bd52d86 Compare November 11, 2024 14:58
@potiuk potiuk added this to the Airflow 2.10.4 milestone Nov 11, 2024
@gopidesupavan
Copy link
Member

cool :)

@potiuk potiuk force-pushed the add-dockerignore-to-target-workflow-override branch from bd52d86 to 19f7776 Compare November 11, 2024 20:59
There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
@potiuk potiuk force-pushed the add-dockerignore-to-target-workflow-override branch from 19f7776 to 945725f Compare November 12, 2024 10:35
@jscheffl jscheffl merged commit 5d6b836 into apache:main Nov 16, 2024
@potiuk
Copy link
Member Author

potiuk commented Nov 16, 2024

Ah .. I wanted to use it to test cherry-picker automation - but I can do it manually actually with cherry-picker cli- now that they released a version that has the new feature that @gopidesupavan also advocated for it in the cherry-picker PR

potiuk added a commit to potiuk/airflow that referenced this pull request Nov 17, 2024
)

There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)

Co-authored-by: Jarek Potiuk <jarek@potiuk.com>
potiuk added a commit that referenced this pull request Nov 17, 2024
…44103)

There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)
potiuk added a commit to potiuk/airflow that referenced this pull request Nov 17, 2024
There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)

Co-authored-by: Jarek Potiuk <jarek@potiuk.com>
potiuk added a commit that referenced this pull request Nov 17, 2024
…44104)

There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)
potiuk added a commit to potiuk/airflow that referenced this pull request Nov 17, 2024
…3885)

There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)

Co-authored-by: Jarek Potiuk <jarek@potiuk.com>
potiuk added a commit that referenced this pull request Nov 17, 2024
…44105)

There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)
kandharvishnu pushed a commit to kandharvishnu/airflow that referenced this pull request Nov 19, 2024
There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
utkarsharma2 pushed a commit that referenced this pull request Dec 4, 2024
…44103)

There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)
utkarsharma2 pushed a commit that referenced this pull request Dec 9, 2024
…44103)

There is an extra layer of protection that code provided by PR
should not be executed in the context of pull_request_target by
running the code only inside docker container. However the
container is build from local sources, so it could contain other
code. We do not allow that by .dockerignore, but the .dockerignore
should not be overrideable from the incoming PR.
(cherry picked from commit 5d6b836)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants