Skip to content
This repository has been archived by the owner on Feb 28, 2024. It is now read-only.

JSON linting for PRs #74

Open
ljoonal opened this issue Jun 15, 2022 · 5 comments
Open

JSON linting for PRs #74

ljoonal opened this issue Jun 15, 2022 · 5 comments
Labels
enhancement New feature or request up for grabs Ready for implementation

Comments

@ljoonal
Copy link
Member

ljoonal commented Jun 15, 2022

There's been quite a few PR's that had broken JSON or wrong indentation. Setting up GH actions to check for basic things like that and automatically request changes if there's issues should be done.

Also as a more complex possibility, since so many people use github links, we could do a regex check on the download/release urls and if they match Github urls but aren't pinned to a specific tag could leave a comment straight away about it on the PR.

@ljoonal ljoonal added the enhancement New feature or request label Jun 15, 2022
@EIA485
Copy link
Member

EIA485 commented Jun 15, 2022

i agree,
we should also check that the download link matches the checksum automatically

@ljoonal ljoonal added the up for grabs Ready for implementation label Jun 16, 2022
@zkxs
Copy link
Collaborator

zkxs commented Jun 16, 2022

i agree, we should also check that the download link matches the checksum automatically

Unfortunately that's not feasible, as the whole reason we have the checksum is because the download link has no guarantee of always serving the same file. While we could have automatic checksum validation as a sanity check, it wouldn't actually function as a security check, and I worry it would imply to auditors that they don't have to verify the checksum themselves.

@EIA485
Copy link
Member

EIA485 commented Jun 17, 2022

and I worry it would imply to auditors that they don't have to verify the checksum themselves.

maybe we could explicitly have the bot state that "the checksum did not pass the sanity check"

@ljoonal
Copy link
Member Author

ljoonal commented Jun 17, 2022

Yeah IMO we shouldn't make the gh actions ever state that it passed, only say if it didn't. And of course keep auditors informed that they still need to verify it locally too, and that the bot check is just a sanity check pass.

Alternatively we could go GH actions all the way and make the actions download & decompile the file that passed the sanity check, though I doubt that that could be done reasonably with permissions and not opening a decompilation as a service loophole.

@EIA485
Copy link
Member

EIA485 commented Jun 27, 2022

the bot could also automatically resolve merge conflicts caused by multiple prs appending mods to the end of the list

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request up for grabs Ready for implementation
Projects
None yet
Development

No branches or pull requests

3 participants